必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.143.230.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.143.230.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 21:14:04 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 242.230.143.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.230.143.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.30.119.49 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/62.30.119.49/ 
 
 GB - 1H : (85)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN5089 
 
 IP : 62.30.119.49 
 
 CIDR : 62.30.0.0/16 
 
 PREFIX COUNT : 259 
 
 UNIQUE IP COUNT : 9431296 
 
 
 ATTACKS DETECTED ASN5089 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-11-15 15:43:24 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-16 01:08:56
2.61.130.65 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/2.61.130.65/ 
 
 RU - 1H : (164)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 2.61.130.65 
 
 CIDR : 2.61.0.0/16 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 6 
  3H - 11 
  6H - 22 
 12H - 32 
 24H - 60 
 
 DateTime : 2019-11-15 15:43:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-16 00:44:10
81.22.45.51 attack
Nov 15 17:31:57 mc1 kernel: \[5121785.887262\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.51 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=11135 PROTO=TCP SPT=40354 DPT=6929 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 15 17:37:07 mc1 kernel: \[5122095.354184\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.51 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=62179 PROTO=TCP SPT=40354 DPT=6229 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 15 17:37:45 mc1 kernel: \[5122133.023677\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.51 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=17502 PROTO=TCP SPT=40354 DPT=6844 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-16 00:54:18
182.72.178.114 attack
2019-11-15T17:42:06.545571scmdmz1 sshd\[4963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
2019-11-15T17:42:08.326382scmdmz1 sshd\[4963\]: Failed password for root from 182.72.178.114 port 28750 ssh2
2019-11-15T17:46:03.330907scmdmz1 sshd\[5276\]: Invalid user uucp from 182.72.178.114 port 33031
...
2019-11-16 00:56:40
36.155.102.111 attack
Nov 15 14:38:25 zeus sshd[26239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.102.111 
Nov 15 14:38:27 zeus sshd[26239]: Failed password for invalid user seip from 36.155.102.111 port 34310 ssh2
Nov 15 14:43:50 zeus sshd[26363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.102.111 
Nov 15 14:43:52 zeus sshd[26363]: Failed password for invalid user nologin from 36.155.102.111 port 39094 ssh2
2019-11-16 00:49:27
111.230.105.196 attackspam
Nov 15 13:50:40 firewall sshd[26158]: Invalid user neghin from 111.230.105.196
Nov 15 13:50:42 firewall sshd[26158]: Failed password for invalid user neghin from 111.230.105.196 port 44076 ssh2
Nov 15 13:56:54 firewall sshd[26286]: Invalid user operator from 111.230.105.196
...
2019-11-16 01:20:40
106.38.108.28 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 00:52:21
110.16.135.104 attackspambots
Scanning
2019-11-16 00:37:31
46.101.17.215 attackbots
Nov 15 17:07:16 sd-53420 sshd\[5386\]: Invalid user toe from 46.101.17.215
Nov 15 17:07:16 sd-53420 sshd\[5386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215
Nov 15 17:07:18 sd-53420 sshd\[5386\]: Failed password for invalid user toe from 46.101.17.215 port 42520 ssh2
Nov 15 17:10:57 sd-53420 sshd\[6476\]: Invalid user kunihisa from 46.101.17.215
Nov 15 17:10:57 sd-53420 sshd\[6476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215
...
2019-11-16 01:00:17
63.88.23.130 attack
63.88.23.130 was recorded 5 times by 4 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 5, 33, 108
2019-11-16 00:53:21
95.85.60.251 attack
Nov 15 17:36:41 vtv3 sshd\[17473\]: Invalid user gubenco from 95.85.60.251 port 42830
Nov 15 17:36:41 vtv3 sshd\[17473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
Nov 15 17:36:43 vtv3 sshd\[17473\]: Failed password for invalid user gubenco from 95.85.60.251 port 42830 ssh2
Nov 15 17:43:39 vtv3 sshd\[18511\]: Invalid user wwwadmin from 95.85.60.251 port 52130
Nov 15 17:43:39 vtv3 sshd\[18511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
Nov 15 17:55:11 vtv3 sshd\[20714\]: Invalid user counsel from 95.85.60.251 port 42486
Nov 15 17:55:11 vtv3 sshd\[20714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
Nov 15 17:55:13 vtv3 sshd\[20714\]: Failed password for invalid user counsel from 95.85.60.251 port 42486 ssh2
Nov 15 18:00:08 vtv3 sshd\[21458\]: Invalid user martha from 95.85.60.251 port 51774
Nov 15 18:00:08 vtv3 sshd\[21458\]: pa
2019-11-16 00:59:29
183.82.121.34 attackbotsspam
2019-11-15T16:46:32.047857abusebot-4.cloudsearch.cf sshd\[7877\]: Invalid user kjierstan from 183.82.121.34 port 42857
2019-11-16 01:14:05
112.64.170.178 attackspambots
Nov 15 17:52:48 cp sshd[19390]: Failed password for root from 112.64.170.178 port 31109 ssh2
Nov 15 17:52:48 cp sshd[19390]: Failed password for root from 112.64.170.178 port 31109 ssh2
2019-11-16 01:01:48
90.175.125.133 attackbots
Scanning
2019-11-16 01:03:57
122.51.49.91 attackbotsspam
Nov 15 16:46:56 MK-Soft-VM5 sshd[21180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.91 
Nov 15 16:46:58 MK-Soft-VM5 sshd[21180]: Failed password for invalid user mysql from 122.51.49.91 port 35604 ssh2
...
2019-11-16 00:35:44

最近上报的IP列表

211.80.61.94 103.200.64.214 198.81.214.66 37.98.99.190
155.127.89.12 167.99.154.222 82.83.160.70 255.59.238.202
41.81.197.255 174.60.144.97 198.3.14.117 179.219.14.240
2.212.123.128 168.164.74.23 56.53.16.9 250.6.7.66
31.144.64.108 233.195.238.177 208.68.84.250 12.199.122.103