必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Washington

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.242.34.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.242.34.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 17 15:51:23 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
Host 196.34.242.4.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.34.242.4.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.232.173.87 attackbots
58.232.173.87 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 17:37:27
112.85.42.227 attackspam
2019-11-25T08:36:05.316472hub.schaetter.us sshd\[9406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
2019-11-25T08:36:07.617914hub.schaetter.us sshd\[9406\]: Failed password for root from 112.85.42.227 port 33022 ssh2
2019-11-25T08:36:09.780802hub.schaetter.us sshd\[9406\]: Failed password for root from 112.85.42.227 port 33022 ssh2
2019-11-25T08:36:12.012610hub.schaetter.us sshd\[9406\]: Failed password for root from 112.85.42.227 port 33022 ssh2
2019-11-25T08:37:06.954962hub.schaetter.us sshd\[9410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-11-25 17:29:47
107.161.23.47 attackbotsspam
xmlrpc attack
2019-11-25 17:14:55
13.211.211.199 attackspam
RDP Bruteforce
2019-11-25 17:30:13
188.213.212.74 attackspam
Nov 25 07:26:35  exim[18185]: [1\55] 1iZ7pR-0004jJ-P3 H=genera.yarkaci.com (genera.hanhlee.com) [188.213.212.74] F= rejected after DATA: This message scored 103.8 spam points.
2019-11-25 17:39:10
185.220.101.12 attackbotsspam
Automatic report - Banned IP Access
2019-11-25 17:37:44
63.88.23.134 attack
63.88.23.134 was recorded 5 times by 4 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 5, 64, 619
2019-11-25 17:27:05
185.43.211.234 attackspambots
xmlrpc attack
2019-11-25 17:33:53
159.89.19.171 attackspam
Automatic report - XMLRPC Attack
2019-11-25 17:34:40
49.234.48.86 attack
Nov 25 08:38:16 mout sshd[24054]: Invalid user catheline from 49.234.48.86 port 50744
2019-11-25 17:41:00
35.176.175.246 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-25 17:22:43
158.69.137.130 attack
Nov 25 11:06:04 taivassalofi sshd[202092]: Failed password for root from 158.69.137.130 port 51988 ssh2
Nov 25 11:12:28 taivassalofi sshd[202261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.137.130
...
2019-11-25 17:16:33
154.125.186.108 attackspambots
Fail2Ban Ban Triggered
2019-11-25 17:20:49
185.62.136.55 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-25 17:13:48
152.67.1.55 attackspam
152.67.1.55 was recorded 30 times by 19 hosts attempting to connect to the following ports: 2376,4243,2375,2377. Incident counter (4h, 24h, all-time): 30, 256, 449
2019-11-25 17:25:41

最近上报的IP列表

55.208.169.172 22.37.44.8 171.163.103.140 132.38.70.119
40.207.18.153 117.126.175.0 115.115.37.229 192.167.247.154
118.111.202.38 202.57.132.72 42.127.25.98 8.9.211.186
179.21.238.177 194.0.89.184 22.67.1.207 30.220.240.148
214.50.205.176 205.98.249.121 39.145.239.134 122.117.101.135