必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.16.112.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.16.112.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 413 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 21:27:23 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 242.112.16.44.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.112.16.44.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.229.4.150 attack
Sep 20 20:09:12 mxgate1 postfix/postscreen[11682]: CONNECT from [197.229.4.150]:59707 to [176.31.12.44]:25
Sep 20 20:09:12 mxgate1 postfix/dnsblog[11687]: addr 197.229.4.150 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 20 20:09:12 mxgate1 postfix/dnsblog[11684]: addr 197.229.4.150 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Sep 20 20:09:12 mxgate1 postfix/dnsblog[11683]: addr 197.229.4.150 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 20 20:09:12 mxgate1 postfix/dnsblog[11685]: addr 197.229.4.150 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 20 20:09:12 mxgate1 postfix/dnsblog[11685]: addr 197.229.4.150 listed by domain zen.spamhaus.org as 127.0.0.10
Sep 20 20:09:18 mxgate1 postfix/postscreen[11682]: DNSBL rank 5 for [197.229.4.150]:59707
Sep x@x
Sep 20 20:09:19 mxgate1 postfix/postscreen[11682]: HANGUP after 0.96 from [197.229.4.150]:59707 in tests after SMTP handshake
Sep 20 20:09:19 mxgate1 postfix/postscreen[11682]: DISCONNECT [197.229.4.1........
-------------------------------
2019-09-21 03:16:24
54.37.138.172 attack
Sep 20 20:21:55 vpn01 sshd\[28056\]: Invalid user ftp from 54.37.138.172
Sep 20 20:21:55 vpn01 sshd\[28056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.138.172
Sep 20 20:21:57 vpn01 sshd\[28056\]: Failed password for invalid user ftp from 54.37.138.172 port 48872 ssh2
2019-09-21 03:20:52
58.58.135.158 attack
Brute force attempt
2019-09-21 03:40:50
70.37.49.155 attackbotsspam
2019-09-20T19:26:09.847209abusebot-5.cloudsearch.cf sshd\[16835\]: Invalid user stanphill from 70.37.49.155 port 38126
2019-09-21 03:43:28
35.199.154.128 attack
2019-09-20T18:54:32.042679abusebot-5.cloudsearch.cf sshd\[16708\]: Invalid user src_user from 35.199.154.128 port 54648
2019-09-21 03:12:36
182.74.190.198 attackbotsspam
Sep 20 09:27:49 eddieflores sshd\[4440\]: Invalid user africa from 182.74.190.198
Sep 20 09:27:49 eddieflores sshd\[4440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.190.198
Sep 20 09:27:50 eddieflores sshd\[4440\]: Failed password for invalid user africa from 182.74.190.198 port 46898 ssh2
Sep 20 09:37:22 eddieflores sshd\[5297\]: Invalid user Test from 182.74.190.198
Sep 20 09:37:22 eddieflores sshd\[5297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.190.198
2019-09-21 03:38:54
190.183.239.168 attackbotsspam
Unauthorized IMAP connection attempt
2019-09-21 03:46:10
106.12.215.130 attackspam
$f2bV_matches
2019-09-21 03:18:11
221.227.248.68 attackspam
2019-09-20 21:02:03 dovecot_login authenticator failed for (ofpnPJ) [221.227.248.68]:4120: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:02:27 dovecot_login authenticator failed for (afAr9Ni) [221.227.248.68]:3518: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:02:51 dovecot_login authenticator failed for (cmA5eWwvk) [221.227.248.68]:3683: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:03:19 dovecot_login authenticator failed for (slhiNa) [221.227.248.68]:4734: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:03:42 dovecot_login authenticator failed for (fhzJDS) [221.227.248.68]:1886: 535 Incorrect authentication data (set_id=rs)
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.227.248
2019-09-21 03:19:04
24.33.125.123 attackspambots
Triggered by Fail2Ban at Ares web server
2019-09-21 03:35:57
77.105.75.31 attack
Sep 20 20:49:53 mail sshd\[24652\]: Invalid user pi from 77.105.75.31
Sep 20 20:49:53 mail sshd\[24652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.105.75.31
Sep 20 20:49:54 mail sshd\[24652\]: Failed password for invalid user pi from 77.105.75.31 port 49663 ssh2
...
2019-09-21 03:12:23
220.134.144.96 attackbotsspam
Sep 20 21:25:09 vps01 sshd[14109]: Failed password for sync from 220.134.144.96 port 57204 ssh2
Sep 20 21:29:22 vps01 sshd[14177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96
2019-09-21 03:47:33
51.255.44.56 attackspam
Reported by AbuseIPDB proxy server.
2019-09-21 03:36:23
201.225.172.116 attack
2019-09-20T19:28:14.405223abusebot-2.cloudsearch.cf sshd\[21407\]: Invalid user marcy from 201.225.172.116 port 48220
2019-09-21 03:30:51
185.53.88.81 attack
SIP Server BruteForce Attack
2019-09-21 03:40:12

最近上报的IP列表

214.253.19.221 72.149.8.134 89.24.160.186 60.106.215.11
190.14.2.193 25.26.117.233 152.88.85.239 68.0.243.62
194.252.175.129 229.81.42.157 198.54.124.116 15.221.213.21
243.18.106.249 167.175.18.91 174.15.150.169 117.251.53.81
30.217.169.93 229.180.116.93 245.144.194.90 187.70.31.122