必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.98.146.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.98.146.66.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:35:29 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 66.146.98.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.146.98.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.32.206.76 attack
[munged]::443 178.32.206.76 - - [23/Oct/2019:16:22:43 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 178.32.206.76 - - [23/Oct/2019:16:22:44 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 178.32.206.76 - - [23/Oct/2019:16:22:45 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 178.32.206.76 - - [23/Oct/2019:16:22:46 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 178.32.206.76 - - [23/Oct/2019:16:22:46 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 178.32.206.76 - - [23/Oct/2019:16:22:47 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubun
2019-10-23 23:17:08
219.235.84.15 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/219.235.84.15/ 
 
 CN - 1H : (429)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN17968 
 
 IP : 219.235.84.15 
 
 CIDR : 219.235.64.0/19 
 
 PREFIX COUNT : 45 
 
 UNIQUE IP COUNT : 438272 
 
 
 ATTACKS DETECTED ASN17968 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-23 15:50:53 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-23 23:02:39
89.36.222.85 attackspambots
Oct 23 16:36:12 dedicated sshd[6072]: Invalid user accessdenied1 from 89.36.222.85 port 42686
2019-10-23 22:48:59
118.89.49.178 attackbots
118.89.49.178 - - [23/Oct/2019:02:59:53 -0500] "POST /db.init.php HTTP/1.1" 404 
118.89.49.178 - - [23/Oct/2019:02:59:53 -0500] "POST /db_session.init.php HTTP/1
118.89.49.178 - - [23/Oct/2019:02:59:55 -0500] "POST /db__.init.php HTTP/1.1" 40
118.89.49.178 - - [23/Oct/2019:02:59:57 -0500] "POST /wp-admins.php HTTP/1.1" 40
2019-10-23 23:21:17
106.12.28.232 attackspambots
Oct 23 12:10:52 giraffe sshd[29436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.232  user=r.r
Oct 23 12:10:54 giraffe sshd[29436]: Failed password for r.r from 106.12.28.232 port 37552 ssh2
Oct 23 12:10:54 giraffe sshd[29436]: Received disconnect from 106.12.28.232 port 37552:11: Bye Bye [preauth]
Oct 23 12:10:54 giraffe sshd[29436]: Disconnected from 106.12.28.232 port 37552 [preauth]
Oct 23 12:35:55 giraffe sshd[30228]: Invalid user razvan from 106.12.28.232
Oct 23 12:35:55 giraffe sshd[30228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.232
Oct 23 12:35:57 giraffe sshd[30228]: Failed password for invalid user razvan from 106.12.28.232 port 56082 ssh2
Oct 23 12:35:57 giraffe sshd[30228]: Received disconnect from 106.12.28.232 port 56082:11: Bye Bye [preauth]
Oct 23 12:35:57 giraffe sshd[30228]: Disconnected from 106.12.28.232 port 56082 [preauth]
Oct 23 12:40:1........
-------------------------------
2019-10-23 23:15:20
101.251.72.205 attack
Invalid user P@SSWORD@123 from 101.251.72.205 port 34216
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.251.72.205
Failed password for invalid user P@SSWORD@123 from 101.251.72.205 port 34216 ssh2
Invalid user $BLANKPASS from 101.251.72.205 port 51553
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.251.72.205
2019-10-23 22:43:27
196.52.43.121 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 23:12:38
222.186.169.192 attackbots
2019-10-23T14:36:35.862844abusebot-8.cloudsearch.cf sshd\[26742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2019-10-23 22:37:39
196.52.43.124 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 23:13:55
221.195.1.201 attackbotsspam
Oct 21 01:29:31 sanyalnet-cloud-vps4 sshd[24877]: Connection from 221.195.1.201 port 52894 on 64.137.160.124 port 22
Oct 21 01:29:38 sanyalnet-cloud-vps4 sshd[24877]: User r.r from 221.195.1.201 not allowed because not listed in AllowUsers
Oct 21 01:29:38 sanyalnet-cloud-vps4 sshd[24877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.1.201  user=r.r
Oct 21 01:29:40 sanyalnet-cloud-vps4 sshd[24877]: Failed password for invalid user r.r from 221.195.1.201 port 52894 ssh2
Oct 21 01:29:40 sanyalnet-cloud-vps4 sshd[24877]: Received disconnect from 221.195.1.201: 11: Bye Bye [preauth]
Oct 21 01:51:38 sanyalnet-cloud-vps4 sshd[25265]: Connection from 221.195.1.201 port 48726 on 64.137.160.124 port 22
Oct 21 01:51:41 sanyalnet-cloud-vps4 sshd[25265]: Invalid user alasdair from 221.195.1.201
Oct 21 01:51:41 sanyalnet-cloud-vps4 sshd[25265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=22........
-------------------------------
2019-10-23 22:50:33
46.38.144.17 attackspam
Oct 23 16:52:26 relay postfix/smtpd\[24525\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 23 16:53:10 relay postfix/smtpd\[6742\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 23 16:53:39 relay postfix/smtpd\[25439\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 23 16:54:23 relay postfix/smtpd\[1228\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 23 16:54:52 relay postfix/smtpd\[25439\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-23 22:56:53
195.208.132.111 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 22:46:32
137.74.44.162 attack
Oct 23 14:46:03 SilenceServices sshd[29111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
Oct 23 14:46:05 SilenceServices sshd[29111]: Failed password for invalid user martinho from 137.74.44.162 port 53714 ssh2
Oct 23 14:50:13 SilenceServices sshd[30179]: Failed password for root from 137.74.44.162 port 44694 ssh2
2019-10-23 22:53:05
69.94.131.110 attackbots
Postfix DNSBL listed. Trying to send SPAM.
2019-10-23 23:16:14
157.245.75.86 attackspam
Oct 23 09:35:06 xxxxxxx8434580 sshd[30851]: Invalid user redmine from 157.245.75.86
Oct 23 09:35:06 xxxxxxx8434580 sshd[30851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.75.86 
Oct 23 09:35:08 xxxxxxx8434580 sshd[30851]: Failed password for invalid user redmine from 157.245.75.86 port 55106 ssh2
Oct 23 09:35:08 xxxxxxx8434580 sshd[30851]: Received disconnect from 157.245.75.86: 11: Bye Bye [preauth]
Oct 23 09:42:42 xxxxxxx8434580 sshd[30872]: Invalid user postgres from 157.245.75.86
Oct 23 09:42:42 xxxxxxx8434580 sshd[30872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.75.86 
Oct 23 09:42:44 xxxxxxx8434580 sshd[30872]: Failed password for invalid user postgres from 157.245.75.86 port 60214 ssh2
Oct 23 09:42:44 xxxxxxx8434580 sshd[30872]: Received disconnect from 157.245.75.86: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.245.
2019-10-23 23:11:04

最近上报的IP列表

190.176.107.137 87.29.162.121 180.191.185.241 141.103.233.32
48.56.67.207 60.62.125.185 178.137.42.18 52.132.122.246
191.202.90.184 92.193.133.130 160.245.244.58 43.205.23.63
48.183.229.248 226.26.44.141 200.49.84.6 83.83.56.149
54.244.193.69 23.187.107.205 226.103.227.151 178.57.143.26