必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.94.230.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.94.230.109.			IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:46:12 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 109.230.94.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.230.94.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.178.55.92 attackbotsspam
Apr  9 19:33:12 DAAP sshd[10935]: Invalid user ubuntu from 51.178.55.92 port 46062
Apr  9 19:33:12 DAAP sshd[10935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.55.92
Apr  9 19:33:12 DAAP sshd[10935]: Invalid user ubuntu from 51.178.55.92 port 46062
Apr  9 19:33:14 DAAP sshd[10935]: Failed password for invalid user ubuntu from 51.178.55.92 port 46062 ssh2
Apr  9 19:42:04 DAAP sshd[11170]: Invalid user mysql from 51.178.55.92 port 53840
...
2020-04-10 03:06:37
128.14.134.170 attackspambots
128.14.134.170 - - [09/Apr/2020:14:03:00 +0300] "GET /solr/ HTTP/1.1" 404 1391 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
2020-04-10 02:58:39
116.112.64.98 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-04-10 02:34:09
134.175.54.154 attackbotsspam
Apr  9 17:44:25 localhost sshd[7547]: Invalid user odroid from 134.175.54.154 port 36705
Apr  9 17:44:25 localhost sshd[7547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.54.154
Apr  9 17:44:25 localhost sshd[7547]: Invalid user odroid from 134.175.54.154 port 36705
Apr  9 17:44:27 localhost sshd[7547]: Failed password for invalid user odroid from 134.175.54.154 port 36705 ssh2
Apr  9 17:48:31 localhost sshd[8025]: Invalid user testuser from 134.175.54.154 port 33928
...
2020-04-10 02:58:15
222.186.30.76 attackbots
Apr  9 20:49:29 localhost sshd[22557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Apr  9 20:49:30 localhost sshd[22557]: Failed password for root from 222.186.30.76 port 23559 ssh2
...
2020-04-10 02:49:54
177.55.188.230 attack
1586437175 - 04/09/2020 14:59:35 Host: 177.55.188.230/177.55.188.230 Port: 23 TCP Blocked
2020-04-10 02:55:35
123.207.161.12 attackspambots
Brute-force attempt banned
2020-04-10 02:26:28
50.115.176.2 attackspambots
SMTP brute force
...
2020-04-10 02:56:23
51.91.212.79 attackbots
04/09/2020-14:06:57.230868 51.91.212.79 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2020-04-10 02:29:35
185.21.216.153 attackspam
My Zyxel ATP Firewall reported this IP as a Scanner, and I saw several port scanning attempts on my firewall.
2020-04-10 02:52:44
107.170.129.141 attackbotsspam
*Port Scan* detected from 107.170.129.141 (US/United States/New York/New York/-). 4 hits in the last 265 seconds
2020-04-10 02:52:02
49.235.158.37 attackspam
$lgm
2020-04-10 02:41:58
186.179.103.118 attack
Apr  9 20:28:51 OPSO sshd\[31732\]: Invalid user uplink from 186.179.103.118 port 36005
Apr  9 20:28:51 OPSO sshd\[31732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.118
Apr  9 20:28:54 OPSO sshd\[31732\]: Failed password for invalid user uplink from 186.179.103.118 port 36005 ssh2
Apr  9 20:32:55 OPSO sshd\[32630\]: Invalid user test from 186.179.103.118 port 48893
Apr  9 20:32:55 OPSO sshd\[32630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.118
2020-04-10 02:38:05
185.202.1.220 attackspambots
RDP Brute-Force (honeypot 3)
2020-04-10 02:30:35
47.220.235.64 attackspam
2020-04-09T14:35:25.211762shield sshd\[4051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-220-235-64.suspcmta01.res.dyn.suddenlink.net  user=root
2020-04-09T14:35:26.930340shield sshd\[4051\]: Failed password for root from 47.220.235.64 port 53810 ssh2
2020-04-09T14:37:20.503059shield sshd\[4303\]: Invalid user kuangwh from 47.220.235.64 port 50464
2020-04-09T14:37:20.506876shield sshd\[4303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-220-235-64.suspcmta01.res.dyn.suddenlink.net
2020-04-09T14:37:22.346288shield sshd\[4303\]: Failed password for invalid user kuangwh from 47.220.235.64 port 50464 ssh2
2020-04-10 02:54:34

最近上报的IP列表

81.196.79.95 61.194.69.105 219.228.208.99 211.56.54.14
0.50.0.132 246.236.203.234 169.179.244.26 9.195.120.44
250.65.18.50 142.159.99.70 97.109.148.188 134.194.4.145
11.197.116.218 212.47.108.135 101.209.225.216 156.151.19.100
175.117.15.189 107.119.197.212 236.7.50.90 181.142.34.55