必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.199.189.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.199.189.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:22:24 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
242.189.199.52.in-addr.arpa domain name pointer smtp.toenec.it-builder.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.189.199.52.in-addr.arpa	name = smtp.toenec.it-builder.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.191.98.109 attack
suspicious action Tue, 03 Mar 2020 10:24:37 -0300
2020-03-03 23:01:57
93.174.95.106 attack
Mar  3 14:24:28 debian-2gb-nbg1-2 kernel: \[5501047.597832\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.106 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=120 ID=53091 PROTO=TCP SPT=23320 DPT=4443 WINDOW=21732 RES=0x00 SYN URGP=0
2020-03-03 23:18:30
181.65.180.251 attack
Oct 17 17:37:15 mercury smtpd[25937]: 1cf1c037d86581bf smtp event=failed-command address=181.65.180.251 host=181.65.180.251 command="RCPT to:" result="550 Invalid recipient"
...
2020-03-03 22:57:33
111.11.26.217 attack
CN_APNIC-HM_<177>1583241872 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 111.11.26.217:7217
2020-03-03 23:08:48
180.183.105.146 attackspambots
Oct 26 00:10:50 mercury smtpd[25937]: 1cf1e7753f093569 smtp event=failed-command address=180.183.105.146 host=mx-ll-180.183.105-146.dynamic.3bb.in.th command="AUTH PLAIN (...)" result="535 Authentication failed"
...
2020-03-03 23:20:47
188.166.216.84 attackspam
2020-03-03T13:56:17.411771host3.slimhost.com.ua sshd[1492038]: Failed password for invalid user test from 188.166.216.84 port 50768 ssh2
2020-03-03T14:24:45.091877host3.slimhost.com.ua sshd[1517252]: Invalid user intertelecom from 188.166.216.84 port 36401
2020-03-03T14:24:45.095868host3.slimhost.com.ua sshd[1517252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.216.84
2020-03-03T14:24:45.091877host3.slimhost.com.ua sshd[1517252]: Invalid user intertelecom from 188.166.216.84 port 36401
2020-03-03T14:24:46.436275host3.slimhost.com.ua sshd[1517252]: Failed password for invalid user intertelecom from 188.166.216.84 port 36401 ssh2
...
2020-03-03 22:45:28
107.175.89.162 attack
Jan  9 18:00:45 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=107.175.89.162 DST=109.74.200.221 LEN=37 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=UDP SPT=47679 DPT=123 LEN=17 
...
2020-03-03 22:46:45
123.148.247.164 attackspam
123.148.247.164 - - [13/Dec/2019:03:06:05 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
123.148.247.164 - - [13/Dec/2019:03:06:06 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
...
2020-03-03 23:17:14
109.197.188.34 attackspam
Feb 13 00:48:51 mercury wordpress(www.learnargentinianspanish.com)[18224]: XML-RPC authentication attempt for unknown user silvina from 109.197.188.34
...
2020-03-03 22:37:44
154.9.174.229 attackspambots
LAMP,DEF GET http://meyer-pants.com/magmi/web/magmi.php
2020-03-03 23:04:28
43.228.131.113 attackbotsspam
Unauthorised access (Mar  3) SRC=43.228.131.113 LEN=52 PREC=0x20 TTL=111 ID=24782 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-03 22:42:47
45.179.173.252 attackbots
Mar  3 11:08:47 ws22vmsma01 sshd[69635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.179.173.252
Mar  3 11:08:49 ws22vmsma01 sshd[69635]: Failed password for invalid user anil from 45.179.173.252 port 47222 ssh2
...
2020-03-03 22:59:02
106.107.209.64 attackspam
Dec 11 14:59:23 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=106.107.209.64 DST=109.74.200.221 LEN=32 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=UDP SPT=123 DPT=123 LEN=12 
...
2020-03-03 23:23:23
162.241.37.134 attack
suspicious action Tue, 03 Mar 2020 10:24:43 -0300
2020-03-03 22:53:17
109.193.157.68 attackspambots
[Thu Dec 26 19:14:39.625146 2019] [access_compat:error] [pid 21411] [client 109.193.157.68:44020] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-03-03 23:05:47

最近上报的IP列表

43.15.99.139 20.235.119.50 151.228.57.195 160.212.170.90
39.248.180.161 204.237.79.58 237.241.165.236 129.128.176.66
73.201.191.109 150.244.132.160 206.93.152.141 174.79.113.238
92.102.244.9 200.121.242.70 66.44.126.214 3.117.153.81
96.97.157.53 149.85.2.234 120.185.123.52 23.164.172.92