必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.242.142.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.242.142.219.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091401 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 02:20:25 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
219.142.242.38.in-addr.arpa domain name pointer ip-219-142-242-38.static.contabo.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.142.242.38.in-addr.arpa	name = ip-219-142-242-38.static.contabo.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.114 attackbots
Sep 13 02:49:07 php1 sshd\[6831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 13 02:49:09 php1 sshd\[6831\]: Failed password for root from 49.88.112.114 port 27097 ssh2
Sep 13 02:50:12 php1 sshd\[6913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 13 02:50:14 php1 sshd\[6913\]: Failed password for root from 49.88.112.114 port 57992 ssh2
Sep 13 02:51:13 php1 sshd\[6989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-09-13 20:53:55
201.251.211.23 attack
19/9/13@07:18:36: FAIL: Alarm-SSH address from=201.251.211.23
...
2019-09-13 21:42:18
172.104.242.173 attack
8443/tcp 8080/tcp 3128/tcp...
[2019-07-16/09-13]550pkt,58pt.(tcp)
2019-09-13 21:02:19
159.203.177.53 attackspambots
$f2bV_matches
2019-09-13 21:02:49
183.91.215.47 attackbotsspam
Hits on port : 8000
2019-09-13 20:50:33
111.118.129.195 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-13 21:32:00
153.36.236.35 attackbots
Sep 13 15:44:26 core sshd[3760]: Failed password for root from 153.36.236.35 port 52638 ssh2
Sep 13 15:44:28 core sshd[3760]: Failed password for root from 153.36.236.35 port 52638 ssh2
...
2019-09-13 21:52:22
134.175.197.226 attackbotsspam
$f2bV_matches
2019-09-13 21:03:44
196.52.43.63 attackspam
Port Scan: TCP/2323
2019-09-13 21:30:53
45.58.139.104 attackspam
Spam
2019-09-13 20:49:11
212.87.9.155 attackspam
2019-09-13T12:23:25.829614abusebot-7.cloudsearch.cf sshd\[28158\]: Invalid user testuser from 212.87.9.155 port 59816
2019-09-13 21:52:58
14.190.244.6 attackbots
2019-09-13T04:19:30.876607suse-nuc sshd[6672]: error: maximum authentication attempts exceeded for root from 14.190.244.6 port 52490 ssh2 [preauth]
...
2019-09-13 21:14:40
73.105.37.204 attackbotsspam
Automatic report - Port Scan Attack
2019-09-13 21:11:27
117.5.8.201 attack
Unauthorized connection attempt from IP address 117.5.8.201 on Port 445(SMB)
2019-09-13 21:25:37
49.88.112.78 attackbotsspam
13.09.2019 13:15:15 SSH access blocked by firewall
2019-09-13 21:12:02

最近上报的IP列表

200.10.68.41 223.242.229.24 219.59.30.163 149.18.30.218
38.44.77.210 50.114.111.21 200.136.108.220 154.29.64.81
83.171.254.109 238.190.203.66 128.90.164.168 1.234.146.47
216.73.161.152 159.192.82.232 163.21.235.244 164.52.212.167
159.223.99.100 143.137.207.21 163.44.252.127 159.89.170.53