必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.30.189.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.30.189.238.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 10:02:40 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 238.189.30.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.189.30.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.219.171 attackbots
Oct 28 15:44:58 ny01 sshd[13019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.219.171
Oct 28 15:45:00 ny01 sshd[13019]: Failed password for invalid user webmail from 106.13.219.171 port 48692 ssh2
Oct 28 15:49:48 ny01 sshd[13453]: Failed password for root from 106.13.219.171 port 57410 ssh2
2019-10-29 04:01:32
0.0.27.89 attack
www.goldgier.de 2400:6180:0:d1::87a:7001 \[28/Oct/2019:21:12:08 +0100\] "POST /wp-login.php HTTP/1.1" 200 6197 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.goldgier.de 2400:6180:0:d1::87a:7001 \[28/Oct/2019:21:12:08 +0100\] "POST /wp-login.php HTTP/1.1" 200 6196 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-29 04:18:56
125.224.243.80 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/125.224.243.80/ 
 
 TW - 1H : (226)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 125.224.243.80 
 
 CIDR : 125.224.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 19 
  3H - 80 
  6H - 174 
 12H - 183 
 24H - 219 
 
 DateTime : 2019-10-28 21:12:05 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-29 04:22:09
103.85.63.253 attackbots
SSH auth scanning - multiple failed logins
2019-10-29 04:18:44
173.220.206.162 attackspambots
Invalid user user from 173.220.206.162 port 24515
2019-10-29 04:12:11
41.160.119.218 attack
Oct 28 14:37:58 vmanager6029 sshd\[24982\]: Invalid user camping from 41.160.119.218 port 43758
Oct 28 14:37:58 vmanager6029 sshd\[24982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.160.119.218
Oct 28 14:38:00 vmanager6029 sshd\[24982\]: Failed password for invalid user camping from 41.160.119.218 port 43758 ssh2
2019-10-29 04:07:09
218.206.233.198 attack
2019-10-28 23:11:57 dovecot_login authenticator failed for (95.216.208.141) [218.206.233.198]: 535 Incorrect authentication data (set_id=nologin)
2019-10-28 23:12:05 dovecot_login authenticator failed for (95.216.208.141) [218.206.233.198]: 535 Incorrect authentication data (set_id=jeremy)
...
2019-10-29 04:22:59
203.195.178.83 attackbots
Oct 28 21:22:01 microserver sshd[10438]: Failed password for root from 203.195.178.83 port 56118 ssh2
Oct 28 21:27:11 microserver sshd[11072]: Invalid user test0 from 203.195.178.83 port 29739
Oct 28 21:27:11 microserver sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.178.83
Oct 28 21:27:13 microserver sshd[11072]: Failed password for invalid user test0 from 203.195.178.83 port 29739 ssh2
Oct 28 21:38:38 microserver sshd[12403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.178.83  user=root
Oct 28 21:38:40 microserver sshd[12403]: Failed password for root from 203.195.178.83 port 41050 ssh2
Oct 28 21:43:38 microserver sshd[13042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.178.83  user=root
Oct 28 21:43:40 microserver sshd[13042]: Failed password for root from 203.195.178.83 port 14657 ssh2
Oct 28 21:48:35 microserver sshd[13656]: pam_unix(sshd:au
2019-10-29 04:23:28
211.253.10.96 attackbotsspam
$f2bV_matches
2019-10-29 04:03:54
182.61.61.222 attackspam
Oct 29 01:15:01 gw1 sshd[21298]: Failed password for root from 182.61.61.222 port 56822 ssh2
...
2019-10-29 04:27:39
112.254.36.112 attack
Unauthorised access (Oct 28) SRC=112.254.36.112 LEN=40 TTL=49 ID=47738 TCP DPT=8080 WINDOW=7605 SYN 
Unauthorised access (Oct 28) SRC=112.254.36.112 LEN=40 TTL=49 ID=56810 TCP DPT=8080 WINDOW=26317 SYN 
Unauthorised access (Oct 28) SRC=112.254.36.112 LEN=40 TTL=49 ID=45469 TCP DPT=8080 WINDOW=26317 SYN 
Unauthorised access (Oct 27) SRC=112.254.36.112 LEN=40 TTL=49 ID=63649 TCP DPT=8080 WINDOW=40989 SYN 
Unauthorised access (Oct 27) SRC=112.254.36.112 LEN=40 TTL=49 ID=62359 TCP DPT=8080 WINDOW=40989 SYN 
Unauthorised access (Oct 27) SRC=112.254.36.112 LEN=40 TTL=49 ID=22069 TCP DPT=8080 WINDOW=7605 SYN 
Unauthorised access (Oct 27) SRC=112.254.36.112 LEN=40 TTL=49 ID=27491 TCP DPT=8080 WINDOW=26317 SYN
2019-10-29 04:25:16
187.218.30.86 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/187.218.30.86/ 
 
 MX - 1H : (106)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : MX 
 NAME ASN : ASN8151 
 
 IP : 187.218.30.86 
 
 CIDR : 187.218.24.0/21 
 
 PREFIX COUNT : 6397 
 
 UNIQUE IP COUNT : 13800704 
 
 
 ATTACKS DETECTED ASN8151 :  
  1H - 2 
  3H - 11 
  6H - 19 
 12H - 46 
 24H - 93 
 
 DateTime : 2019-10-28 12:46:35 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-29 03:58:25
118.97.140.237 attackspam
Oct 28 13:49:02 nextcloud sshd\[1757\]: Invalid user Isaac1@3 from 118.97.140.237
Oct 28 13:49:02 nextcloud sshd\[1757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.140.237
Oct 28 13:49:03 nextcloud sshd\[1757\]: Failed password for invalid user Isaac1@3 from 118.97.140.237 port 43452 ssh2
...
2019-10-29 03:50:13
49.232.171.28 attack
Oct 28 20:08:54 www sshd\[24337\]: Invalid user asdf1234 from 49.232.171.28Oct 28 20:08:56 www sshd\[24337\]: Failed password for invalid user asdf1234 from 49.232.171.28 port 49396 ssh2Oct 28 20:12:02 www sshd\[24383\]: Invalid user warren from 49.232.171.28
...
2019-10-29 04:13:04
94.177.197.77 attackspambots
Oct 28 20:21:49 v22018076622670303 sshd\[14055\]: Invalid user 120469 from 94.177.197.77 port 53666
Oct 28 20:21:49 v22018076622670303 sshd\[14055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.197.77
Oct 28 20:21:51 v22018076622670303 sshd\[14055\]: Failed password for invalid user 120469 from 94.177.197.77 port 53666 ssh2
...
2019-10-29 04:11:26

最近上报的IP列表

210.252.198.58 99.48.70.167 8.222.87.11 127.55.106.133
126.181.219.237 14.57.217.24 97.101.222.239 47.127.104.233
28.97.28.218 24.16.176.193 253.88.192.198 197.74.77.171
22.119.196.202 136.134.120.1 4.121.86.104 174.234.59.199
124.71.120.208 16.218.190.165 193.67.4.101 212.225.175.45