必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.28.150.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.28.150.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:02:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 119.150.28.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.150.28.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.22.79.166 attackspambots
MYH,DEF GET /phpMyAdmin/index.php
2020-09-04 02:18:51
177.44.16.134 attack
Sep  2 11:42:57 mailman postfix/smtpd[2397]: warning: unknown[177.44.16.134]: SASL PLAIN authentication failed: authentication failure
2020-09-04 02:18:07
137.135.127.50 attack
*Port Scan* detected from 137.135.127.50 (US/United States/Virginia/Ashburn/-). 4 hits in the last 195 seconds
2020-09-04 02:55:17
193.112.27.122 attackbotsspam
Sep  2 18:33:23 v22019038103785759 sshd\[31193\]: Invalid user admin from 193.112.27.122 port 50848
Sep  2 18:33:23 v22019038103785759 sshd\[31193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.122
Sep  2 18:33:25 v22019038103785759 sshd\[31193\]: Failed password for invalid user admin from 193.112.27.122 port 50848 ssh2
Sep  2 18:42:08 v22019038103785759 sshd\[31947\]: Invalid user sig from 193.112.27.122 port 33466
Sep  2 18:42:08 v22019038103785759 sshd\[31947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.122
...
2020-09-04 02:39:35
116.212.152.207 attackbotsspam
Wed Sep  2 21:13:26 2020 [pid 20102] CONNECT: Client "116.212.152.207"
Wed Sep  2 21:13:27 2020 [pid 20101] [anonymous] FAIL LOGIN: Client "116.212.152.207"
Wed Sep  2 21:13:31 2020 [pid 20104] CONNECT: Client "116.212.152.207"
Wed Sep  2 21:13:33 2020 [pid 20106] CONNECT: Client "116.212.152.207"
...
2020-09-04 02:52:17
51.38.186.180 attackbots
Invalid user webadm from 51.38.186.180 port 54272
2020-09-04 02:48:58
193.70.0.42 attackbots
Failed password for invalid user lym from 193.70.0.42 port 37488 ssh2
2020-09-04 02:22:09
49.72.139.189 attackspam
Port Scan: TCP/443
2020-09-04 02:25:07
5.196.64.109 attackbotsspam
scanning for open ports and vulnerable services.
2020-09-04 02:39:06
218.92.0.165 attackspambots
Sep  3 14:44:27 NPSTNNYC01T sshd[8867]: Failed password for root from 218.92.0.165 port 63925 ssh2
Sep  3 14:44:40 NPSTNNYC01T sshd[8867]: Failed password for root from 218.92.0.165 port 63925 ssh2
Sep  3 14:44:43 NPSTNNYC01T sshd[8867]: Failed password for root from 218.92.0.165 port 63925 ssh2
Sep  3 14:44:43 NPSTNNYC01T sshd[8867]: error: maximum authentication attempts exceeded for root from 218.92.0.165 port 63925 ssh2 [preauth]
...
2020-09-04 02:49:33
84.247.50.238 attack
CMS (WordPress or Joomla) login attempt.
2020-09-04 02:56:11
119.29.161.236 attackspambots
Sep  3 15:18:38 ns3033917 sshd[30501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.161.236
Sep  3 15:18:38 ns3033917 sshd[30501]: Invalid user dns from 119.29.161.236 port 48076
Sep  3 15:18:40 ns3033917 sshd[30501]: Failed password for invalid user dns from 119.29.161.236 port 48076 ssh2
...
2020-09-04 02:40:20
14.248.83.163 attackbots
Bruteforce detected by fail2ban
2020-09-04 02:34:44
222.73.18.8 attackspambots
2020-09-03T20:17:54.247536n23.at sshd[508689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.18.8
2020-09-03T20:17:54.240357n23.at sshd[508689]: Invalid user chengyu from 222.73.18.8 port 41790
2020-09-03T20:17:56.850302n23.at sshd[508689]: Failed password for invalid user chengyu from 222.73.18.8 port 41790 ssh2
...
2020-09-04 02:28:24
69.172.94.25 attack
Port probing on unauthorized port 445
2020-09-04 02:20:51

最近上报的IP列表

19.22.63.51 168.32.32.1 51.25.141.197 41.76.97.211
2.61.93.13 224.76.44.123 231.4.226.147 178.97.109.65
65.17.19.251 32.31.143.210 91.81.249.42 167.115.142.92
175.105.48.5 178.118.203.160 125.246.42.36 2.170.237.233
29.103.145.112 40.169.186.239 154.179.139.234 233.47.195.152