必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.49.246.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.49.246.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:50:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 80.246.49.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.246.49.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.205.68.2 attackbotsspam
Apr 12 06:02:19 v22019038103785759 sshd\[15601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2  user=root
Apr 12 06:02:21 v22019038103785759 sshd\[15601\]: Failed password for root from 103.205.68.2 port 33326 ssh2
Apr 12 06:06:54 v22019038103785759 sshd\[15847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2  user=root
Apr 12 06:06:56 v22019038103785759 sshd\[15847\]: Failed password for root from 103.205.68.2 port 41874 ssh2
Apr 12 06:11:40 v22019038103785759 sshd\[16222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2  user=root
...
2020-04-12 14:23:59
123.121.10.231 attackbotsspam
Apr 12 05:52:29 [host] sshd[1298]: pam_unix(sshd:a
Apr 12 05:52:30 [host] sshd[1298]: Failed password
Apr 12 05:55:27 [host] sshd[1364]: pam_unix(sshd:a
2020-04-12 14:37:58
51.77.146.153 attackspambots
2020-04-12T08:37:14.514199vps773228.ovh.net sshd[11941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-77-146.eu
2020-04-12T08:37:14.497393vps773228.ovh.net sshd[11941]: Invalid user hduser from 51.77.146.153 port 39922
2020-04-12T08:37:16.443169vps773228.ovh.net sshd[11941]: Failed password for invalid user hduser from 51.77.146.153 port 39922 ssh2
2020-04-12T08:40:57.341511vps773228.ovh.net sshd[13337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-77-146.eu  user=root
2020-04-12T08:40:59.219850vps773228.ovh.net sshd[13337]: Failed password for root from 51.77.146.153 port 46778 ssh2
...
2020-04-12 14:57:02
164.132.108.195 attackbotsspam
(sshd) Failed SSH login from 164.132.108.195 (FR/France/-/-/195.ip-164-132-108.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs
2020-04-12 14:56:03
198.98.54.28 attack
Invalid user admin from 198.98.54.28 port 58006
2020-04-12 14:24:47
62.210.219.124 attackspambots
Apr 12 08:16:53 nextcloud sshd\[22485\]: Invalid user nishiyama from 62.210.219.124
Apr 12 08:16:53 nextcloud sshd\[22485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.219.124
Apr 12 08:16:55 nextcloud sshd\[22485\]: Failed password for invalid user nishiyama from 62.210.219.124 port 50754 ssh2
2020-04-12 15:05:29
61.95.233.61 attackbotsspam
Apr 12 08:00:43 markkoudstaal sshd[23376]: Failed password for root from 61.95.233.61 port 42990 ssh2
Apr 12 08:05:06 markkoudstaal sshd[24017]: Failed password for root from 61.95.233.61 port 49626 ssh2
2020-04-12 14:23:35
103.133.26.55 attackbotsspam
Automatic report - XMLRPC Attack
2020-04-12 14:57:50
222.186.175.163 attackspambots
Apr 12 09:40:10 ift sshd\[58984\]: Failed password for root from 222.186.175.163 port 32832 ssh2Apr 12 09:40:21 ift sshd\[58984\]: Failed password for root from 222.186.175.163 port 32832 ssh2Apr 12 09:40:25 ift sshd\[58984\]: Failed password for root from 222.186.175.163 port 32832 ssh2Apr 12 09:40:35 ift sshd\[59236\]: Failed password for root from 222.186.175.163 port 12396 ssh2Apr 12 09:40:38 ift sshd\[59236\]: Failed password for root from 222.186.175.163 port 12396 ssh2
...
2020-04-12 14:42:44
66.249.79.145 attack
404 NOT FOUND
2020-04-12 14:47:54
49.145.230.1 attack
Netflix hacker
2020-04-12 15:02:13
142.44.218.192 attack
IP blocked
2020-04-12 14:53:55
106.13.147.89 attack
SSH brute force attempt
2020-04-12 15:01:13
45.143.220.209 attackbots
[2020-04-12 02:51:35] NOTICE[12114][C-00004bf9] chan_sip.c: Call from '' (45.143.220.209:56906) to extension '011441205804657' rejected because extension not found in context 'public'.
[2020-04-12 02:51:35] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T02:51:35.221-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441205804657",SessionID="0x7f020c088288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.209/56906",ACLName="no_extension_match"
[2020-04-12 02:52:22] NOTICE[12114][C-00004bfa] chan_sip.c: Call from '' (45.143.220.209:56384) to extension '9011441205804657' rejected because extension not found in context 'public'.
[2020-04-12 02:52:22] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T02:52:22.577-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441205804657",SessionID="0x7f020c088288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="
...
2020-04-12 14:59:52
78.128.113.98 attack
Unauthorized connection attempt from IP address 78.128.113.98 on port 465
2020-04-12 15:01:45

最近上报的IP列表

35.141.241.120 61.33.209.203 93.180.78.36 30.101.102.196
49.25.193.170 85.1.232.93 24.70.84.21 83.236.85.175
186.165.188.0 226.123.130.192 46.187.82.64 181.31.87.244
20.103.111.227 147.160.219.17 24.144.44.220 65.94.60.35
173.0.216.222 47.61.95.36 104.162.244.217 20.187.104.1