必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.209.39.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.209.39.241.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:50:32 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 241.39.209.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.39.209.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.78.228.104 attackspambots
Oct 17 23:57:58 pkdns2 sshd\[50355\]: Failed password for root from 103.78.228.104 port 46480 ssh2Oct 18 00:00:57 pkdns2 sshd\[50511\]: Invalid user bai from 103.78.228.104Oct 18 00:00:59 pkdns2 sshd\[50511\]: Failed password for invalid user bai from 103.78.228.104 port 48612 ssh2Oct 18 00:04:04 pkdns2 sshd\[50624\]: Failed password for root from 103.78.228.104 port 50696 ssh2Oct 18 00:06:57 pkdns2 sshd\[50790\]: Invalid user  from 103.78.228.104Oct 18 00:07:00 pkdns2 sshd\[50790\]: Failed password for invalid user  from 103.78.228.104 port 52796 ssh2
...
2019-10-18 05:46:43
201.212.17.192 attackspambots
Jan 31 23:33:48 odroid64 sshd\[26909\]: Invalid user test from 201.212.17.192
Jan 31 23:33:48 odroid64 sshd\[26909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Jan 31 23:33:50 odroid64 sshd\[26909\]: Failed password for invalid user test from 201.212.17.192 port 55422 ssh2
Feb  5 02:46:39 odroid64 sshd\[21485\]: Invalid user minecraft from 201.212.17.192
Feb  5 02:46:39 odroid64 sshd\[21485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Feb  5 02:46:40 odroid64 sshd\[21485\]: Failed password for invalid user minecraft from 201.212.17.192 port 41316 ssh2
Feb 28 19:51:39 odroid64 sshd\[32080\]: Invalid user mou from 201.212.17.192
Feb 28 19:51:39 odroid64 sshd\[32080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Feb 28 19:51:41 odroid64 sshd\[32080\]: Failed password for invalid user mou from 201.212.1
...
2019-10-18 05:58:36
89.248.162.167 attack
10/17/2019-15:51:30.268848 89.248.162.167 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-10-18 05:52:45
182.61.148.125 attackspam
Oct 17 15:51:44 Tower sshd[41666]: Connection from 182.61.148.125 port 47356 on 192.168.10.220 port 22
Oct 17 15:51:45 Tower sshd[41666]: Failed password for root from 182.61.148.125 port 47356 ssh2
Oct 17 15:51:45 Tower sshd[41666]: Received disconnect from 182.61.148.125 port 47356:11: Bye Bye [preauth]
Oct 17 15:51:45 Tower sshd[41666]: Disconnected from authenticating user root 182.61.148.125 port 47356 [preauth]
2019-10-18 05:37:26
67.205.140.128 attackspambots
Oct 17 19:41:45 zimbra sshd[30889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.140.128  user=r.r
Oct 17 19:41:47 zimbra sshd[30889]: Failed password for r.r from 67.205.140.128 port 33276 ssh2
Oct 17 19:41:47 zimbra sshd[30889]: Received disconnect from 67.205.140.128 port 33276:11: Bye Bye [preauth]
Oct 17 19:41:47 zimbra sshd[30889]: Disconnected from 67.205.140.128 port 33276 [preauth]
Oct 17 20:51:59 zimbra sshd[19906]: Invalid user pj from 67.205.140.128
Oct 17 20:51:59 zimbra sshd[19906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.140.128
Oct 17 20:52:01 zimbra sshd[19906]: Failed password for invalid user pj from 67.205.140.128 port 59706 ssh2
Oct 17 20:52:01 zimbra sshd[19906]: Received disconnect from 67.205.140.128 port 59706:11: Bye Bye [preauth]
Oct 17 20:52:01 zimbra sshd[19906]: Disconnected from 67.205.140.128 port 59706 [preauth]
Oct 17 20:55:38 zimbra........
-------------------------------
2019-10-18 06:07:33
201.212.63.184 attack
Nov 29 21:02:38 odroid64 sshd\[5288\]: Invalid user newadmin from 201.212.63.184
Nov 29 21:02:38 odroid64 sshd\[5288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.63.184
Nov 29 21:02:40 odroid64 sshd\[5288\]: Failed password for invalid user newadmin from 201.212.63.184 port 35924 ssh2
...
2019-10-18 05:56:59
201.174.46.234 attack
Invalid user nagios from 201.174.46.234 port 21479
2019-10-18 05:40:39
59.63.163.30 attackspambots
Automatic report - XMLRPC Attack
2019-10-18 05:39:21
108.46.98.211 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/108.46.98.211/ 
 US - 1H : (256)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN701 
 
