必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.50.226.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.50.226.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 03:10:01 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 152.226.50.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.226.50.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.72 attack
Feb  9 11:01:38 eventyay sshd[11252]: Failed password for root from 49.88.112.72 port 54622 ssh2
Feb  9 11:02:32 eventyay sshd[11256]: Failed password for root from 49.88.112.72 port 60359 ssh2
...
2020-02-09 20:04:50
159.203.119.183 attackspambots
Feb  9 05:51:45 ws24vmsma01 sshd[139181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.119.183
Feb  9 05:51:47 ws24vmsma01 sshd[139181]: Failed password for invalid user gio from 159.203.119.183 port 38168 ssh2
...
2020-02-09 20:31:55
114.45.137.122 attack
unauthorized connection attempt
2020-02-09 20:44:03
129.28.188.21 attack
Failed password for invalid user dmr from 129.28.188.21 port 50956 ssh2
Invalid user pou from 129.28.188.21 port 44894
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.188.21
Failed password for invalid user pou from 129.28.188.21 port 44894 ssh2
Invalid user gap from 129.28.188.21 port 38836
2020-02-09 20:33:46
211.72.117.101 attackspam
Feb  9 10:11:35 ns381471 sshd[23534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.72.117.101
Feb  9 10:11:36 ns381471 sshd[23534]: Failed password for invalid user rum from 211.72.117.101 port 58754 ssh2
2020-02-09 20:36:32
113.252.119.201 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-09 20:44:55
171.110.123.41 attackspam
Feb  9 10:36:12 ns382633 sshd\[22366\]: Invalid user rzz from 171.110.123.41 port 46269
Feb  9 10:36:12 ns382633 sshd\[22366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.110.123.41
Feb  9 10:36:14 ns382633 sshd\[22366\]: Failed password for invalid user rzz from 171.110.123.41 port 46269 ssh2
Feb  9 10:58:13 ns382633 sshd\[26515\]: Invalid user ooz from 171.110.123.41 port 33361
Feb  9 10:58:13 ns382633 sshd\[26515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.110.123.41
2020-02-09 20:17:59
103.23.22.244 attack
[09/Feb/2020:05:48:51 +0100] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-02-09 20:19:40
85.132.100.24 attackbotsspam
Feb  9 13:42:00 MK-Soft-VM3 sshd[13580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.132.100.24 
Feb  9 13:42:02 MK-Soft-VM3 sshd[13580]: Failed password for invalid user hma from 85.132.100.24 port 38626 ssh2
...
2020-02-09 20:45:18
222.160.173.24 attack
23/tcp
[2020-02-09]1pkt
2020-02-09 20:26:52
182.184.122.221 attackbotsspam
Automatic report - Port Scan Attack
2020-02-09 20:13:32
193.8.138.38 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/193.8.138.38/ 
 
 CH - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CH 
 NAME ASN : ASN0 
 
 IP : 193.8.138.38 
 
 CIDR : 193.8.138.0/24 
 
 PREFIX COUNT : 50242 
 
 UNIQUE IP COUNT : 856039856 
 
 
 ATTACKS DETECTED ASN0 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-02-09 05:49:21 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-09 19:58:24
80.211.128.151 attack
Feb  9 07:31:48 game-panel sshd[31244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151
Feb  9 07:31:50 game-panel sshd[31244]: Failed password for invalid user ttk from 80.211.128.151 port 35754 ssh2
Feb  9 07:32:28 game-panel sshd[31289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.128.151
2020-02-09 20:27:25
3.1.6.2 attackspam
Feb  9 06:05:23 srv01 sshd[28432]: Invalid user tvw from 3.1.6.2 port 56296
Feb  9 06:05:23 srv01 sshd[28432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.1.6.2
Feb  9 06:05:23 srv01 sshd[28432]: Invalid user tvw from 3.1.6.2 port 56296
Feb  9 06:05:25 srv01 sshd[28432]: Failed password for invalid user tvw from 3.1.6.2 port 56296 ssh2
Feb  9 06:14:03 srv01 sshd[29043]: Invalid user iah from 3.1.6.2 port 52630
...
2020-02-09 20:28:02
99.29.90.25 attack
Feb  8 19:17:42 hpm sshd\[20073\]: Invalid user xsk from 99.29.90.25
Feb  8 19:17:42 hpm sshd\[20073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.29.90.25
Feb  8 19:17:44 hpm sshd\[20073\]: Failed password for invalid user xsk from 99.29.90.25 port 50935 ssh2
Feb  8 19:20:52 hpm sshd\[20456\]: Invalid user luh from 99.29.90.25
Feb  8 19:20:52 hpm sshd\[20456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.29.90.25
2020-02-09 20:35:30

最近上报的IP列表

151.91.228.79 18.18.35.53 18.87.105.62 169.174.46.100
50.15.123.179 123.92.5.217 37.7.30.202 118.120.79.108
50.2.25.146 166.55.103.199 28.44.31.13 21.123.148.136
104.207.249.243 165.241.176.50 238.89.153.252 64.75.147.231
108.73.16.55 237.185.187.205 38.243.166.100 52.92.25.121