必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Cologne

省份(region): North Rhine-Westphalia

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 46.114.107.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;46.114.107.242.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:12:57 CST 2021
;; MSG SIZE  rcvd: 43

'
HOST信息:
242.107.114.46.in-addr.arpa domain name pointer dynamic-046-114-107-242.46.114.pool.telefonica.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.107.114.46.in-addr.arpa	name = dynamic-046-114-107-242.46.114.pool.telefonica.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.64.247.118 attack
Auto Detect Rule!
proto TCP (SYN), 13.64.247.118:45267->gjan.info:22, len 40
2020-08-11 06:15:50
182.61.105.127 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 06:36:18
218.92.0.247 attack
"Unauthorized connection attempt on SSHD detected"
2020-08-11 06:09:36
80.82.65.90 attackspam
SmallBizIT.US 3 packets to udp(53,123,389)
2020-08-11 06:37:38
188.80.255.137 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-11 06:43:12
112.197.32.136 attack
Unauthorized connection attempt from IP address 112.197.32.136 on Port 445(SMB)
2020-08-11 06:41:28
93.46.63.37 attack
Auto Detect Rule!
proto TCP (SYN), 93.46.63.37:28725->gjan.info:23, len 44
2020-08-11 06:10:31
143.255.140.232 attackspam
Unauthorized IMAP connection attempt
2020-08-11 06:21:49
36.80.189.115 attackbotsspam
Unauthorized connection attempt from IP address 36.80.189.115 on Port 445(SMB)
2020-08-11 06:14:12
213.74.133.10 attack
Unauthorized connection attempt from IP address 213.74.133.10 on Port 445(SMB)
2020-08-11 06:34:30
121.123.148.220 attack
firewall-block, port(s): 19552/tcp
2020-08-11 06:17:27
106.54.123.84 attackspambots
Aug 10 23:29:30  sshd\[3601\]: User root from 106.54.123.84 not allowed because not listed in AllowUsersAug 10 23:29:32  sshd\[3601\]: Failed password for invalid user root from 106.54.123.84 port 46618 ssh2
...
2020-08-11 06:45:18
191.53.52.96 attackbotsspam
Unauthorized connection attempt
IP: 191.53.52.96
Ports affected
    Message Submission (587) 
Abuse Confidence rating 41%
Found in DNSBL('s)
ASN Details
   AS28202 Rede Brasileira de Comunicacao Ltda
   Brazil (BR)
   CIDR 191.53.0.0/16
Log Date: 10/08/2020 8:14:14 PM UTC
2020-08-11 06:31:26
47.91.44.93 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 06:20:18
189.211.182.93 attackbotsspam
Unauthorized connection attempt from IP address 189.211.182.93 on Port 445(SMB)
2020-08-11 06:09:51

最近上报的IP列表

52.114.159.20 94.27.169.184 31.4.219.189 212.5.158.102
46.114.34.90 107.161.29.166 92.84.56.10 185.143.223.27
24.166.208.138 24.166.208.64 76.224.179.68 185.63.153.40
116.35.27.245 137.135.110.186 176.87.55.233 164.68.111.113
2.16.140.1 88.99.85.121 146.68.127.16 142.250.74.132