必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.158.242.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.158.242.135.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 10:23:48 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 135.242.158.249.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.242.158.249.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.63.166.50 attackspam
WordPress wp-login brute force :: 50.63.166.50 0.084 BYPASS [14/Dec/2019:06:26:23  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 2137 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-14 18:01:11
95.110.154.101 attack
Dec 13 23:32:05 php1 sshd\[10477\]: Invalid user server from 95.110.154.101
Dec 13 23:32:05 php1 sshd\[10477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.154.101
Dec 13 23:32:07 php1 sshd\[10477\]: Failed password for invalid user server from 95.110.154.101 port 47532 ssh2
Dec 13 23:37:43 php1 sshd\[11028\]: Invalid user kieferle from 95.110.154.101
Dec 13 23:37:43 php1 sshd\[11028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.154.101
2019-12-14 17:47:03
140.143.45.22 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.45.22  user=backup
Failed password for backup from 140.143.45.22 port 47330 ssh2
Invalid user admin from 140.143.45.22 port 43320
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.45.22
Failed password for invalid user admin from 140.143.45.22 port 43320 ssh2
2019-12-14 17:56:03
64.225.3.74 attackspam
Dec 14 07:23:26 mail postfix/smtpd[19063]: warning: unknown[64.225.3.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 14 07:23:33 mail postfix/smtpd[18941]: warning: unknown[64.225.3.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 14 07:23:44 mail postfix/smtpd[18811]: warning: unknown[64.225.3.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-14 18:05:03
211.144.114.26 attack
Dec 13 23:19:12 tdfoods sshd\[5468\]: Invalid user tveranger from 211.144.114.26
Dec 13 23:19:12 tdfoods sshd\[5468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.114.26
Dec 13 23:19:14 tdfoods sshd\[5468\]: Failed password for invalid user tveranger from 211.144.114.26 port 45788 ssh2
Dec 13 23:24:48 tdfoods sshd\[5990\]: Invalid user yoyo from 211.144.114.26
Dec 13 23:24:48 tdfoods sshd\[5990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.114.26
2019-12-14 17:43:36
61.92.169.178 attack
Dec 14 10:57:21 MK-Soft-Root1 sshd[19850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.92.169.178 
Dec 14 10:57:23 MK-Soft-Root1 sshd[19850]: Failed password for invalid user mysql from 61.92.169.178 port 52688 ssh2
...
2019-12-14 18:01:42
52.196.177.91 attackbotsspam
Dec 11 16:03:46 rdssrv1 sshd[20837]: Invalid user nr from 52.196.177.91
Dec 11 16:03:48 rdssrv1 sshd[20837]: Failed password for invalid user nr from 52.196.177.91 port 60178 ssh2
Dec 11 16:14:15 rdssrv1 sshd[22429]: Invalid user ching from 52.196.177.91
Dec 11 16:14:17 rdssrv1 sshd[22429]: Failed password for invalid user ching from 52.196.177.91 port 42064 ssh2
Dec 11 16:20:29 rdssrv1 sshd[23694]: Invalid user wwwadmin from 52.196.177.91
Dec 11 16:20:31 rdssrv1 sshd[23694]: Failed password for invalid user wwwadmin from 52.196.177.91 port 54740 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=52.196.177.91
2019-12-14 17:42:22
51.38.178.226 attack
Dec 14 10:20:11 rotator sshd\[5188\]: Invalid user pullo from 51.38.178.226Dec 14 10:20:13 rotator sshd\[5188\]: Failed password for invalid user pullo from 51.38.178.226 port 38590 ssh2Dec 14 10:25:08 rotator sshd\[5900\]: Invalid user bierbrier from 51.38.178.226Dec 14 10:25:10 rotator sshd\[5900\]: Failed password for invalid user bierbrier from 51.38.178.226 port 46234 ssh2Dec 14 10:30:00 rotator sshd\[6507\]: Invalid user eh from 51.38.178.226Dec 14 10:30:02 rotator sshd\[6507\]: Failed password for invalid user eh from 51.38.178.226 port 53738 ssh2
...
2019-12-14 17:46:02
178.128.221.237 attackbots
Dec 14 09:33:28 localhost sshd\[58487\]: Invalid user rsvp from 178.128.221.237 port 40458
Dec 14 09:33:28 localhost sshd\[58487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.237
Dec 14 09:33:30 localhost sshd\[58487\]: Failed password for invalid user rsvp from 178.128.221.237 port 40458 ssh2
Dec 14 09:39:10 localhost sshd\[58708\]: Invalid user w6admin from 178.128.221.237 port 44198
Dec 14 09:39:10 localhost sshd\[58708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.237
...
2019-12-14 17:42:45
14.232.155.113 attack
1576304794 - 12/14/2019 07:26:34 Host: 14.232.155.113/14.232.155.113 Port: 445 TCP Blocked
2019-12-14 17:50:26
189.181.219.135 attackbots
Dec 14 06:48:43 ws12vmsma01 sshd[63276]: Invalid user katsumata from 189.181.219.135
Dec 14 06:48:45 ws12vmsma01 sshd[63276]: Failed password for invalid user katsumata from 189.181.219.135 port 32895 ssh2
Dec 14 06:54:52 ws12vmsma01 sshd[64096]: Invalid user turumaru from 189.181.219.135
...
2019-12-14 17:59:32
58.222.107.253 attackspam
$f2bV_matches
2019-12-14 18:05:22
78.128.113.130 attackspam
Dec 14 10:55:03 dedicated sshd[26151]: Invalid user admin from 78.128.113.130 port 53442
2019-12-14 18:02:22
180.191.206.124 attackspam
Unauthorized connection attempt detected from IP address 180.191.206.124 to port 445
2019-12-14 18:08:21
118.24.201.168 attackbotsspam
Dec 14 11:47:29 server sshd\[28399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.168  user=root
Dec 14 11:47:31 server sshd\[28399\]: Failed password for root from 118.24.201.168 port 46162 ssh2
Dec 14 12:11:46 server sshd\[3200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.168  user=root
Dec 14 12:11:49 server sshd\[3200\]: Failed password for root from 118.24.201.168 port 45478 ssh2
Dec 14 12:27:26 server sshd\[7917\]: Invalid user cruel from 118.24.201.168
Dec 14 12:27:26 server sshd\[7917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.168 
...
2019-12-14 18:04:26

最近上报的IP列表

58.218.43.245 18.119.71.83 27.166.161.101 219.55.235.111
55.219.214.136 75.95.146.223 219.251.225.248 7.196.36.55
230.52.61.134 81.188.247.192 198.88.161.248 169.164.60.189
3.216.23.188 118.27.71.125 39.74.57.182 134.131.75.248
51.165.49.145 175.16.39.70 245.71.223.122 246.95.14.200