必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.8.223.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.8.223.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:53:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 142.223.8.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.223.8.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.89.69 attackbotsspam
Aug  2 05:31:30 vibhu-HP-Z238-Microtower-Workstation sshd\[29302\]: Invalid user oracle from 206.189.89.69
Aug  2 05:31:30 vibhu-HP-Z238-Microtower-Workstation sshd\[29302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.69
Aug  2 05:31:32 vibhu-HP-Z238-Microtower-Workstation sshd\[29302\]: Failed password for invalid user oracle from 206.189.89.69 port 34356 ssh2
Aug  2 05:36:32 vibhu-HP-Z238-Microtower-Workstation sshd\[29454\]: Invalid user oracle from 206.189.89.69
Aug  2 05:36:32 vibhu-HP-Z238-Microtower-Workstation sshd\[29454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.69
...
2019-08-02 08:13:59
51.83.78.109 attackbots
Aug  2 02:06:56 MK-Soft-Root1 sshd\[26442\]: Invalid user amd from 51.83.78.109 port 50162
Aug  2 02:06:56 MK-Soft-Root1 sshd\[26442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
Aug  2 02:06:58 MK-Soft-Root1 sshd\[26442\]: Failed password for invalid user amd from 51.83.78.109 port 50162 ssh2
...
2019-08-02 08:07:50
68.183.224.118 attack
Aug  1 19:43:05 plusreed sshd[9951]: Invalid user devhdfc from 68.183.224.118
...
2019-08-02 07:48:39
77.42.106.68 attackspam
Automatic report - Port Scan Attack
2019-08-02 08:10:37
58.144.151.45 attackbots
abuse-sasl
2019-08-02 08:18:06
189.7.129.60 attackbots
Aug  2 01:27:26 icinga sshd[20984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.129.60
Aug  2 01:27:29 icinga sshd[20984]: Failed password for invalid user correo from 189.7.129.60 port 35949 ssh2
...
2019-08-02 07:55:50
114.67.224.87 attack
2019-08-01T23:27:26.208914abusebot-6.cloudsearch.cf sshd\[24327\]: Invalid user factoria from 114.67.224.87 port 38000
2019-08-02 07:57:27
129.213.117.53 attackspam
Aug  2 01:52:29 dedicated sshd[7195]: Invalid user jessie from 129.213.117.53 port 41090
2019-08-02 08:05:51
104.196.7.246 attackbots
blogonese.net 104.196.7.246 \[02/Aug/2019:01:26:30 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 104.196.7.246 \[02/Aug/2019:01:26:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-02 08:24:46
121.100.28.199 attackspambots
Aug  2 01:23:34 vtv3 sshd\[9997\]: Invalid user mkt from 121.100.28.199 port 58356
Aug  2 01:23:34 vtv3 sshd\[9997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.100.28.199
Aug  2 01:23:36 vtv3 sshd\[9997\]: Failed password for invalid user mkt from 121.100.28.199 port 58356 ssh2
Aug  2 01:28:57 vtv3 sshd\[12714\]: Invalid user www from 121.100.28.199 port 53484
Aug  2 01:28:57 vtv3 sshd\[12714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.100.28.199
Aug  2 01:39:31 vtv3 sshd\[18373\]: Invalid user replicator from 121.100.28.199 port 43564
Aug  2 01:39:31 vtv3 sshd\[18373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.100.28.199
Aug  2 01:39:34 vtv3 sshd\[18373\]: Failed password for invalid user replicator from 121.100.28.199 port 43564 ssh2
Aug  2 01:44:56 vtv3 sshd\[21192\]: Invalid user angus from 121.100.28.199 port 38294
Aug  2 01:44:56 vtv3 sshd\[2119
2019-08-02 08:24:02
69.162.68.54 attackbots
Aug  2 01:26:35 ks10 sshd[4814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.162.68.54 
Aug  2 01:26:37 ks10 sshd[4814]: Failed password for invalid user azure from 69.162.68.54 port 45700 ssh2
...
2019-08-02 08:21:52
178.32.219.209 attackbotsspam
Aug  2 02:03:51 SilenceServices sshd[9688]: Failed password for root from 178.32.219.209 port 51510 ssh2
Aug  2 02:10:20 SilenceServices sshd[14393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.219.209
Aug  2 02:10:22 SilenceServices sshd[14393]: Failed password for invalid user Cisco from 178.32.219.209 port 45390 ssh2
2019-08-02 08:11:54
2800:810:498:18f:e55e:1598:4b4d:8e1c attackspam
C2,WP GET /wp-login.php
2019-08-02 08:14:34
106.13.37.253 attackspambots
Aug  2 00:14:39 localhost sshd\[58228\]: Invalid user samba from 106.13.37.253 port 54770
Aug  2 00:14:39 localhost sshd\[58228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.253
Aug  2 00:14:41 localhost sshd\[58228\]: Failed password for invalid user samba from 106.13.37.253 port 54770 ssh2
Aug  2 00:19:34 localhost sshd\[58350\]: Invalid user xue from 106.13.37.253 port 35258
Aug  2 00:19:34 localhost sshd\[58350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.253
...
2019-08-02 08:26:27
184.66.248.150 attack
2019-08-02T00:11:01.114640abusebot-7.cloudsearch.cf sshd\[8372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net  user=root
2019-08-02 08:22:07

最近上报的IP列表

60.95.50.191 187.53.68.162 255.125.15.89 38.136.209.74
46.210.101.193 59.96.2.140 192.157.212.53 33.88.178.203
208.108.223.93 159.86.200.3 161.228.18.85 91.106.72.174
45.106.94.8 117.44.193.75 34.175.169.250 4.103.65.70
58.78.155.109 134.141.70.129 12.255.113.27 124.97.40.93