必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.245.42.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;253.245.42.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 16:54:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 114.42.245.253.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.42.245.253.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.168.201.126 attack
Invalid user qns from 180.168.201.126 port 12295
2020-05-23 17:35:18
103.85.206.238 attackbotsspam
Invalid user admin from 103.85.206.238 port 53108
2020-05-23 17:55:14
96.87.61.117 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 17:56:47
200.87.178.137 attack
May 23 09:08:56 ns382633 sshd\[13669\]: Invalid user dug from 200.87.178.137 port 42480
May 23 09:08:56 ns382633 sshd\[13669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
May 23 09:08:58 ns382633 sshd\[13669\]: Failed password for invalid user dug from 200.87.178.137 port 42480 ssh2
May 23 09:16:37 ns382633 sshd\[15317\]: Invalid user sbw from 200.87.178.137 port 60248
May 23 09:16:37 ns382633 sshd\[15317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
2020-05-23 17:27:02
178.33.186.185 attackbots
Invalid user yqf from 178.33.186.185 port 34192
2020-05-23 17:36:50
156.212.64.222 attackbotsspam
Invalid user ubnt from 156.212.64.222 port 63031
2020-05-23 17:43:39
5.39.94.77 attackbots
May 23 12:04:30 ift sshd\[8646\]: Invalid user flz from 5.39.94.77May 23 12:04:31 ift sshd\[8646\]: Failed password for invalid user flz from 5.39.94.77 port 53254 ssh2May 23 12:08:15 ift sshd\[9022\]: Invalid user dcu from 5.39.94.77May 23 12:08:17 ift sshd\[9022\]: Failed password for invalid user dcu from 5.39.94.77 port 45549 ssh2May 23 12:11:55 ift sshd\[9393\]: Invalid user bakpessi from 5.39.94.77
...
2020-05-23 17:21:21
101.236.60.31 attackspambots
Invalid user ziyu from 101.236.60.31 port 43783
2020-05-23 17:56:21
124.120.84.129 attack
Invalid user administrator from 124.120.84.129 port 17675
2020-05-23 17:48:18
171.96.138.51 attack
Invalid user pi from 171.96.138.51 port 64147
2020-05-23 17:39:08
202.102.79.232 attackspam
2020-05-23T03:08:37.844652morrigan.ad5gb.com sshd[3524]: Invalid user ouy from 202.102.79.232 port 20818
2020-05-23T03:08:39.979252morrigan.ad5gb.com sshd[3524]: Failed password for invalid user ouy from 202.102.79.232 port 20818 ssh2
2020-05-23T03:08:41.970784morrigan.ad5gb.com sshd[3524]: Disconnected from invalid user ouy 202.102.79.232 port 20818 [preauth]
2020-05-23 17:25:06
172.241.140.213 attackbotsspam
Invalid user yus from 172.241.140.213 port 42860
2020-05-23 17:38:44
114.5.249.24 attackbotsspam
Invalid user admin from 114.5.249.24 port 56502
2020-05-23 17:51:18
93.174.95.106 attackbotsspam
Port scanning [4 denied]
2020-05-23 17:59:39
2.50.131.186 attackspambots
Invalid user ubnt from 2.50.131.186 port 62036
2020-05-23 17:21:46

最近上报的IP列表

219.191.161.221 135.191.120.121 133.136.249.4 132.221.194.185
232.204.200.91 151.138.123.35 70.93.47.96 157.156.219.46
20.229.48.59 205.142.206.63 108.167.221.103 78.93.100.245
24.114.44.117 132.54.236.160 94.51.43.106 119.54.153.36
221.1.146.77 140.215.9.84 68.118.245.215 7.205.114.145