必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.189.68.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.189.68.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:49:28 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 11.68.189.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.68.189.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.76.80.70 attackbots
Mar  5 06:11:14 vps647732 sshd[7794]: Failed password for proxy from 182.76.80.70 port 51202 ssh2
...
2020-03-05 13:48:11
49.233.172.108 attackspambots
Mar  5 05:54:51 vpn01 sshd[30343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.172.108
Mar  5 05:54:54 vpn01 sshd[30343]: Failed password for invalid user mapred from 49.233.172.108 port 39254 ssh2
...
2020-03-05 13:22:40
5.89.35.84 attack
Mar  4 19:37:39 tdfoods sshd\[19515\]: Invalid user xbian from 5.89.35.84
Mar  4 19:37:39 tdfoods sshd\[19515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-35-84.cust.vodafonedsl.it
Mar  4 19:37:42 tdfoods sshd\[19515\]: Failed password for invalid user xbian from 5.89.35.84 port 56478 ssh2
Mar  4 19:46:28 tdfoods sshd\[20479\]: Invalid user kristofvps from 5.89.35.84
Mar  4 19:46:28 tdfoods sshd\[20479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-35-84.cust.vodafonedsl.it
2020-03-05 13:50:39
87.117.62.15 attack
1583384067 - 03/05/2020 05:54:27 Host: 87.117.62.15/87.117.62.15 Port: 445 TCP Blocked
2020-03-05 13:40:31
178.128.76.6 attackbots
2020-03-05T05:10:55.716832shield sshd\[9762\]: Invalid user test from 178.128.76.6 port 33218
2020-03-05T05:10:55.721204shield sshd\[9762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6
2020-03-05T05:10:57.476043shield sshd\[9762\]: Failed password for invalid user test from 178.128.76.6 port 33218 ssh2
2020-03-05T05:19:12.550720shield sshd\[10808\]: Invalid user jnode1 from 178.128.76.6 port 39648
2020-03-05T05:19:12.557536shield sshd\[10808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6
2020-03-05 13:40:11
118.114.254.70 attackbots
03/04/2020-23:54:52.231465 118.114.254.70 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-05 13:26:48
49.233.183.7 attack
Mar  5 06:28:20 ns381471 sshd[15133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.183.7
Mar  5 06:28:22 ns381471 sshd[15133]: Failed password for invalid user tssuser from 49.233.183.7 port 51774 ssh2
2020-03-05 13:39:13
111.230.141.189 attackbotsspam
2020-03-05T05:08:23.034820shield sshd\[9486\]: Invalid user wrchang from 111.230.141.189 port 51170
2020-03-05T05:08:23.042473shield sshd\[9486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.141.189
2020-03-05T05:08:25.263977shield sshd\[9486\]: Failed password for invalid user wrchang from 111.230.141.189 port 51170 ssh2
2020-03-05T05:15:14.319591shield sshd\[10434\]: Invalid user bliu from 111.230.141.189 port 60014
2020-03-05T05:15:14.324260shield sshd\[10434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.141.189
2020-03-05 13:32:11
106.54.20.26 attackbots
Mar  5 11:13:55 areeb-Workstation sshd[17301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.26 
Mar  5 11:13:56 areeb-Workstation sshd[17301]: Failed password for invalid user bitrix from 106.54.20.26 port 39454 ssh2
...
2020-03-05 13:56:32
185.53.88.59 attackspambots
[2020-03-05 00:57:15] NOTICE[1148][C-0000e2bf] chan_sip.c: Call from '' (185.53.88.59:62669) to extension '01146262229924' rejected because extension not found in context 'public'.
[2020-03-05 00:57:15] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-05T00:57:15.584-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146262229924",SessionID="0x7fd82c62bef8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.59/62669",ACLName="no_extension_match"
[2020-03-05 00:57:38] NOTICE[1148][C-0000e2c0] chan_sip.c: Call from '' (185.53.88.59:64034) to extension '01146346778565' rejected because extension not found in context 'public'.
[2020-03-05 00:57:38] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-05T00:57:38.614-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146346778565",SessionID="0x7fd82cb29a68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.
...
2020-03-05 13:59:53
45.76.183.3 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-03-05 13:43:29
201.205.137.34 attackspambots
Mar  5 05:54:56 debian-2gb-nbg1-2 kernel: \[5643267.595907\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=201.205.137.34 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=20546 PROTO=TCP SPT=33696 DPT=23 WINDOW=41860 RES=0x00 SYN URGP=0
2020-03-05 13:20:42
27.254.130.60 attack
Mar  5 00:10:56 plusreed sshd[22456]: Invalid user wuwei from 27.254.130.60
...
2020-03-05 13:35:25
112.215.172.212 attackbotsspam
1583384092 - 03/05/2020 05:54:52 Host: 112.215.172.212/112.215.172.212 Port: 445 TCP Blocked
2020-03-05 13:23:50
51.38.63.69 attackspam
[Thu Mar 05 07:54:56.434159 2020] [php7:error] [pid 17441] [client 51.38.63.69:47448] script '/var/www/html/wp-login.php' not found or unable to stat
...
2020-03-05 13:21:26

最近上报的IP列表

152.53.150.14 59.6.178.98 242.38.132.221 65.245.243.146
162.186.241.74 158.100.29.83 115.91.13.149 125.94.42.111
67.73.77.92 221.34.140.174 170.181.194.243 26.15.131.45
16.95.164.33 51.144.73.188 131.52.91.15 141.1.249.175
42.220.50.230 98.108.27.211 18.179.243.48 88.131.221.64