必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.130.91.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.130.91.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031601 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 17 12:50:59 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 242.91.130.6.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 242.91.130.6.in-addr.arpa: REFUSED

相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.172.149 attack
2020/09/20 19:36:02 [error] 22863#22863: *1716966 open() "/usr/share/nginx/html/phpMyAdmin/scripts/setup.php" failed (2: No such file or directory), client: 89.248.172.149, server: _, request: "GET /phpMyAdmin/scripts/setup.php HTTP/1.1", host: "185.118.197.123"
2020/09/20 19:36:02 [error] 22863#22863: *1716967 open() "/usr/share/nginx/html/phpmyadmin/scripts/setup.php" failed (2: No such file or directory), client: 89.248.172.149, server: _, request: "GET /phpmyadmin/scripts/setup.php HTTP/1.1", host: "185.118.197.123"
2020/09/20 19:36:02 [error] 22863#22863: *1716968 open() "/usr/share/nginx/html/pma/scripts/setup.php" failed (2: No such file or directory), client: 89.248.172.149, server: _, request: "GET /pma/scripts/setup.php HTTP/1.1", host: "185.118.197.123"
2020/09/20 19:36:02 [error] 22863#22863: *1716969 open() "/usr/share/nginx/html/myadmin/scripts/setup.php" failed (2: No such file or directory), client: 89.248.172.149, server: _, request: "GET /myadmin/scripts/setup.php HTTP/1.1", host: "185.118.
2020-09-21 02:30:07
91.121.81.12 attackbots
Sep 20 23:53:00 mx sshd[824580]: Invalid user guest from 91.121.81.12 port 45610
Sep 20 23:53:00 mx sshd[824580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.81.12 
Sep 20 23:53:00 mx sshd[824580]: Invalid user guest from 91.121.81.12 port 45610
Sep 20 23:53:02 mx sshd[824580]: Failed password for invalid user guest from 91.121.81.12 port 45610 ssh2
Sep 20 23:53:19 mx sshd[824582]: Invalid user guest from 91.121.81.12 port 33044
...
2020-09-21 02:38:11
129.204.33.4 attackspambots
Sep 20 16:03:57 sso sshd[28935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.33.4
Sep 20 16:03:58 sso sshd[28935]: Failed password for invalid user lsfadmin from 129.204.33.4 port 52814 ssh2
...
2020-09-21 02:11:06
49.235.229.211 attackspambots
2020-09-20T08:41:38.070693morrigan.ad5gb.com sshd[897429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.229.211  user=root
2020-09-20T08:41:40.067871morrigan.ad5gb.com sshd[897429]: Failed password for root from 49.235.229.211 port 52942 ssh2
2020-09-21 02:20:04
104.244.74.28 attackbotsspam
Sep 20 03:44:25 propaganda sshd[23022]: Connection from 104.244.74.28 port 55042 on 10.0.0.161 port 22 rdomain ""
Sep 20 03:44:26 propaganda sshd[23022]: Invalid user admin from 104.244.74.28 port 55042
2020-09-21 02:06:38
104.244.77.95 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-21 02:13:28
69.55.49.187 attackbotsspam
Invalid user tf2mgeserver from 69.55.49.187 port 41784
2020-09-21 02:09:41
49.234.80.94 attackspam
Sep 20 17:59:06 plex-server sshd[2887424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.80.94  user=root
Sep 20 17:59:08 plex-server sshd[2887424]: Failed password for root from 49.234.80.94 port 54058 ssh2
Sep 20 18:01:51 plex-server sshd[2888533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.80.94  user=root
Sep 20 18:01:53 plex-server sshd[2888533]: Failed password for root from 49.234.80.94 port 55740 ssh2
Sep 20 18:04:22 plex-server sshd[2889555]: Invalid user wp from 49.234.80.94 port 57388
...
2020-09-21 02:18:50
35.226.191.68 attackbots
xmlrpc attack
2020-09-21 02:14:07
180.166.240.99 attackbots
Sep 20 06:28:32 ns382633 sshd\[18968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.240.99  user=root
Sep 20 06:28:34 ns382633 sshd\[18968\]: Failed password for root from 180.166.240.99 port 59174 ssh2
Sep 20 06:43:01 ns382633 sshd\[21707\]: Invalid user admin1 from 180.166.240.99 port 50238
Sep 20 06:43:01 ns382633 sshd\[21707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.240.99
Sep 20 06:43:03 ns382633 sshd\[21707\]: Failed password for invalid user admin1 from 180.166.240.99 port 50238 ssh2
2020-09-21 02:11:54
65.182.2.241 attackbots
Sep 20 06:42:43 prox sshd[8199]: Failed password for root from 65.182.2.241 port 49716 ssh2
2020-09-21 02:08:38
143.255.8.2 attackspambots
2020-09-20T19:42:34.264009snf-827550 sshd[21454]: Failed password for root from 143.255.8.2 port 36572 ssh2
2020-09-20T19:45:49.007679snf-827550 sshd[21471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.8.2  user=root
2020-09-20T19:45:51.310760snf-827550 sshd[21471]: Failed password for root from 143.255.8.2 port 58580 ssh2
...
2020-09-21 02:17:48
112.199.118.195 attack
Sep 20 14:07:33 abendstille sshd\[26015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.118.195  user=root
Sep 20 14:07:36 abendstille sshd\[26015\]: Failed password for root from 112.199.118.195 port 63320 ssh2
Sep 20 14:12:05 abendstille sshd\[30566\]: Invalid user test from 112.199.118.195
Sep 20 14:12:05 abendstille sshd\[30566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.118.195
Sep 20 14:12:07 abendstille sshd\[30566\]: Failed password for invalid user test from 112.199.118.195 port 62893 ssh2
...
2020-09-21 02:34:50
221.143.48.143 attackbotsspam
Sep 20 19:59:56 [host] sshd[21729]: pam_unix(sshd:
Sep 20 19:59:59 [host] sshd[21729]: Failed passwor
Sep 20 20:03:55 [host] sshd[21836]: pam_unix(sshd:
2020-09-21 02:24:32
74.82.47.57 attack
Found on   Github Combined on 3 lists    / proto=6  .  srcport=60723  .  dstport=631  .     (1709)
2020-09-21 02:33:38

最近上报的IP列表

240.230.51.252 75.183.220.138 86.188.228.227 247.154.247.235
226.59.209.245 89.247.100.151 56.1.248.43 249.40.86.117
225.124.109.201 242.173.88.114 149.217.7.61 143.174.54.183
7.76.72.106 155.193.173.143 55.105.83.21 24.191.9.238
54.12.200.140 7.128.213.59 49.64.177.53 100.123.66.104