必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.242.92.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.242.92.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:27:29 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 124.92.242.51.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.92.242.51.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
69.229.6.45 attackspambots
2020-01-10T05:51:30.083367-07:00 suse-nuc sshd[19958]: Invalid user shares from 69.229.6.45 port 32866
...
2020-01-11 04:39:16
194.50.254.225 attackspambots
unauthorized connection attempt
2020-01-11 04:53:29
193.70.38.187 attackbotsspam
Jan 10 18:24:56 ws12vmsma01 sshd[33665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.ip-193-70-38.eu  user=root
Jan 10 18:24:58 ws12vmsma01 sshd[33665]: Failed password for root from 193.70.38.187 port 44976 ssh2
Jan 10 18:27:32 ws12vmsma01 sshd[34032]: Invalid user security from 193.70.38.187
...
2020-01-11 04:40:44
112.85.42.174 attackspam
2020-01-10T21:11:51.540691vps751288.ovh.net sshd\[20183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
2020-01-10T21:11:53.409572vps751288.ovh.net sshd\[20183\]: Failed password for root from 112.85.42.174 port 40025 ssh2
2020-01-10T21:11:57.035228vps751288.ovh.net sshd\[20183\]: Failed password for root from 112.85.42.174 port 40025 ssh2
2020-01-10T21:12:00.541013vps751288.ovh.net sshd\[20183\]: Failed password for root from 112.85.42.174 port 40025 ssh2
2020-01-10T21:12:03.795116vps751288.ovh.net sshd\[20183\]: Failed password for root from 112.85.42.174 port 40025 ssh2
2020-01-11 04:23:48
114.124.161.122 attack
Jan 10 13:51:33 grey postfix/smtpd\[13995\]: NOQUEUE: reject: RCPT from unknown\[114.124.161.122\]: 554 5.7.1 Service unavailable\; Client host \[114.124.161.122\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=114.124.161.122\; from=\ to=\ proto=ESMTP helo=\<\[172.16.38.232\]\>
...
2020-01-11 04:36:51
106.75.113.53 attackspam
unauthorized connection attempt
2020-01-11 04:35:59
104.200.137.189 attackbots
$f2bV_matches
2020-01-11 04:19:28
178.34.152.180 attack
Port scan on 1 port(s): 3389
2020-01-11 04:17:14
198.27.90.106 attackbotsspam
Jan 10 15:57:39 124388 sshd[13629]: Invalid user cedric from 198.27.90.106 port 38467
Jan 10 15:57:39 124388 sshd[13629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
Jan 10 15:57:39 124388 sshd[13629]: Invalid user cedric from 198.27.90.106 port 38467
Jan 10 15:57:42 124388 sshd[13629]: Failed password for invalid user cedric from 198.27.90.106 port 38467 ssh2
Jan 10 15:59:46 124388 sshd[13660]: Invalid user oracle from 198.27.90.106 port 49098
2020-01-11 04:57:33
189.182.144.54 attack
20/1/10@07:51:38: FAIL: Alarm-Network address from=189.182.144.54
20/1/10@07:51:38: FAIL: Alarm-Network address from=189.182.144.54
...
2020-01-11 04:35:35
138.197.129.38 attackbots
Jan  9 08:01:24 tuxlinux sshd[39779]: Invalid user caim from 138.197.129.38 port 36866
Jan  9 08:01:24 tuxlinux sshd[39779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38 
Jan  9 08:01:24 tuxlinux sshd[39779]: Invalid user caim from 138.197.129.38 port 36866
Jan  9 08:01:24 tuxlinux sshd[39779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38 
Jan  9 08:01:24 tuxlinux sshd[39779]: Invalid user caim from 138.197.129.38 port 36866
Jan  9 08:01:24 tuxlinux sshd[39779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38 
Jan  9 08:01:26 tuxlinux sshd[39779]: Failed password for invalid user caim from 138.197.129.38 port 36866 ssh2
...
2020-01-11 04:32:22
36.99.141.211 attackspambots
Jan 10 16:10:19 legacy sshd[22856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.141.211
Jan 10 16:10:21 legacy sshd[22856]: Failed password for invalid user barison from 36.99.141.211 port 51338 ssh2
Jan 10 16:15:35 legacy sshd[23111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.141.211
...
2020-01-11 04:24:12
116.246.21.23 attackspam
SASL PLAIN auth failed: ruser=...
2020-01-11 04:40:16
132.232.74.106 attack
SSH Brute-Force reported by Fail2Ban
2020-01-11 04:50:06
163.53.24.15 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2020-01-11 04:39:54

最近上报的IP列表

217.124.14.87 47.157.151.191 157.16.208.255 8.105.122.242
228.195.31.141 233.147.89.130 191.117.219.105 18.166.106.47
247.102.160.205 86.120.25.21 152.9.93.170 141.133.176.164
172.23.77.238 192.208.219.159 189.48.47.206 59.68.182.41
221.93.29.44 193.185.102.197 148.63.99.118 254.56.78.27