 IP : 108.46.98.211 
 
 CIDR : 108.46.0.0/16 
 
 PREFIX COUNT : 7223 
 
 UNIQUE IP COUNT : 40015360 
 
 
 WYKRYTE ATAKI Z ASN701 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 6 
 24H - 12 
 
 DateTime : 2019-10-17 20:50:36 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-10-18 06:11:01
222.186.175.215 attackspambots
Oct 17 17:53:13 xtremcommunity sshd\[621718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Oct 17 17:53:15 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
Oct 17 17:53:19 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
Oct 17 17:53:24 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
Oct 17 17:53:29 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
...
2019-10-18 05:58:15
201.20.29.212 attackspambots
May 12 16:06:51 odroid64 sshd\[27237\]: User backup from 201.20.29.212 not allowed because not listed in AllowUsers
May 12 16:06:51 odroid64 sshd\[27237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.29.212  user=backup
May 12 16:06:53 odroid64 sshd\[27237\]: Failed password for invalid user backup from 201.20.29.212 port 21001 ssh2
...
2019-10-18 06:15:18
201.212.93.146 attackbots
Nov 29 22:43:55 odroid64 sshd\[10933\]: Invalid user mc from 201.212.93.146
Nov 29 22:43:55 odroid64 sshd\[10933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.93.146
Nov 29 22:43:57 odroid64 sshd\[10933\]: Failed password for invalid user mc from 201.212.93.146 port 53872 ssh2
...
2019-10-18 05:54:38
201.219.170.70 attack
Mar 15 07:25:07 odroid64 sshd\[17145\]: Invalid user qhsupport from 201.219.170.70
Mar 15 07:25:07 odroid64 sshd\[17145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.170.70
Mar 15 07:25:09 odroid64 sshd\[17145\]: Failed password for invalid user qhsupport from 201.219.170.70 port 37284 ssh2
...
2019-10-18 05:40:56
46.32.229.24 attackbots
46.32.229.24 - - [17/Oct/2019:22:06:55 +0200] "POST /wp-login.php HTTP/1.1" 200 2112 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.32.229.24 - - [17/Oct/2019:22:06:55 +0200] "POST /wp-login.php HTTP/1.1" 200 2093 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-18 05:53:15
59.52.97.130 attackspambots
Oct 17 11:28:51 friendsofhawaii sshd\[25805\]: Invalid user pul from 59.52.97.130
Oct 17 11:28:51 friendsofhawaii sshd\[25805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.52.97.130
Oct 17 11:28:54 friendsofhawaii sshd\[25805\]: Failed password for invalid user pul from 59.52.97.130 port 51507 ssh2
Oct 17 11:33:58 friendsofhawaii sshd\[26238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.52.97.130  user=root
Oct 17 11:34:00 friendsofhawaii sshd\[26238\]: Failed password for root from 59.52.97.130 port 41736 ssh2
2019-10-18 05:48:34

最近上报的IP列表

252.62.220.197 50.164.251.49 144.179.39.188 197.4.70.35
38.189.202.148 126.81.107.128 50.145.159.8 61.144.98.79
200.160.201.252 199.194.1.64 175.93.62.56 19.186.74.28
183.189.127.250 51.4.167.137 64.50.103.120 59.184.78.102
71.188.199.44 40.47.63.49 232.114.112.232 31.45.156.170