必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.81.249.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.81.249.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:02:35 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 42.249.81.91.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.249.81.91.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.220.114.142 attackspam
postfix
2019-11-11 21:35:56
180.76.235.219 attackbotsspam
Nov 11 10:07:09 lnxmysql61 sshd[6447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.235.219
2019-11-11 21:43:54
50.251.183.1 attackbots
2019-11-11T07:04:25.093164beta postfix/smtpd[5480]: NOQUEUE: reject: RCPT from 50-251-183-1-static.hfc.comcastbusiness.net[50.251.183.1]: 554 5.7.1 Service unavailable; Client host [50.251.183.1] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/50.251.183.1; from= to= proto=ESMTP helo=<50-251-183-1-static.hfc.comcastbusiness.net>
...
2019-11-11 22:04:44
104.248.37.88 attackbots
104.248.37.88 was recorded 5 times by 5 hosts attempting to connect to the following ports: 2200. Incident counter (4h, 24h, all-time): 5, 12, 53
2019-11-11 21:52:09
106.75.157.9 attack
Nov 11 00:12:21 web1 sshd\[7373\]: Invalid user talk from 106.75.157.9
Nov 11 00:12:21 web1 sshd\[7373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.157.9
Nov 11 00:12:22 web1 sshd\[7373\]: Failed password for invalid user talk from 106.75.157.9 port 36020 ssh2
Nov 11 00:16:37 web1 sshd\[7741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.157.9  user=root
Nov 11 00:16:39 web1 sshd\[7741\]: Failed password for root from 106.75.157.9 port 42308 ssh2
2019-11-11 21:45:00
37.187.0.20 attackspam
Nov 11 09:35:54 server sshd\[14747\]: Invalid user keyna from 37.187.0.20
Nov 11 09:35:54 server sshd\[14747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu 
Nov 11 09:35:56 server sshd\[14747\]: Failed password for invalid user keyna from 37.187.0.20 port 56400 ssh2
Nov 11 09:44:39 server sshd\[16721\]: Invalid user admin from 37.187.0.20
Nov 11 09:44:39 server sshd\[16721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu 
...
2019-11-11 21:43:22
103.253.107.43 attackspam
Nov 11 05:07:19 server sshd\[9233\]: Failed password for invalid user sandy from 103.253.107.43 port 38344 ssh2
Nov 11 16:07:36 server sshd\[22903\]: Invalid user tetsuo from 103.253.107.43
Nov 11 16:07:36 server sshd\[22903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.107.43 
Nov 11 16:07:38 server sshd\[22903\]: Failed password for invalid user tetsuo from 103.253.107.43 port 48170 ssh2
Nov 11 16:17:13 server sshd\[25366\]: Invalid user schwanz from 103.253.107.43
Nov 11 16:17:13 server sshd\[25366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.107.43 
...
2019-11-11 22:11:56
103.76.252.6 attack
Nov 11 02:09:04 ny01 sshd[2258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
Nov 11 02:09:06 ny01 sshd[2258]: Failed password for invalid user ytrewq from 103.76.252.6 port 25410 ssh2
Nov 11 02:13:37 ny01 sshd[2678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
2019-11-11 21:45:22
192.241.211.215 attack
2019-11-11T09:38:31.348405hub.schaetter.us sshd\[31110\]: Invalid user yukihiko from 192.241.211.215 port 51235
2019-11-11T09:38:31.357150hub.schaetter.us sshd\[31110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.215
2019-11-11T09:38:32.907630hub.schaetter.us sshd\[31110\]: Failed password for invalid user yukihiko from 192.241.211.215 port 51235 ssh2
2019-11-11T09:42:52.539655hub.schaetter.us sshd\[31161\]: Invalid user !2\#4%6\&8\(0 from 192.241.211.215 port 41275
2019-11-11T09:42:52.548682hub.schaetter.us sshd\[31161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.215
...
2019-11-11 21:54:21
183.82.101.66 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-11-11 21:57:02
194.87.111.98 attackbotsspam
Nov 11 10:55:19 server sshd\[3080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.87.111.98  user=mysql
Nov 11 10:55:21 server sshd\[3080\]: Failed password for mysql from 194.87.111.98 port 50492 ssh2
Nov 11 11:17:48 server sshd\[8733\]: Invalid user tomcat from 194.87.111.98
Nov 11 11:17:48 server sshd\[8733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.87.111.98 
Nov 11 11:17:50 server sshd\[8733\]: Failed password for invalid user tomcat from 194.87.111.98 port 40598 ssh2
...
2019-11-11 21:51:40
31.46.16.95 attack
Nov 11 10:46:16 [host] sshd[7321]: Invalid user guest from 31.46.16.95
Nov 11 10:46:16 [host] sshd[7321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.16.95
Nov 11 10:46:18 [host] sshd[7321]: Failed password for invalid user guest from 31.46.16.95 port 35658 ssh2
2019-11-11 21:40:50
77.247.110.58 attack
" "
2019-11-11 21:58:49
222.76.212.13 attack
Nov 11 12:33:03 ip-172-31-62-245 sshd\[23373\]: Failed password for root from 222.76.212.13 port 60138 ssh2\
Nov 11 12:37:54 ip-172-31-62-245 sshd\[23401\]: Invalid user deploy from 222.76.212.13\
Nov 11 12:37:57 ip-172-31-62-245 sshd\[23401\]: Failed password for invalid user deploy from 222.76.212.13 port 39068 ssh2\
Nov 11 12:42:49 ip-172-31-62-245 sshd\[23514\]: Invalid user soloman from 222.76.212.13\
Nov 11 12:42:51 ip-172-31-62-245 sshd\[23514\]: Failed password for invalid user soloman from 222.76.212.13 port 46222 ssh2\
2019-11-11 21:53:54
110.45.155.101 attackspambots
Nov 11 08:16:32 XXXXXX sshd[40469]: Invalid user demo from 110.45.155.101 port 35626
2019-11-11 21:37:11

最近上报的IP列表

32.31.143.210 167.115.142.92 175.105.48.5 178.118.203.160
125.246.42.36 2.170.237.233 29.103.145.112 40.169.186.239
154.179.139.234 233.47.195.152 5.102.68.60 51.97.55.112
20.249.7.200 114.126.192.132 51.117.89.199 179.50.88.25
179.39.26.19 140.117.120.96 225.235.22.38 181.79.246.242