必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Iceland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.221.42.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.221.42.206.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:08:50 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 206.42.221.82.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 206.42.221.82.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.44.229.137 attack
Unauthorized connection attempt from IP address 185.44.229.137 on Port 445(SMB)
2020-08-23 08:33:10
123.132.237.18 attack
Aug 23 05:55:43 prox sshd[27956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.132.237.18 
Aug 23 05:55:45 prox sshd[27956]: Failed password for invalid user dante from 123.132.237.18 port 36038 ssh2
2020-08-23 12:12:13
51.79.98.77 attackspam
[2020-08-22 23:53:12] NOTICE[1185][C-00005026] chan_sip.c: Call from '' (51.79.98.77:14592) to extension '003293520263' rejected because extension not found in context 'public'.
[2020-08-22 23:53:12] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-22T23:53:12.301-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="003293520263",SessionID="0x7f10c43f67a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.79.98.77/14592",ACLName="no_extension_match"
[2020-08-22 23:55:45] NOTICE[1185][C-0000502a] chan_sip.c: Call from '' (51.79.98.77:8624) to extension '+3293520263' rejected because extension not found in context 'public'.
[2020-08-22 23:55:45] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-22T23:55:45.164-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+3293520263",SessionID="0x7f10c4481d18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.79.98.77/8624",ACL
...
2020-08-23 12:13:13
190.34.184.214 attack
Aug 23 04:49:29 rocket sshd[7020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.34.184.214
Aug 23 04:49:31 rocket sshd[7020]: Failed password for invalid user test from 190.34.184.214 port 34238 ssh2
Aug 23 04:55:43 rocket sshd[7919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.34.184.214
...
2020-08-23 12:14:03
192.99.4.59 attackspam
192.99.4.59 - - [23/Aug/2020:04:50:28 +0100] "POST /wp-login.php HTTP/1.1" 200 5985 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.59 - - [23/Aug/2020:04:52:55 +0100] "POST /wp-login.php HTTP/1.1" 200 5985 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.59 - - [23/Aug/2020:04:55:52 +0100] "POST /wp-login.php HTTP/1.1" 200 5985 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-23 12:04:05
141.98.9.161 attackbots
2020-08-23T04:01:00.887885dmca.cloudsearch.cf sshd[20630]: Invalid user admin from 141.98.9.161 port 40323
2020-08-23T04:01:00.896128dmca.cloudsearch.cf sshd[20630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-08-23T04:01:00.887885dmca.cloudsearch.cf sshd[20630]: Invalid user admin from 141.98.9.161 port 40323
2020-08-23T04:01:02.883229dmca.cloudsearch.cf sshd[20630]: Failed password for invalid user admin from 141.98.9.161 port 40323 ssh2
2020-08-23T04:01:23.377379dmca.cloudsearch.cf sshd[20715]: Invalid user ubnt from 141.98.9.161 port 42311
2020-08-23T04:01:23.383250dmca.cloudsearch.cf sshd[20715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-08-23T04:01:23.377379dmca.cloudsearch.cf sshd[20715]: Invalid user ubnt from 141.98.9.161 port 42311
2020-08-23T04:01:25.194544dmca.cloudsearch.cf sshd[20715]: Failed password for invalid user ubnt from 141.98.9.161 port 42
...
2020-08-23 12:21:04
85.192.173.32 attackbotsspam
Aug 23 03:51:23 onepixel sshd[2982334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.173.32 
Aug 23 03:51:23 onepixel sshd[2982334]: Invalid user boy from 85.192.173.32 port 53584
Aug 23 03:51:25 onepixel sshd[2982334]: Failed password for invalid user boy from 85.192.173.32 port 53584 ssh2
Aug 23 03:55:44 onepixel sshd[2983079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.173.32  user=root
Aug 23 03:55:46 onepixel sshd[2983079]: Failed password for root from 85.192.173.32 port 60432 ssh2
2020-08-23 12:12:44
95.182.122.131 attackbots
2020-08-23T03:51:48.469054shield sshd\[3750\]: Invalid user denis from 95.182.122.131 port 44907
2020-08-23T03:51:48.478401shield sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.182.122.131
2020-08-23T03:51:51.017840shield sshd\[3750\]: Failed password for invalid user denis from 95.182.122.131 port 44907 ssh2
2020-08-23T03:55:48.826545shield sshd\[4737\]: Invalid user audio from 95.182.122.131 port 48427
2020-08-23T03:55:48.835233shield sshd\[4737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.182.122.131
2020-08-23 12:07:28
45.55.184.78 attack
Aug 23 06:08:13 PorscheCustomer sshd[514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78
Aug 23 06:08:16 PorscheCustomer sshd[514]: Failed password for invalid user lh from 45.55.184.78 port 57044 ssh2
Aug 23 06:13:52 PorscheCustomer sshd[758]: Failed password for root from 45.55.184.78 port 36944 ssh2
...
2020-08-23 12:25:24
210.178.123.156 attackspam
SSH_scan
2020-08-23 08:30:48
94.191.11.96 attack
Invalid user tir from 94.191.11.96 port 36098
2020-08-23 12:01:51
110.144.11.30 attackspam
(sshd) Failed SSH login from 110.144.11.30 (AU/Australia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 23 00:10:18 amsweb01 sshd[20369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.144.11.30  user=mark
Aug 23 00:10:20 amsweb01 sshd[20369]: Failed password for mark from 110.144.11.30 port 59488 ssh2
Aug 23 00:24:08 amsweb01 sshd[24812]: Invalid user orange from 110.144.11.30 port 51185
Aug 23 00:24:10 amsweb01 sshd[24812]: Failed password for invalid user orange from 110.144.11.30 port 51185 ssh2
Aug 23 00:30:09 amsweb01 sshd[25689]: Invalid user qml from 110.144.11.30 port 55286
2020-08-23 08:28:46
192.241.235.69 attack
Unauthorized connection attempt detected from IP address 192.241.235.69 to port 1723 [T]
2020-08-23 08:31:21
141.98.9.137 attack
Aug 23 05:55:41 vpn01 sshd[26951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.137
Aug 23 05:55:43 vpn01 sshd[26951]: Failed password for invalid user operator from 141.98.9.137 port 43248 ssh2
...
2020-08-23 12:15:06
189.17.107.26 attackspam
Unauthorized connection attempt from IP address 189.17.107.26 on Port 445(SMB)
2020-08-23 08:35:29

最近上报的IP列表

35.147.224.162 17.184.144.17 212.37.210.49 140.0.143.227
131.224.93.196 5.157.19.147 54.189.215.126 129.147.163.203
207.110.127.142 8.38.109.98 18.49.246.81 40.105.68.18
137.226.84.57 97.1.120.117 243.126.121.205 67.45.14.90
96.159.250.27 184.150.182.149 24.240.46.199 44.170.88.121