必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.21.74.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.21.74.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 08:07:53 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 45.74.21.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.74.21.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.188.62.5 attackspambots
21/tcp...
[2019-05-17/07-03]41pkt,2pt.(tcp)
2019-07-03 17:51:44
35.228.156.146 attackbotsspam
2019-07-03T09:04:40.395314abusebot-8.cloudsearch.cf sshd\[4482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.156.228.35.bc.googleusercontent.com  user=root
2019-07-03 18:21:43
125.104.204.235 attackspam
445/tcp
[2019-07-03]1pkt
2019-07-03 18:16:27
203.118.57.21 attack
Jul  3 10:15:02 icinga sshd[27524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.118.57.21
Jul  3 10:15:04 icinga sshd[27524]: Failed password for invalid user wwwroot from 203.118.57.21 port 33868 ssh2
...
2019-07-03 17:53:20
106.251.169.200 attackbotsspam
Jul  3 10:13:20 dedicated sshd[19755]: Invalid user lv from 106.251.169.200 port 35086
2019-07-03 18:15:49
23.88.228.224 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 03:40:28,798 INFO [shellcode_manager] (23.88.228.224) no match, writing hexdump (65b75d32adf0540926294119ca1a454f :2397270) - MS17010 (EternalBlue)
2019-07-03 17:50:36
203.160.63.180 attackspam
Jul  1 20:51:05 xb3 sshd[10305]: reveeclipse mapping checking getaddrinfo for 180.sub-63-160-203.hanastar.net.id [203.160.63.180] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  1 20:51:07 xb3 sshd[10305]: Failed password for invalid user web from 203.160.63.180 port 42050 ssh2
Jul  1 20:51:07 xb3 sshd[10305]: Received disconnect from 203.160.63.180: 11: Bye Bye [preauth]
Jul  1 20:53:37 xb3 sshd[16163]: reveeclipse mapping checking getaddrinfo for 180.sub-63-160-203.hanastar.net.id [203.160.63.180] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  1 20:53:39 xb3 sshd[16163]: Failed password for invalid user test from 203.160.63.180 port 54071 ssh2
Jul  1 20:53:39 xb3 sshd[16163]: Received disconnect from 203.160.63.180: 11: Bye Bye [preauth]
Jul  1 20:55:23 xb3 sshd[6250]: reveeclipse mapping checking getaddrinfo for 180.sub-63-160-203.hanastar.net.id [203.160.63.180] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  1 20:55:25 xb3 sshd[6250]: Failed password for invalid user dw from 203.160.6........
-------------------------------
2019-07-03 18:37:13
81.22.45.32 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-03 18:34:45
218.92.0.207 attack
Jul  3 00:26:58 plusreed sshd[8563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
Jul  3 00:27:00 plusreed sshd[8563]: Failed password for root from 218.92.0.207 port 63402 ssh2
...
2019-07-03 18:12:02
24.37.196.182 attackspam
SSH Bruteforce Attack
2019-07-03 18:38:33
139.59.14.210 attack
2019-07-03T08:46:14.315456scmdmz1 sshd\[28954\]: Invalid user magic from 139.59.14.210 port 45002
2019-07-03T08:46:14.318484scmdmz1 sshd\[28954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.14.210
2019-07-03T08:46:16.252424scmdmz1 sshd\[28954\]: Failed password for invalid user magic from 139.59.14.210 port 45002 ssh2
...
2019-07-03 17:46:57
176.58.182.12 attack
23/tcp
[2019-07-03]1pkt
2019-07-03 18:39:12
113.175.4.229 attackspam
445/tcp
[2019-07-03]1pkt
2019-07-03 18:18:02
213.98.181.220 attackbotsspam
Jul  3 05:47:01 lnxmysql61 sshd[14750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.98.181.220
2019-07-03 18:02:15
192.171.91.239 attackbots
Looking for resource vulnerabilities
2019-07-03 18:23:43

最近上报的IP列表

179.78.198.252 217.8.131.7 229.217.237.97 149.53.182.1
149.208.15.113 42.61.215.137 93.195.45.228 43.194.197.239
218.52.59.206 238.250.111.243 153.12.67.119 52.43.91.53
15.14.178.57 255.135.216.255 117.97.194.40 49.21.13.207
214.173.76.117 153.166.253.0 199.200.250.202 123.174.10.111