必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 7.242.21.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;7.242.21.191.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:13:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 191.21.242.7.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 191.21.242.7.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.225.67.233 attackbotsspam
Apr 25 14:31:37 pve1 sshd[15089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.67.233 
Apr 25 14:31:39 pve1 sshd[15089]: Failed password for invalid user admin from 64.225.67.233 port 47884 ssh2
...
2020-04-26 00:53:56
103.141.174.154 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-26 01:29:14
114.35.170.170 attackspambots
" "
2020-04-26 00:47:55
49.77.217.155 attackspam
MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability, PTR: PTR record not found
2020-04-26 00:46:46
189.237.101.5 attack
(sshd) Failed SSH login from 189.237.101.5 (MX/Mexico/dsl-189-237-101-5-dyn.prod-infinitum.com.mx): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 25 14:14:17 ubnt-55d23 sshd[4428]: Invalid user qiang from 189.237.101.5 port 38444
Apr 25 14:14:19 ubnt-55d23 sshd[4428]: Failed password for invalid user qiang from 189.237.101.5 port 38444 ssh2
2020-04-26 00:47:32
140.0.143.218 attackbots
Email rejected due to spam filtering
2020-04-26 01:21:46
123.206.36.174 attackbotsspam
Apr 25 14:04:45 ns392434 sshd[21167]: Invalid user nologin from 123.206.36.174 port 35220
Apr 25 14:04:45 ns392434 sshd[21167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.36.174
Apr 25 14:04:45 ns392434 sshd[21167]: Invalid user nologin from 123.206.36.174 port 35220
Apr 25 14:04:47 ns392434 sshd[21167]: Failed password for invalid user nologin from 123.206.36.174 port 35220 ssh2
Apr 25 14:11:37 ns392434 sshd[21372]: Invalid user pul from 123.206.36.174 port 51802
Apr 25 14:11:37 ns392434 sshd[21372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.36.174
Apr 25 14:11:37 ns392434 sshd[21372]: Invalid user pul from 123.206.36.174 port 51802
Apr 25 14:11:39 ns392434 sshd[21372]: Failed password for invalid user pul from 123.206.36.174 port 51802 ssh2
Apr 25 14:14:16 ns392434 sshd[21470]: Invalid user smile from 123.206.36.174 port 48986
2020-04-26 00:52:55
46.219.208.13 attackspam
Email rejected due to spam filtering
2020-04-26 01:11:56
41.0.181.251 attackspambots
41.0.181.251 has been banned for [spam]
...
2020-04-26 01:14:22
136.255.144.2 attack
Bruteforce detected by fail2ban
2020-04-26 01:25:16
103.89.90.188 attack
" "
2020-04-26 01:15:56
201.48.192.60 attackbots
Apr 25 15:15:57 work-partkepr sshd\[16457\]: Invalid user ftpuser from 201.48.192.60 port 50524
Apr 25 15:15:57 work-partkepr sshd\[16457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
...
2020-04-26 01:28:57
220.165.15.228 attackbotsspam
odoo8
...
2020-04-26 00:52:34
218.212.94.121 attackbotsspam
Email rejected due to spam filtering
2020-04-26 01:04:57
184.105.247.211 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-26 00:58:31

最近上报的IP列表

28.189.230.2 224.161.164.208 46.192.196.98 140.168.22.231
53.235.246.31 51.134.228.210 90.17.224.75 31.152.93.63
179.250.48.68 83.67.250.243 134.140.175.133 71.210.93.24
213.111.46.215 43.118.154.21 50.230.85.204 109.251.176.73
60.210.130.91 126.20.202.136 230.232.230.136 95.191.209.104