必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.242.81.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.242.81.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 13:50:07 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
91.81.242.5.in-addr.arpa domain name pointer m5-242-81-91.cust.tele2.se.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.81.242.5.in-addr.arpa	name = m5-242-81-91.cust.tele2.se.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.203.201.125 attackspam
firewall-block, port(s): 1900/udp
2019-10-26 14:54:18
35.241.139.204 attack
2019-10-26T03:50:12.224187abusebot-8.cloudsearch.cf sshd\[4429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.139.241.35.bc.googleusercontent.com  user=root
2019-10-26 14:56:14
179.181.54.120 attackspambots
firewall-block, port(s): 23/tcp
2019-10-26 14:48:14
201.201.210.234 attackspambots
1433/tcp 445/tcp...
[2019-08-27/10-26]10pkt,2pt.(tcp)
2019-10-26 14:30:23
221.193.221.164 attackbotsspam
Oct 26 05:49:52 andromeda postfix/smtpd\[31943\]: warning: unknown\[221.193.221.164\]: SASL LOGIN authentication failed: authentication failure
Oct 26 05:49:55 andromeda postfix/smtpd\[23023\]: warning: unknown\[221.193.221.164\]: SASL LOGIN authentication failed: authentication failure
Oct 26 05:50:11 andromeda postfix/smtpd\[31943\]: warning: unknown\[221.193.221.164\]: SASL LOGIN authentication failed: authentication failure
Oct 26 05:50:24 andromeda postfix/smtpd\[22637\]: warning: unknown\[221.193.221.164\]: SASL LOGIN authentication failed: authentication failure
Oct 26 05:50:33 andromeda postfix/smtpd\[340\]: warning: unknown\[221.193.221.164\]: SASL LOGIN authentication failed: authentication failure
2019-10-26 14:37:54
41.214.139.226 attack
Oct 26 02:28:19 server sshd\[2776\]: Failed password for root from 41.214.139.226 port 59118 ssh2
Oct 26 09:41:26 server sshd\[11676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.139.226  user=root
Oct 26 09:41:28 server sshd\[11676\]: Failed password for root from 41.214.139.226 port 33462 ssh2
Oct 26 09:57:37 server sshd\[16858\]: Invalid user refunds from 41.214.139.226
Oct 26 09:57:37 server sshd\[16858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.139.226 
...
2019-10-26 15:04:00
74.82.47.7 attackspambots
firewall-block, port(s): 10001/udp
2019-10-26 15:03:38
188.166.181.139 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-26 14:38:07
3.95.186.231 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-10-26 14:33:49
138.197.189.138 attackspambots
Oct 26 05:32:38 ovpn sshd\[14441\]: Invalid user bmedina from 138.197.189.138
Oct 26 05:32:38 ovpn sshd\[14441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.138
Oct 26 05:32:40 ovpn sshd\[14441\]: Failed password for invalid user bmedina from 138.197.189.138 port 44978 ssh2
Oct 26 05:50:13 ovpn sshd\[17866\]: Invalid user eliott from 138.197.189.138
Oct 26 05:50:13 ovpn sshd\[17866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.138
2019-10-26 14:53:19
167.71.153.243 attackbots
firewall-block, port(s): 23/tcp
2019-10-26 14:51:07
101.124.6.112 attackspambots
Oct 25 20:12:58 hpm sshd\[16073\]: Invalid user ga from 101.124.6.112
Oct 25 20:12:58 hpm sshd\[16073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.6.112
Oct 25 20:12:59 hpm sshd\[16073\]: Failed password for invalid user ga from 101.124.6.112 port 56218 ssh2
Oct 25 20:17:39 hpm sshd\[16432\]: Invalid user scan from 101.124.6.112
Oct 25 20:17:39 hpm sshd\[16432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.6.112
2019-10-26 14:41:17
197.221.6.82 attack
1433/tcp 445/tcp...
[2019-08-28/10-26]8pkt,2pt.(tcp)
2019-10-26 14:27:33
209.235.67.48 attack
Invalid user appserver from 209.235.67.48 port 50990
2019-10-26 14:27:22
171.244.51.224 attackbotsspam
3389/tcp 3389/tcp 3389/tcp...
[2019-10-23/26]6pkt,1pt.(tcp)
2019-10-26 14:54:03

最近上报的IP列表

236.176.70.195 9.174.23.51 182.143.160.56 12.92.68.1
209.124.115.86 200.231.251.137 198.94.162.60 171.253.8.157
242.249.7.181 225.92.92.163 95.67.218.204 211.55.73.76
229.86.133.198 24.78.242.64 253.84.26.227 24.145.255.176
120.71.175.191 76.192.250.161 42.13.27.4 51.232.234.56