必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 28.109.242.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;28.109.242.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:24:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 12.242.109.28.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.242.109.28.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.48.18.130 attack
2020-06-19T10:24:56.8557851495-001 sshd[35315]: Failed password for invalid user gianni from 181.48.18.130 port 55660 ssh2
2020-06-19T10:28:56.9920891495-001 sshd[35480]: Invalid user su from 181.48.18.130 port 56614
2020-06-19T10:28:56.9954571495-001 sshd[35480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130
2020-06-19T10:28:56.9920891495-001 sshd[35480]: Invalid user su from 181.48.18.130 port 56614
2020-06-19T10:28:59.2545011495-001 sshd[35480]: Failed password for invalid user su from 181.48.18.130 port 56614 ssh2
2020-06-19T10:32:59.0980131495-001 sshd[35634]: Invalid user ly from 181.48.18.130 port 57572
...
2020-06-20 00:04:40
144.48.109.34 attack
Unauthorized connection attempt from IP address 144.48.109.34 on Port 445(SMB)
2020-06-19 23:33:41
79.60.125.91 attackbotsspam
Unauthorized connection attempt from IP address 79.60.125.91 on Port 445(SMB)
2020-06-20 00:05:32
222.186.175.150 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Failed password for root from 222.186.175.150 port 29974 ssh2
Failed password for root from 222.186.175.150 port 29974 ssh2
Failed password for root from 222.186.175.150 port 29974 ssh2
Failed password for root from 222.186.175.150 port 29974 ssh2
2020-06-20 00:04:14
188.170.219.221 attackbotsspam
Unauthorized connection attempt from IP address 188.170.219.221 on Port 445(SMB)
2020-06-19 23:34:31
51.77.146.156 attack
SSH brute-force: detected 31 distinct username(s) / 41 distinct password(s) within a 24-hour window.
2020-06-19 23:23:01
141.98.81.210 attack
Jun 19 15:56:49 scw-6657dc sshd[28111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.210
Jun 19 15:56:49 scw-6657dc sshd[28111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.210
Jun 19 15:56:51 scw-6657dc sshd[28111]: Failed password for invalid user admin from 141.98.81.210 port 6361 ssh2
...
2020-06-20 00:00:08
192.144.140.20 attackspam
2020-06-19T16:15:53.456072lavrinenko.info sshd[9426]: Failed password for invalid user naufal from 192.144.140.20 port 58280 ssh2
2020-06-19T16:17:46.804281lavrinenko.info sshd[9559]: Invalid user vlad from 192.144.140.20 port 51482
2020-06-19T16:17:46.813664lavrinenko.info sshd[9559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.140.20
2020-06-19T16:17:46.804281lavrinenko.info sshd[9559]: Invalid user vlad from 192.144.140.20 port 51482
2020-06-19T16:17:48.541453lavrinenko.info sshd[9559]: Failed password for invalid user vlad from 192.144.140.20 port 51482 ssh2
...
2020-06-19 23:44:48
49.204.231.251 attack
Unauthorized connection attempt from IP address 49.204.231.251 on Port 445(SMB)
2020-06-19 23:28:36
106.12.90.14 attackspam
SSH brute force attempt
2020-06-19 23:28:02
111.241.104.183 attackspambots
1592568917 - 06/19/2020 14:15:17 Host: 111.241.104.183/111.241.104.183 Port: 445 TCP Blocked
2020-06-20 00:05:00
141.98.81.209 attackbotsspam
2020-06-19T17:12:11.474291vps751288.ovh.net sshd\[8839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.209  user=root
2020-06-19T17:12:13.316531vps751288.ovh.net sshd\[8839\]: Failed password for root from 141.98.81.209 port 32749 ssh2
2020-06-19T17:12:27.112368vps751288.ovh.net sshd\[8863\]: Invalid user admin from 141.98.81.209 port 26439
2020-06-19T17:12:27.128882vps751288.ovh.net sshd\[8863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.209
2020-06-19T17:12:29.166711vps751288.ovh.net sshd\[8863\]: Failed password for invalid user admin from 141.98.81.209 port 26439 ssh2
2020-06-20 00:03:03
182.73.229.106 attack
Unauthorized connection attempt from IP address 182.73.229.106 on Port 445(SMB)
2020-06-19 23:48:07
49.146.34.1 attackbotsspam
Unauthorized connection attempt from IP address 49.146.34.1 on Port 445(SMB)
2020-06-19 23:56:36
142.93.104.32 attackbotsspam
$f2bV_matches
2020-06-19 23:39:20

最近上报的IP列表

231.39.103.19 225.177.52.94 89.133.72.234 214.108.82.34
219.56.197.212 237.146.215.75 58.206.184.208 242.126.141.158
244.137.246.245 231.134.87.178 96.251.24.98 206.1.235.106
19.27.7.12 115.4.66.47 168.70.238.245 45.143.199.56
155.206.208.196 6.6.4.97 152.132.43.124 238.246.134.216