必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Czech Republic

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.141.249.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50856
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.141.249.42.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061503 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 06:06:06 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.249.141.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.249.141.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.109.79.253 attackbotsspam
2020-07-12 17:34:09,150 fail2ban.actions        [937]: NOTICE  [sshd] Ban 183.109.79.253
2020-07-12 18:09:52,130 fail2ban.actions        [937]: NOTICE  [sshd] Ban 183.109.79.253
2020-07-12 18:44:41,495 fail2ban.actions        [937]: NOTICE  [sshd] Ban 183.109.79.253
2020-07-12 19:19:17,325 fail2ban.actions        [937]: NOTICE  [sshd] Ban 183.109.79.253
2020-07-12 19:53:52,774 fail2ban.actions        [937]: NOTICE  [sshd] Ban 183.109.79.253
...
2020-07-13 03:33:12
218.92.0.133 attackspambots
Jul 12 21:27:28 PorscheCustomer sshd[2859]: Failed password for root from 218.92.0.133 port 65045 ssh2
Jul 12 21:27:41 PorscheCustomer sshd[2859]: Failed password for root from 218.92.0.133 port 65045 ssh2
Jul 12 21:27:41 PorscheCustomer sshd[2859]: error: maximum authentication attempts exceeded for root from 218.92.0.133 port 65045 ssh2 [preauth]
...
2020-07-13 03:35:49
91.121.173.98 attack
Jul 11 07:15:53 mail sshd[59153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.173.98 
Jul 11 07:15:56 mail sshd[59153]: Failed password for invalid user ziyi from 91.121.173.98 port 55780 ssh2
...
2020-07-13 03:32:12
124.156.240.219 attack
[Tue Jun 09 17:41:31 2020] - DDoS Attack From IP: 124.156.240.219 Port: 47476
2020-07-13 03:52:46
150.109.53.204 attackspam
Automatic report - Banned IP Access
2020-07-13 03:46:02
150.109.58.69 attackspambots
2020-07-12T12:47:55.341109abusebot-8.cloudsearch.cf sshd[28584]: Invalid user sdbadmin from 150.109.58.69 port 50204
2020-07-12T12:47:55.346665abusebot-8.cloudsearch.cf sshd[28584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.58.69
2020-07-12T12:47:55.341109abusebot-8.cloudsearch.cf sshd[28584]: Invalid user sdbadmin from 150.109.58.69 port 50204
2020-07-12T12:47:57.819462abusebot-8.cloudsearch.cf sshd[28584]: Failed password for invalid user sdbadmin from 150.109.58.69 port 50204 ssh2
2020-07-12T12:53:11.780215abusebot-8.cloudsearch.cf sshd[28692]: Invalid user thchoi from 150.109.58.69 port 47208
2020-07-12T12:53:11.786069abusebot-8.cloudsearch.cf sshd[28692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.58.69
2020-07-12T12:53:11.780215abusebot-8.cloudsearch.cf sshd[28692]: Invalid user thchoi from 150.109.58.69 port 47208
2020-07-12T12:53:13.972773abusebot-8.cloudsearch.cf sshd[286
...
2020-07-13 03:50:19
144.22.98.225 attack
$f2bV_matches
2020-07-13 03:40:58
41.87.3.134 attackspambots
Port probing on unauthorized port 8080
2020-07-13 03:54:48
1.194.238.187 attackspambots
Jul 12 18:26:51 scw-6657dc sshd[2641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.238.187
Jul 12 18:26:51 scw-6657dc sshd[2641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.238.187
Jul 12 18:26:54 scw-6657dc sshd[2641]: Failed password for invalid user rahimi from 1.194.238.187 port 57944 ssh2
...
2020-07-13 03:39:13
37.49.224.73 attackspambots
Jul 12 21:35:59 relay postfix/smtpd\[2861\]: warning: unknown\[37.49.224.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 21:36:21 relay postfix/smtpd\[4105\]: warning: unknown\[37.49.224.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 21:36:27 relay postfix/smtpd\[7419\]: warning: unknown\[37.49.224.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 21:36:37 relay postfix/smtpd\[5377\]: warning: unknown\[37.49.224.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 21:36:59 relay postfix/smtpd\[4160\]: warning: unknown\[37.49.224.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-13 03:55:23
124.105.173.17 attackspam
Jul 12 18:12:03 s1 sshd\[5853\]: Invalid user vmi from 124.105.173.17 port 42373
Jul 12 18:12:03 s1 sshd\[5853\]: Failed password for invalid user vmi from 124.105.173.17 port 42373 ssh2
Jul 12 18:13:25 s1 sshd\[5904\]: Invalid user nalla from 124.105.173.17 port 49068
Jul 12 18:13:25 s1 sshd\[5904\]: Failed password for invalid user nalla from 124.105.173.17 port 49068 ssh2
Jul 12 18:14:07 s1 sshd\[5944\]: Invalid user marie from 124.105.173.17 port 52516
Jul 12 18:14:07 s1 sshd\[5944\]: Failed password for invalid user marie from 124.105.173.17 port 52516 ssh2
...
2020-07-13 04:00:17
117.29.240.145 attackbots
Brute force attempt
2020-07-13 03:57:12
185.24.124.50 attack
1594582051 - 07/12/2020 21:27:31 Host: 185.24.124.50/185.24.124.50 Port: 445 TCP Blocked
2020-07-13 03:43:00
121.135.115.139 attackbotsspam
2020-07-12 05:14:51 server sshd[3321]: Failed password for invalid user mysql from 121.135.115.139 port 36306 ssh2
2020-07-13 03:27:22
202.70.66.227 attackspam
Port scan: Attack repeated for 24 hours
2020-07-13 04:02:24

最近上报的IP列表

45.141.219.226 45.141.251.36 37.61.224.240 45.142.29.132
45.142.189.112 45.116.157.29 45.118.205.227 45.119.5.8
78.137.95.243 78.153.50.160 45.119.88.54 45.119.88.114
45.120.125.21 45.120.127.6 45.120.127.12 45.121.109.240
45.121.109.254 45.121.218.6 7.71.253.45 78.154.166.66