必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.81.140.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.81.140.207.			IN	A

;; AUTHORITY SECTION:
.			375	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 21:07:10 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 207.140.81.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.140.81.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.101.72.145 attackbots
Aug 29 01:42:50 wbs sshd\[7677\]: Invalid user admin from 46.101.72.145
Aug 29 01:42:50 wbs sshd\[7677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kallealanen.fi
Aug 29 01:42:51 wbs sshd\[7677\]: Failed password for invalid user admin from 46.101.72.145 port 36030 ssh2
Aug 29 01:48:43 wbs sshd\[8300\]: Invalid user web from 46.101.72.145
Aug 29 01:48:43 wbs sshd\[8300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kallealanen.fi
2019-08-29 19:48:58
23.129.64.169 attackspam
Automated report - ssh fail2ban:
Aug 29 11:54:54 wrong password, user=root, port=64107, ssh2
Aug 29 11:54:58 wrong password, user=root, port=64107, ssh2
Aug 29 11:55:02 wrong password, user=root, port=64107, ssh2
Aug 29 11:55:07 wrong password, user=root, port=64107, ssh2
2019-08-29 19:56:03
122.248.38.28 attackbotsspam
Unauthorized SSH login attempts
2019-08-29 19:29:00
211.93.7.46 attackbots
2019-08-29T11:25:12.326389abusebot-7.cloudsearch.cf sshd\[25027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.93.7.46  user=root
2019-08-29 19:36:15
167.71.217.54 attackbotsspam
Aug 29 13:06:32 apollo sshd\[32272\]: Invalid user erich from 167.71.217.54Aug 29 13:06:34 apollo sshd\[32272\]: Failed password for invalid user erich from 167.71.217.54 port 37960 ssh2Aug 29 13:22:02 apollo sshd\[32356\]: Invalid user qin from 167.71.217.54
...
2019-08-29 19:25:38
186.213.202.109 attack
Aug 29 15:07:54 www sshd\[185483\]: Invalid user 123456 from 186.213.202.109
Aug 29 15:07:54 www sshd\[185483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.213.202.109
Aug 29 15:07:56 www sshd\[185483\]: Failed password for invalid user 123456 from 186.213.202.109 port 57721 ssh2
...
2019-08-29 20:08:41
163.172.61.214 attackspambots
Aug 29 11:27:42 ncomp sshd[11704]: Invalid user viktor from 163.172.61.214
Aug 29 11:27:42 ncomp sshd[11704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.61.214
Aug 29 11:27:42 ncomp sshd[11704]: Invalid user viktor from 163.172.61.214
Aug 29 11:27:44 ncomp sshd[11704]: Failed password for invalid user viktor from 163.172.61.214 port 48864 ssh2
2019-08-29 19:42:36
43.225.108.51 attack
WordPress login Brute force / Web App Attack on client site.
2019-08-29 19:32:40
46.229.168.137 attack
SQL Injection
2019-08-29 19:57:56
213.108.216.27 attackbots
SSH bruteforce (Triggered fail2ban)
2019-08-29 19:27:19
162.243.98.66 attackbots
Aug 28 23:55:13 auw2 sshd\[31720\]: Invalid user web from 162.243.98.66
Aug 28 23:55:13 auw2 sshd\[31720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.98.66
Aug 28 23:55:14 auw2 sshd\[31720\]: Failed password for invalid user web from 162.243.98.66 port 57143 ssh2
Aug 28 23:59:07 auw2 sshd\[32087\]: Invalid user mikael from 162.243.98.66
Aug 28 23:59:07 auw2 sshd\[32087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.98.66
2019-08-29 19:37:35
148.70.71.137 attack
Aug 29 01:16:57 hanapaa sshd\[18063\]: Invalid user arma from 148.70.71.137
Aug 29 01:16:57 hanapaa sshd\[18063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.71.137
Aug 29 01:16:59 hanapaa sshd\[18063\]: Failed password for invalid user arma from 148.70.71.137 port 46457 ssh2
Aug 29 01:22:18 hanapaa sshd\[18511\]: Invalid user dd from 148.70.71.137
Aug 29 01:22:18 hanapaa sshd\[18511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.71.137
2019-08-29 19:48:28
114.26.42.54 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-29 19:41:18
124.53.62.145 attack
Aug 29 13:39:46 nextcloud sshd\[29600\]: Invalid user deployer from 124.53.62.145
Aug 29 13:39:46 nextcloud sshd\[29600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.53.62.145
Aug 29 13:39:49 nextcloud sshd\[29600\]: Failed password for invalid user deployer from 124.53.62.145 port 63954 ssh2
...
2019-08-29 19:55:08
223.171.32.56 attack
Automated report - ssh fail2ban:
Aug 29 14:00:22 authentication failure 
Aug 29 14:00:24 wrong password, user=minecraft, port=26905, ssh2
Aug 29 14:05:40 authentication failure
2019-08-29 20:10:04

最近上报的IP列表

52.54.210.55 63.132.200.157 200.14.184.152 199.255.5.78
134.96.98.135 146.20.96.228 75.79.117.181 83.211.204.122
95.180.206.28 244.243.124.39 137.102.170.230 242.137.210.5
15.41.153.153 50.52.155.231 81.24.213.109 181.19.0.28
106.64.15.230 64.186.141.156 220.153.29.119 237.95.142.150