必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.218.242.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.218.242.194.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:48:44 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 194.242.218.249.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.242.218.249.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.40.184.149 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-16 02:58:31
118.40.250.24 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 02:28:08
58.16.127.164 attack
Feb 15 15:30:32 haigwepa sshd[12715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.16.127.164 
Feb 15 15:30:34 haigwepa sshd[12715]: Failed password for invalid user demo1 from 58.16.127.164 port 16082 ssh2
...
2020-02-16 02:49:38
118.40.183.176 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 02:49:21
150.109.40.134 attackspambots
Feb 15 18:06:24 mout sshd[22402]: Invalid user cutie from 150.109.40.134 port 43834
2020-02-16 03:01:34
222.129.47.60 attackbotsspam
Feb 15 14:50:19 tuxlinux sshd[15376]: Invalid user support from 222.129.47.60 port 54154
Feb 15 14:50:19 tuxlinux sshd[15376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.129.47.60 
Feb 15 14:50:19 tuxlinux sshd[15376]: Invalid user support from 222.129.47.60 port 54154
Feb 15 14:50:19 tuxlinux sshd[15376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.129.47.60 
Feb 15 14:50:19 tuxlinux sshd[15376]: Invalid user support from 222.129.47.60 port 54154
Feb 15 14:50:19 tuxlinux sshd[15376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.129.47.60 
Feb 15 14:50:22 tuxlinux sshd[15376]: Failed password for invalid user support from 222.129.47.60 port 54154 ssh2
...
2020-02-16 02:30:37
186.236.213.172 attackspambots
Feb 15 14:50:14 localhost kernel: [1558568.740324] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=186.236.213.172 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=52 ID=20603 PROTO=TCP SPT=36129 DPT=23 WINDOW=45986 RES=0x00 SYN URGP=0 
Feb 15 14:50:23 localhost kernel: [1558577.813876] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=186.236.213.172 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=52 ID=20603 PROTO=TCP SPT=36129 DPT=23 WINDOW=45986 RES=0x00 SYN URGP=0 
Feb 15 14:50:24 localhost kernel: [1558578.584861] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=186.236.213.172 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=52 ID=20603 PROTO=TCP SPT=36129 DPT=23 WINDOW=45986 RES=0x00 SYN URGP=0
2020-02-16 02:29:18
211.192.203.145 attackspam
Feb  1 23:31:36 ms-srv sshd[47551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.192.203.145
Feb  1 23:31:38 ms-srv sshd[47551]: Failed password for invalid user debian from 211.192.203.145 port 41080 ssh2
2020-02-16 02:29:35
68.183.19.84 attack
(sshd) Failed SSH login from 68.183.19.84 (US/United States/host.andrefornari): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 15 17:23:28 elude sshd[24772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.84  user=root
Feb 15 17:23:30 elude sshd[24772]: Failed password for root from 68.183.19.84 port 38064 ssh2
Feb 15 17:27:51 elude sshd[24967]: Invalid user vncuser from 68.183.19.84 port 46170
Feb 15 17:27:53 elude sshd[24967]: Failed password for invalid user vncuser from 68.183.19.84 port 46170 ssh2
Feb 15 17:30:40 elude sshd[25111]: Invalid user roberto from 68.183.19.84 port 46816
2020-02-16 03:00:24
203.186.138.82 attack
Feb 15 07:52:13 hpm sshd\[28198\]: Invalid user postgres from 203.186.138.82
Feb 15 07:52:13 hpm sshd\[28198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186138082.ctinets.com
Feb 15 07:52:15 hpm sshd\[28198\]: Failed password for invalid user postgres from 203.186.138.82 port 36980 ssh2
Feb 15 07:55:43 hpm sshd\[28512\]: Invalid user user1 from 203.186.138.82
Feb 15 07:55:43 hpm sshd\[28512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186138082.ctinets.com
2020-02-16 02:28:59
211.159.242.143 attackspambots
Jan 27 20:24:09 ms-srv sshd[33925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.242.143
Jan 27 20:24:10 ms-srv sshd[33925]: Failed password for invalid user ts from 211.159.242.143 port 47056 ssh2
2020-02-16 02:41:11
211.159.219.105 attackspam
Jan 13 08:09:36 ms-srv sshd[1250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.219.105
Jan 13 08:09:38 ms-srv sshd[1250]: Failed password for invalid user kadmin from 211.159.219.105 port 33844 ssh2
2020-02-16 02:42:35
118.163.118.126 attack
Sat Feb 15 09:01:38 2020 - Child process 60572 handling connection
Sat Feb 15 09:01:38 2020 - New connection from: 118.163.118.126:51747
Sat Feb 15 09:01:38 2020 - Sending data to client: [Login: ]
Sat Feb 15 09:02:08 2020 - Child aborting
Sat Feb 15 09:02:08 2020 - Reporting IP address: 118.163.118.126 - mflag: 0
2020-02-16 02:51:27
67.55.92.89 attack
Sep 12 15:18:28 ms-srv sshd[4902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89
Sep 12 15:18:29 ms-srv sshd[4902]: Failed password for invalid user arkserver from 67.55.92.89 port 42398 ssh2
2020-02-16 02:28:26
222.186.173.154 attackbots
Feb 15 15:26:10 vps46666688 sshd[21819]: Failed password for root from 222.186.173.154 port 48926 ssh2
Feb 15 15:26:23 vps46666688 sshd[21819]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 48926 ssh2 [preauth]
...
2020-02-16 02:27:45

最近上报的IP列表

162.111.47.130 224.52.225.11 232.228.78.202 63.177.1.61
8.81.245.22 200.109.105.105 251.124.200.24 135.104.149.125
38.250.28.250 146.36.37.89 253.75.203.132 229.66.41.166
7.64.48.92 166.101.199.19 40.131.240.249 228.93.129.183
156.194.81.220 239.152.37.98 217.233.193.126 218.75.242.218