必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.239.6.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.239.6.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 04:49:25 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
194.6.239.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.6.239.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.109.196.143 attackbots
Jun 30 05:43:33 ovpn sshd\[21369\]: Invalid user support from 150.109.196.143
Jun 30 05:43:33 ovpn sshd\[21369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.196.143
Jun 30 05:43:36 ovpn sshd\[21369\]: Failed password for invalid user support from 150.109.196.143 port 60054 ssh2
Jun 30 05:47:14 ovpn sshd\[22046\]: Invalid user ruo from 150.109.196.143
Jun 30 05:47:14 ovpn sshd\[22046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.196.143
2019-06-30 12:10:16
117.5.216.201 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-06-30 12:33:44
133.130.88.87 attack
Jun 30 05:02:15 debian sshd\[27621\]: Invalid user admin from 133.130.88.87 port 33929
Jun 30 05:02:15 debian sshd\[27621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.88.87
...
2019-06-30 12:52:51
221.205.77.106 attack
2323/tcp
[2019-06-30]1pkt
2019-06-30 12:12:43
93.181.206.204 attackspam
Automatic report - Banned IP Access
2019-06-30 12:35:04
62.173.151.3 attackbots
SIP brute force
2019-06-30 12:47:27
104.199.137.183 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 12:24:11
151.234.223.109 attackspam
8080/tcp
[2019-06-30]1pkt
2019-06-30 12:50:49
168.195.47.60 attack
Jun 29 22:47:16 mailman postfix/smtpd[19245]: warning: unknown[168.195.47.60]: SASL PLAIN authentication failed: authentication failure
2019-06-30 12:08:46
121.180.147.241 attackspambots
5555/tcp
[2019-06-30]1pkt
2019-06-30 12:41:14
189.114.67.217 attack
Autoban   189.114.67.217 ABORTED AUTH
2019-06-30 12:51:47
192.241.247.89 attackbots
2019-06-30T06:08:26.693025scmdmz1 sshd\[31048\]: Invalid user byu from 192.241.247.89 port 38412
2019-06-30T06:08:26.696166scmdmz1 sshd\[31048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.247.89
2019-06-30T06:08:28.860147scmdmz1 sshd\[31048\]: Failed password for invalid user byu from 192.241.247.89 port 38412 ssh2
...
2019-06-30 12:41:44
189.28.182.170 attackspambots
8080/tcp
[2019-06-30]1pkt
2019-06-30 12:53:30
187.120.130.47 attackbots
SMTP-sasl brute force
...
2019-06-30 12:50:15
151.63.138.6 attack
60001/tcp
[2019-06-30]1pkt
2019-06-30 12:19:35

最近上报的IP列表

243.151.4.112 8.45.146.42 19.29.85.172 57.5.63.109
43.123.239.220 28.6.218.191 172.221.112.195 106.7.121.38
84.183.66.27 74.26.167.77 151.140.39.98 255.155.191.249
56.126.113.251 132.36.91.44 136.237.5.16 72.53.130.238
66.17.96.69 81.177.6.232 195.252.17.201 48.138.89.37