必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.90.74.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.90.74.242.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 21:25:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 242.74.90.245.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.74.90.245.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.63.1.161 attackbots
Sep 28 23:55:54 esmtp postfix/smtpd[10673]: lost connection after AUTH from unknown[117.63.1.161]
Sep 28 23:55:57 esmtp postfix/smtpd[10661]: lost connection after AUTH from unknown[117.63.1.161]
Sep 28 23:56:08 esmtp postfix/smtpd[10673]: lost connection after AUTH from unknown[117.63.1.161]
Sep 28 23:56:10 esmtp postfix/smtpd[10675]: lost connection after AUTH from unknown[117.63.1.161]
Sep 28 23:56:12 esmtp postfix/smtpd[10673]: lost connection after AUTH from unknown[117.63.1.161]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.63.1.161
2019-09-29 12:34:24
51.77.147.51 attackspambots
Sep 29 05:53:04 DAAP sshd[26829]: Invalid user rkassim from 51.77.147.51 port 40728
Sep 29 05:53:04 DAAP sshd[26829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.51
Sep 29 05:53:04 DAAP sshd[26829]: Invalid user rkassim from 51.77.147.51 port 40728
Sep 29 05:53:06 DAAP sshd[26829]: Failed password for invalid user rkassim from 51.77.147.51 port 40728 ssh2
Sep 29 05:56:32 DAAP sshd[26840]: Invalid user polycom from 51.77.147.51 port 53224
...
2019-09-29 12:18:41
112.65.201.26 attack
Sep 28 18:20:42 lcprod sshd\[7641\]: Invalid user tom from 112.65.201.26
Sep 28 18:20:42 lcprod sshd\[7641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
Sep 28 18:20:43 lcprod sshd\[7641\]: Failed password for invalid user tom from 112.65.201.26 port 61459 ssh2
Sep 28 18:22:45 lcprod sshd\[7832\]: Invalid user admin from 112.65.201.26
Sep 28 18:22:45 lcprod sshd\[7832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
2019-09-29 12:39:05
119.50.99.34 attack
Automatic report - Port Scan Attack
2019-09-29 12:27:24
222.186.42.241 attack
Sep 29 04:20:15 localhost sshd\[80439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.241  user=root
Sep 29 04:20:17 localhost sshd\[80439\]: Failed password for root from 222.186.42.241 port 58522 ssh2
Sep 29 04:20:19 localhost sshd\[80439\]: Failed password for root from 222.186.42.241 port 58522 ssh2
Sep 29 04:20:22 localhost sshd\[80439\]: Failed password for root from 222.186.42.241 port 58522 ssh2
Sep 29 04:24:54 localhost sshd\[80579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.241  user=root
...
2019-09-29 12:26:14
115.159.65.195 attackbotsspam
Sep 28 18:23:30 friendsofhawaii sshd\[20795\]: Invalid user jb from 115.159.65.195
Sep 28 18:23:30 friendsofhawaii sshd\[20795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.65.195
Sep 28 18:23:32 friendsofhawaii sshd\[20795\]: Failed password for invalid user jb from 115.159.65.195 port 48842 ssh2
Sep 28 18:27:23 friendsofhawaii sshd\[21182\]: Invalid user michal from 115.159.65.195
Sep 28 18:27:23 friendsofhawaii sshd\[21182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.65.195
2019-09-29 12:38:22
222.186.42.15 attack
Sep 29 05:59:06 localhost sshd\[17942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
Sep 29 05:59:09 localhost sshd\[17942\]: Failed password for root from 222.186.42.15 port 47804 ssh2
Sep 29 05:59:11 localhost sshd\[17942\]: Failed password for root from 222.186.42.15 port 47804 ssh2
2019-09-29 12:00:46
212.64.72.20 attackbots
Sep 28 18:29:03 lcdev sshd\[17864\]: Invalid user ahmed from 212.64.72.20
Sep 28 18:29:03 lcdev sshd\[17864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.72.20
Sep 28 18:29:05 lcdev sshd\[17864\]: Failed password for invalid user ahmed from 212.64.72.20 port 60956 ssh2
Sep 28 18:33:46 lcdev sshd\[18280\]: Invalid user rx from 212.64.72.20
Sep 28 18:33:46 lcdev sshd\[18280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.72.20
2019-09-29 12:38:41
200.98.1.189 attack
Automatic report - SSH Brute-Force Attack
2019-09-29 12:03:57
116.110.219.162 attackbotsspam
Unauthorized SSH login attempts
2019-09-29 12:04:55
116.203.76.61 attackbots
Sep 29 10:57:06 webhost01 sshd[19839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.76.61
Sep 29 10:57:08 webhost01 sshd[19839]: Failed password for invalid user nyx from 116.203.76.61 port 41772 ssh2
...
2019-09-29 12:13:10
92.119.160.6 attackbotsspam
09/28/2019-23:56:48.364552 92.119.160.6 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-29 12:09:04
106.13.19.75 attackbots
2019-09-28T23:42:24.9900781495-001 sshd\[36850\]: Invalid user mike from 106.13.19.75 port 56092
2019-09-28T23:42:25.0012381495-001 sshd\[36850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.75
2019-09-28T23:42:26.6484841495-001 sshd\[36850\]: Failed password for invalid user mike from 106.13.19.75 port 56092 ssh2
2019-09-28T23:47:39.9684141495-001 sshd\[37247\]: Invalid user waleed from 106.13.19.75 port 38984
2019-09-28T23:47:39.9773301495-001 sshd\[37247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.75
2019-09-28T23:47:42.2017451495-001 sshd\[37247\]: Failed password for invalid user waleed from 106.13.19.75 port 38984 ssh2
...
2019-09-29 12:10:53
133.130.119.178 attack
Sep 28 22:49:01 aat-srv002 sshd[9528]: Failed password for root from 133.130.119.178 port 35943 ssh2
Sep 28 22:53:02 aat-srv002 sshd[9639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.178
Sep 28 22:53:04 aat-srv002 sshd[9639]: Failed password for invalid user training from 133.130.119.178 port 20238 ssh2
...
2019-09-29 12:01:08
88.247.110.88 attackspambots
Sep 29 04:21:12 venus sshd\[12448\]: Invalid user kklai from 88.247.110.88 port 8074
Sep 29 04:21:12 venus sshd\[12448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.247.110.88
Sep 29 04:21:14 venus sshd\[12448\]: Failed password for invalid user kklai from 88.247.110.88 port 8074 ssh2
...
2019-09-29 12:33:25

最近上报的IP列表

205.140.72.237 31.29.159.171 136.146.248.237 43.242.35.161
103.31.220.252 153.240.244.14 66.253.230.237 48.87.132.9
38.102.54.122 124.33.240.65 241.3.19.199 27.241.101.160
109.143.170.224 155.197.163.119 13.75.38.34 110.28.18.221
246.189.27.108 186.192.106.105 40.211.248.225 149.93.88.98