必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.248.195.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.248.195.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 00:14:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 18.195.248.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.195.248.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.149.8.71 attackspam
Repeated attempts against wp-login
2019-10-13 02:42:51
45.179.121.250 attack
TCP src-port=21561   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda         (869)
2019-10-13 02:53:39
159.89.110.45 attackbots
enlinea.de 159.89.110.45 \[12/Oct/2019:16:11:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 5639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
enlinea.de 159.89.110.45 \[12/Oct/2019:16:11:25 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4141 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-13 02:54:56
220.76.107.50 attack
Oct 12 18:08:02 host sshd\[13685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50  user=root
Oct 12 18:08:04 host sshd\[13685\]: Failed password for root from 220.76.107.50 port 49550 ssh2
...
2019-10-13 02:46:25
116.203.201.127 attack
serveres are UTC -0400
Lines containing failures of 116.203.201.127
Oct  8 07:31:02 tux2 sshd[7460]: Failed password for r.r from 116.203.201.127 port 46248 ssh2
Oct  8 07:31:02 tux2 sshd[7460]: Received disconnect from 116.203.201.127 port 46248:11: Bye Bye [preauth]
Oct  8 07:31:02 tux2 sshd[7460]: Disconnected from authenticating user r.r 116.203.201.127 port 46248 [preauth]
Oct  8 07:46:20 tux2 sshd[8265]: Failed password for r.r from 116.203.201.127 port 37932 ssh2
Oct  8 07:46:20 tux2 sshd[8265]: Received disconnect from 116.203.201.127 port 37932:11: Bye Bye [preauth]
Oct  8 07:46:20 tux2 sshd[8265]: Disconnected from authenticating user r.r 116.203.201.127 port 37932 [preauth]
Oct  8 07:49:46 tux2 sshd[8456]: Failed password for r.r from 116.203.201.127 port 51780 ssh2
Oct  8 07:49:46 tux2 sshd[8456]: Received disconnect from 116.203.201.127 port 51780:11: Bye Bye [preauth]
Oct  8 07:49:46 tux2 sshd[8456]: Disconnected from authenticating user r.r 116.203.201.127........
------------------------------
2019-10-13 02:41:04
89.252.191.61 attackspambots
Oct  8 05:16:03 netserv300 sshd[21674]: Connection from 89.252.191.61 port 55664 on 178.63.236.21 port 22
Oct  8 05:16:03 netserv300 sshd[21675]: Connection from 89.252.191.61 port 51972 on 178.63.236.16 port 22
Oct  8 05:16:03 netserv300 sshd[21676]: Connection from 89.252.191.61 port 45132 on 178.63.236.18 port 22
Oct  8 05:16:03 netserv300 sshd[21677]: Connection from 89.252.191.61 port 50022 on 178.63.236.19 port 22
Oct  8 05:16:03 netserv300 sshd[21678]: Connection from 89.252.191.61 port 60436 on 178.63.236.17 port 22
Oct  8 05:16:03 netserv300 sshd[21679]: Connection from 89.252.191.61 port 42988 on 178.63.236.20 port 22
Oct  8 05:16:03 netserv300 sshd[21680]: Connection from 89.252.191.61 port 60376 on 178.63.236.22 port 22
Oct  8 05:19:02 netserv300 sshd[21689]: Connection from 89.252.191.61 port 48686 on 178.63.236.17 port 22
Oct  8 05:19:18 netserv300 sshd[21691]: Connection from 89.252.191.61 port 55872 on 178.63.236.18 port 22
Oct  8 05:19:19 netserv300 sshd........
------------------------------
2019-10-13 02:22:07
109.133.104.45 attack
Oct 12 18:08:09 vps sshd[14437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.133.104.45 
Oct 12 18:08:11 vps sshd[14437]: Failed password for invalid user admin from 109.133.104.45 port 39240 ssh2
Oct 12 18:08:29 vps sshd[14460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.133.104.45 
...
2019-10-13 02:14:47
149.56.89.123 attack
Oct 12 16:02:52 MainVPS sshd[15649]: Invalid user Madonna@2017 from 149.56.89.123 port 51134
Oct 12 16:02:52 MainVPS sshd[15649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123
Oct 12 16:02:52 MainVPS sshd[15649]: Invalid user Madonna@2017 from 149.56.89.123 port 51134
Oct 12 16:02:54 MainVPS sshd[15649]: Failed password for invalid user Madonna@2017 from 149.56.89.123 port 51134 ssh2
Oct 12 16:12:11 MainVPS sshd[16402]: Invalid user Jelszo12# from 149.56.89.123 port 42792
...
2019-10-13 02:25:26
219.150.116.52 attackspam
Oct 12 20:20:07 andromeda postfix/smtpd\[1977\]: warning: unknown\[219.150.116.52\]: SASL LOGIN authentication failed: authentication failure
Oct 12 20:20:11 andromeda postfix/smtpd\[1977\]: warning: unknown\[219.150.116.52\]: SASL LOGIN authentication failed: authentication failure
Oct 12 20:20:18 andromeda postfix/smtpd\[53304\]: warning: unknown\[219.150.116.52\]: SASL LOGIN authentication failed: authentication failure
Oct 12 20:20:23 andromeda postfix/smtpd\[1978\]: warning: unknown\[219.150.116.52\]: SASL LOGIN authentication failed: authentication failure
Oct 12 20:20:32 andromeda postfix/smtpd\[1977\]: warning: unknown\[219.150.116.52\]: SASL LOGIN authentication failed: authentication failure
2019-10-13 02:46:44
177.128.70.240 attackspambots
Oct 12 19:46:48 [host] sshd[20536]: Invalid user Standard[at]2017 from 177.128.70.240
Oct 12 19:46:48 [host] sshd[20536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.128.70.240
Oct 12 19:46:50 [host] sshd[20536]: Failed password for invalid user Standard[at]2017 from 177.128.70.240 port 57898 ssh2
2019-10-13 02:11:31
213.159.206.233 attackspam
rdp brute-force attack
2019-10-13 02:54:10
105.96.52.39 attackspam
Oct 12 18:04:10 tux-35-217 sshd\[14981\]: Invalid user Welc0me\#12345 from 105.96.52.39 port 46590
Oct 12 18:04:10 tux-35-217 sshd\[14981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.96.52.39
Oct 12 18:04:11 tux-35-217 sshd\[14981\]: Failed password for invalid user Welc0me\#12345 from 105.96.52.39 port 46590 ssh2
Oct 12 18:09:31 tux-35-217 sshd\[14994\]: Invalid user Restaurant123 from 105.96.52.39 port 43376
Oct 12 18:09:31 tux-35-217 sshd\[14994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.96.52.39
...
2019-10-13 02:24:36
202.100.182.250 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-10-13 02:41:24
77.42.76.195 attack
Automatic report - Port Scan Attack
2019-10-13 02:43:54
206.81.11.216 attack
Oct 12 20:21:35 v22019058497090703 sshd[16697]: Failed password for root from 206.81.11.216 port 47608 ssh2
Oct 12 20:25:45 v22019058497090703 sshd[17013]: Failed password for root from 206.81.11.216 port 59096 ssh2
...
2019-10-13 02:30:53

最近上报的IP列表

109.62.4.80 189.181.213.116 113.51.226.64 255.203.252.31
56.86.146.151 19.43.171.146 225.83.167.68 115.72.39.126
7.187.72.23 124.159.159.36 133.74.19.196 7.137.241.28
118.180.69.133 103.204.253.106 95.107.224.250 97.138.145.237
233.255.67.239 2.221.28.109 44.31.123.120 187.150.7.207