必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.53.6.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.53.6.172.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:48:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 172.6.53.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.6.53.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.55.47.184 attack
Aug 21 09:58:09 *hidden* sshd[7852]: Failed password for invalid user arkserver from 106.55.47.184 port 33492 ssh2 Aug 21 10:09:24 *hidden* sshd[10029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.47.184 user=root Aug 21 10:09:26 *hidden* sshd[10029]: Failed password for *hidden* from 106.55.47.184 port 49334 ssh2
2020-08-23 05:30:04
81.198.117.110 attack
2020-08-22T20:29:52.297002abusebot-8.cloudsearch.cf sshd[8237]: Invalid user carlos from 81.198.117.110 port 50018
2020-08-22T20:29:52.302198abusebot-8.cloudsearch.cf sshd[8237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.198.117.110
2020-08-22T20:29:52.297002abusebot-8.cloudsearch.cf sshd[8237]: Invalid user carlos from 81.198.117.110 port 50018
2020-08-22T20:29:54.656611abusebot-8.cloudsearch.cf sshd[8237]: Failed password for invalid user carlos from 81.198.117.110 port 50018 ssh2
2020-08-22T20:33:33.965406abusebot-8.cloudsearch.cf sshd[8302]: Invalid user kamal from 81.198.117.110 port 59282
2020-08-22T20:33:33.974962abusebot-8.cloudsearch.cf sshd[8302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.198.117.110
2020-08-22T20:33:33.965406abusebot-8.cloudsearch.cf sshd[8302]: Invalid user kamal from 81.198.117.110 port 59282
2020-08-22T20:33:35.669487abusebot-8.cloudsearch.cf sshd[8302]: Fail
...
2020-08-23 05:25:05
73.195.75.247 attackbotsspam
2020-08-22T23:58:51.798484mail.standpoint.com.ua sshd[27567]: Failed password for developer from 73.195.75.247 port 52816 ssh2
2020-08-22T23:58:54.036430mail.standpoint.com.ua sshd[27567]: Failed password for developer from 73.195.75.247 port 52816 ssh2
2020-08-22T23:58:56.019784mail.standpoint.com.ua sshd[27567]: Failed password for developer from 73.195.75.247 port 52816 ssh2
2020-08-22T23:58:58.277674mail.standpoint.com.ua sshd[27567]: Failed password for developer from 73.195.75.247 port 52816 ssh2
2020-08-22T23:59:01.158572mail.standpoint.com.ua sshd[27567]: Failed password for developer from 73.195.75.247 port 52816 ssh2
...
2020-08-23 05:23:35
90.145.172.213 attackspam
Aug 22 22:28:37 abendstille sshd\[18123\]: Invalid user trackmania from 90.145.172.213
Aug 22 22:28:37 abendstille sshd\[18123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.145.172.213
Aug 22 22:28:39 abendstille sshd\[18123\]: Failed password for invalid user trackmania from 90.145.172.213 port 56140 ssh2
Aug 22 22:33:21 abendstille sshd\[22418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.145.172.213  user=root
Aug 22 22:33:23 abendstille sshd\[22418\]: Failed password for root from 90.145.172.213 port 36086 ssh2
...
2020-08-23 05:31:35
106.53.238.111 attackbotsspam
Invalid user tyy from 106.53.238.111 port 33076
2020-08-23 05:37:55
172.105.89.161 attack
HyperBro Command and Control Traffic Detection
2020-08-23 05:55:45
106.52.42.153 attackspam
Aug 23 02:17:33 gw1 sshd[23205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.42.153
Aug 23 02:17:35 gw1 sshd[23205]: Failed password for invalid user tdi from 106.52.42.153 port 53252 ssh2
...
2020-08-23 05:42:56
174.138.42.143 attackspam
Invalid user admin from 174.138.42.143 port 35190
2020-08-23 05:33:28
185.234.219.12 attackspam
Aug 22 22:33:34 h2829583 postfix/smtpd[18488]: lost connection after EHLO from unknown[185.234.219.12]
Aug 22 22:37:35 h2829583 postfix/smtpd[18510]: lost connection after EHLO from unknown[185.234.219.12]
2020-08-23 05:38:45
200.114.236.19 attackspambots
Aug 22 23:43:53 mout sshd[25685]: Invalid user ssl from 200.114.236.19 port 58027
2020-08-23 05:56:59
180.97.182.226 attackbots
Aug 22 21:12:16 rush sshd[30334]: Failed password for root from 180.97.182.226 port 60324 ssh2
Aug 22 21:15:01 rush sshd[30403]: Failed password for root from 180.97.182.226 port 47910 ssh2
...
2020-08-23 05:20:42
178.32.197.90 attackbotsspam
Aug 7 08:09:27 *hidden* postfix/postscreen[31701]: DNSBL rank 4 for [178.32.197.90]:33367
2020-08-23 05:53:24
185.234.216.66 attackbots
Aug 11 14:56:26 *hidden* postfix/postscreen[18556]: DNSBL rank 4 for [185.234.216.66]:65425
2020-08-23 05:47:20
159.65.11.115 attackbots
Aug 22 17:31:27 NPSTNNYC01T sshd[17411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115
Aug 22 17:31:29 NPSTNNYC01T sshd[17411]: Failed password for invalid user janice from 159.65.11.115 port 44398 ssh2
Aug 22 17:35:41 NPSTNNYC01T sshd[17848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115
...
2020-08-23 05:42:31
197.165.161.19 attack
Aug 22 22:33:21 ns382633 sshd\[28766\]: Invalid user pi from 197.165.161.19 port 48390
Aug 22 22:33:21 ns382633 sshd\[28768\]: Invalid user pi from 197.165.161.19 port 48392
Aug 22 22:33:21 ns382633 sshd\[28766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.161.19
Aug 22 22:33:21 ns382633 sshd\[28768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.161.19
Aug 22 22:33:23 ns382633 sshd\[28766\]: Failed password for invalid user pi from 197.165.161.19 port 48390 ssh2
Aug 22 22:33:23 ns382633 sshd\[28768\]: Failed password for invalid user pi from 197.165.161.19 port 48392 ssh2
2020-08-23 05:36:33

最近上报的IP列表

135.247.174.232 128.33.184.104 124.7.87.184 77.94.150.53
65.73.46.108 130.175.67.35 185.45.78.21 172.75.32.238
163.239.17.148 82.254.155.227 38.51.120.134 213.222.195.212
221.252.210.153 210.17.72.32 41.139.34.13 96.63.39.114
132.233.245.171 239.92.241.103 99.54.177.129 208.90.60.132