必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.251.5.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.251.5.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 23:23:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 142.5.251.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.5.251.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.132.9.115 attackbots
Dec 19 15:35:59 debian-2gb-nbg1-2 kernel: \[418927.082818\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=117.132.9.115 DST=195.201.40.59 LEN=40 TOS=0x04 PREC=0x00 TTL=239 ID=40542 PROTO=TCP SPT=50841 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-20 02:02:25
180.250.210.133 attackspam
Invalid user ubuntu from 180.250.210.133 port 46800
2019-12-20 02:18:56
142.93.174.86 attackspam
142.93.174.86 - - \[19/Dec/2019:15:35:23 +0100\] "POST /wp-login.php HTTP/1.0" 200 7612 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.174.86 - - \[19/Dec/2019:15:35:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 7437 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.174.86 - - \[19/Dec/2019:15:35:25 +0100\] "POST /wp-login.php HTTP/1.0" 200 7432 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-20 02:31:09
23.254.203.91 attack
2019-12-19T17:29:20.749323shield sshd\[28843\]: Invalid user ghartey from 23.254.203.91 port 56426
2019-12-19T17:29:20.753639shield sshd\[28843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-623525.hostwindsdns.com
2019-12-19T17:29:22.914995shield sshd\[28843\]: Failed password for invalid user ghartey from 23.254.203.91 port 56426 ssh2
2019-12-19T17:36:58.545252shield sshd\[31212\]: Invalid user server from 23.254.203.91 port 59314
2019-12-19T17:36:58.549688shield sshd\[31212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-623525.hostwindsdns.com
2019-12-20 02:01:29
222.186.173.142 attack
" "
2019-12-20 02:10:54
112.85.42.174 attackbots
frenzy
2019-12-20 02:02:44
218.31.33.34 attackbotsspam
Dec 19 06:35:31 auw2 sshd\[31340\]: Invalid user cos from 218.31.33.34
Dec 19 06:35:31 auw2 sshd\[31340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.31.33.34
Dec 19 06:35:33 auw2 sshd\[31340\]: Failed password for invalid user cos from 218.31.33.34 port 39264 ssh2
Dec 19 06:43:34 auw2 sshd\[32326\]: Invalid user sparrows from 218.31.33.34
Dec 19 06:43:34 auw2 sshd\[32326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.31.33.34
2019-12-20 02:09:34
200.9.28.10 attackbotsspam
$f2bV_matches
2019-12-20 02:17:39
149.202.115.157 attackbots
Dec 19 18:32:56 MK-Soft-VM5 sshd[1094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.115.157 
Dec 19 18:32:59 MK-Soft-VM5 sshd[1094]: Failed password for invalid user fransioli from 149.202.115.157 port 54704 ssh2
...
2019-12-20 02:27:43
187.18.115.25 attack
Dec 19 19:29:37 server sshd\[480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r244-pw-boavista.ibys.com.br  user=root
Dec 19 19:29:40 server sshd\[480\]: Failed password for root from 187.18.115.25 port 41195 ssh2
Dec 19 19:38:34 server sshd\[2888\]: Invalid user backup from 187.18.115.25
Dec 19 19:38:34 server sshd\[2888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r244-pw-boavista.ibys.com.br 
Dec 19 19:38:35 server sshd\[2888\]: Failed password for invalid user backup from 187.18.115.25 port 50165 ssh2
...
2019-12-20 02:35:55
54.38.36.210 attackbots
SSH Brute Force, server-1 sshd[24007]: Failed password for root from 54.38.36.210 port 57180 ssh2
2019-12-20 02:10:20
69.94.143.194 attackbots
Dec 19 16:37:32 grey postfix/smtpd\[23251\]: NOQUEUE: reject: RCPT from stile.nabhaa.com\[69.94.143.194\]: 554 5.7.1 Service unavailable\; Client host \[69.94.143.194\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.143.194\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-20 02:32:46
202.88.246.161 attack
Dec 19 11:59:16 linuxvps sshd\[48319\]: Invalid user trelle from 202.88.246.161
Dec 19 11:59:16 linuxvps sshd\[48319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.246.161
Dec 19 11:59:17 linuxvps sshd\[48319\]: Failed password for invalid user trelle from 202.88.246.161 port 45069 ssh2
Dec 19 12:06:04 linuxvps sshd\[52878\]: Invalid user khamdy from 202.88.246.161
Dec 19 12:06:04 linuxvps sshd\[52878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.246.161
2019-12-20 02:30:24
51.15.99.106 attackspambots
2019-12-19T14:35:55.446687homeassistant sshd[24594]: Invalid user jurak from 51.15.99.106 port 43770
2019-12-19T14:35:55.457185homeassistant sshd[24594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.99.106
...
2019-12-20 02:08:37
51.75.126.115 attackspam
2019-12-18 23:59:35 server sshd[77418]: Failed password for invalid user both from 51.75.126.115 port 60902 ssh2
2019-12-20 02:19:28

最近上报的IP列表

92.89.148.219 9.118.254.17 74.25.62.224 199.139.14.193
229.164.199.115 179.41.161.166 237.252.216.90 135.54.199.91
118.102.73.243 134.190.107.172 215.159.30.180 24.99.105.152
141.192.227.216 162.105.254.224 239.92.105.246 227.211.94.77
25.234.186.107 163.205.229.25 207.105.252.182 224.33.86.96