必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.45.70.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.45.70.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:39:00 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 28.70.45.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.70.45.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.201.224.220 attackbots
[24/Jun/2019:02:20:42 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)"
[24/Jun/2019:02:20:58 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)"
2019-06-24 09:19:56
61.160.190.45 attackspam
$f2bV_matches
2019-06-24 08:51:29
78.154.187.113 attackbots
3389BruteforceFW21
2019-06-24 09:09:15
106.51.50.206 attack
Jun 23 13:14:39 *** sshd[21437]: Failed password for invalid user xm from 106.51.50.206 port 43866 ssh2
Jun 23 13:18:33 *** sshd[21454]: Failed password for invalid user admin from 106.51.50.206 port 52050 ssh2
Jun 23 13:20:04 *** sshd[21464]: Failed password for invalid user broke from 106.51.50.206 port 37776 ssh2
Jun 23 13:21:36 *** sshd[21499]: Failed password for invalid user user from 106.51.50.206 port 51730 ssh2
Jun 23 13:23:00 *** sshd[21531]: Failed password for invalid user adm from 106.51.50.206 port 37456 ssh2
Jun 23 13:24:29 *** sshd[21562]: Failed password for invalid user francine from 106.51.50.206 port 51410 ssh2
Jun 23 13:25:55 *** sshd[21572]: Failed password for invalid user jira from 106.51.50.206 port 37132 ssh2
Jun 23 13:27:18 *** sshd[21580]: Failed password for invalid user david from 106.51.50.206 port 51090 ssh2
Jun 23 13:28:42 *** sshd[21585]: Failed password for invalid user salome from 106.51.50.206 port 36816 ssh2
Jun 23 13:30:12 *** sshd[21596]: Failed password for invalid use
2019-06-24 08:34:40
162.249.236.55 attack
3389BruteforceFW21
2019-06-24 09:04:57
185.195.201.148 attackbots
Sun 23 14:04:13 11211/tcp
2019-06-24 08:33:00
113.190.193.212 attack
Jun 23 11:29:15 *** sshd[20444]: Failed password for invalid user admin from 113.190.193.212 port 33006 ssh2
2019-06-24 08:32:08
185.176.27.14 attackbots
firewall-block, port(s): 14292/tcp, 14293/tcp
2019-06-24 08:34:14
191.115.24.172 attackspam
firewall-block, port(s): 80/tcp
2019-06-24 08:40:58
59.110.152.52 attackspam
firewall-block, port(s): 1433/tcp, 7002/tcp, 9200/tcp
2019-06-24 08:50:50
199.249.230.100 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.100  user=root
Failed password for root from 199.249.230.100 port 64938 ssh2
Failed password for root from 199.249.230.100 port 64938 ssh2
Failed password for root from 199.249.230.100 port 64938 ssh2
Failed password for root from 199.249.230.100 port 64938 ssh2
2019-06-24 08:40:37
112.30.117.22 attackbots
Jun 23 14:57:58 *** sshd[22445]: Failed password for invalid user jeanmarc from 112.30.117.22 port 34566 ssh2
2019-06-24 08:33:32
162.241.181.222 attack
8886/tcp 220/tcp 7000/tcp...
[2019-06-17/23]32pkt,10pt.(tcp)
2019-06-24 09:06:40
134.209.153.100 attackspambots
Jun 19 16:12:35 h2034429 sshd[12395]: Invalid user test from 134.209.153.100
Jun 19 16:12:35 h2034429 sshd[12395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.153.100
Jun 19 16:12:37 h2034429 sshd[12395]: Failed password for invalid user test from 134.209.153.100 port 41050 ssh2
Jun 19 16:12:37 h2034429 sshd[12395]: Received disconnect from 134.209.153.100 port 41050:11: Bye Bye [preauth]
Jun 19 16:12:37 h2034429 sshd[12395]: Disconnected from 134.209.153.100 port 41050 [preauth]
Jun 19 16:29:37 h2034429 sshd[12622]: Invalid user user from 134.209.153.100
Jun 19 16:29:37 h2034429 sshd[12622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.153.100
Jun 19 16:29:39 h2034429 sshd[12622]: Failed password for invalid user user from 134.209.153.100 port 60914 ssh2
Jun 19 16:29:39 h2034429 sshd[12622]: Received disconnect from 134.209.153.100 port 60914:11: Bye Bye [preauth]
Jun........
-------------------------------
2019-06-24 09:05:27
129.204.25.212 attackspambots
Joomla HTTP User Agent Object Injection Vulnerability
2019-06-24 08:41:42

最近上报的IP列表

72.254.235.147 187.59.107.109 230.71.171.117 58.40.248.18
70.98.159.73 222.238.79.122 252.113.127.190 163.149.0.140
185.222.195.106 191.241.7.248 25.30.96.116 165.159.63.229
224.108.102.100 168.140.242.191 19.255.82.39 225.40.99.157
81.73.27.109 88.159.109.244 159.26.170.81 136.127.255.185