必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.142.216.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.142.216.151.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 15:13:45 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 151.216.142.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 151.216.142.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.178.53.78 attack
Automatic report - Banned IP Access
2020-10-11 08:32:17
59.72.122.148 attack
Oct 11 05:39:40 mx sshd[1339666]: Invalid user 1234qwer from 59.72.122.148 port 42964
Oct 11 05:39:40 mx sshd[1339666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.122.148 
Oct 11 05:39:40 mx sshd[1339666]: Invalid user 1234qwer from 59.72.122.148 port 42964
Oct 11 05:39:42 mx sshd[1339666]: Failed password for invalid user 1234qwer from 59.72.122.148 port 42964 ssh2
Oct 11 05:43:26 mx sshd[1339708]: Invalid user darkhax2020? from 59.72.122.148 port 49490
...
2020-10-11 08:34:31
222.186.42.213 attackbots
Oct 11 00:35:08 124388 sshd[25311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Oct 11 00:35:10 124388 sshd[25311]: Failed password for root from 222.186.42.213 port 19764 ssh2
Oct 11 00:35:08 124388 sshd[25311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Oct 11 00:35:10 124388 sshd[25311]: Failed password for root from 222.186.42.213 port 19764 ssh2
Oct 11 00:35:13 124388 sshd[25311]: Failed password for root from 222.186.42.213 port 19764 ssh2
2020-10-11 08:36:09
206.81.12.141 attackbotsspam
Oct 11 01:23:19 mout sshd[1069]: Invalid user zope from 206.81.12.141 port 34088
2020-10-11 08:10:55
192.185.2.104 attackbotsspam
/old/wp-admin/
2020-10-11 08:16:19
93.42.225.250 attack
Oct 10 20:16:41 NPSTNNYC01T sshd[26707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.225.250
Oct 10 20:16:43 NPSTNNYC01T sshd[26707]: Failed password for invalid user device from 93.42.225.250 port 53214 ssh2
Oct 10 20:19:54 NPSTNNYC01T sshd[26828]: Failed password for root from 93.42.225.250 port 53454 ssh2
...
2020-10-11 08:34:04
141.98.9.32 attack
Oct 11 00:01:52 scw-tender-jepsen sshd[22781]: Failed password for root from 141.98.9.32 port 37533 ssh2
2020-10-11 08:14:14
218.59.47.1 attackspam
[MK-VM4] Blocked by UFW
2020-10-11 08:18:10
181.164.41.194 attack
Brute forcing email accounts
2020-10-11 08:25:31
45.81.226.57 attackspambots
0,16-05/15 [bc01/m06] PostRequest-Spammer scoring: brussels
2020-10-11 08:22:29
142.93.99.114 attackspam
Automatic report - XMLRPC Attack
2020-10-11 08:04:01
34.73.10.30 attackbotsspam
Trolling for resource vulnerabilities
2020-10-11 08:12:45
121.121.100.143 attack
Automatic report - Port Scan Attack
2020-10-11 08:33:05
106.13.75.102 attackspam
Oct 10 23:49:51 abendstille sshd\[17372\]: Invalid user seb from 106.13.75.102
Oct 10 23:49:51 abendstille sshd\[17372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.102
Oct 10 23:49:53 abendstille sshd\[17372\]: Failed password for invalid user seb from 106.13.75.102 port 60748 ssh2
Oct 10 23:53:46 abendstille sshd\[21661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.102  user=root
Oct 10 23:53:48 abendstille sshd\[21661\]: Failed password for root from 106.13.75.102 port 59958 ssh2
...
2020-10-11 08:04:23
187.95.114.162 attackspambots
2020-10-11T01:39:18.584547vps773228.ovh.net sshd[24650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.114.162
2020-10-11T01:39:18.563989vps773228.ovh.net sshd[24650]: Invalid user info from 187.95.114.162 port 26605
2020-10-11T01:39:20.836767vps773228.ovh.net sshd[24650]: Failed password for invalid user info from 187.95.114.162 port 26605 ssh2
2020-10-11T01:41:54.867875vps773228.ovh.net sshd[24712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.114.162  user=root
2020-10-11T01:41:57.205508vps773228.ovh.net sshd[24712]: Failed password for root from 187.95.114.162 port 14387 ssh2
...
2020-10-11 08:09:47

最近上报的IP列表

29.150.250.103 246.7.205.172 239.61.9.131 29.191.243.51
222.181.101.88 99.232.103.20 135.173.62.44 29.87.135.140
86.202.101.41 47.7.174.121 2.215.4.4 204.190.27.59
43.21.163.159 41.70.27.207 126.45.220.24 227.178.20.231
85.126.104.74 168.44.14.222 207.95.196.170 34.222.115.30