必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Czechia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.241.97.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.241.97.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 164 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:48:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
242.97.241.94.in-addr.arpa domain name pointer 242.97.241.94.client.nordic.tel.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.97.241.94.in-addr.arpa	name = 242.97.241.94.client.nordic.tel.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.47.214.28 attackbots
Invalid user harry from 189.47.214.28 port 34272
2020-10-02 20:00:59
113.184.19.94 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: static.vnpt.vn.
2020-10-02 19:55:28
157.230.42.76 attackspambots
repeated SSH login attempts
2020-10-02 20:07:42
122.51.68.119 attackspam
fail2ban: brute force SSH detected
2020-10-02 19:59:38
218.241.134.34 attackspam
Oct  2 11:50:50 localhost sshd[115240]: Invalid user tor from 218.241.134.34 port 19694
Oct  2 11:50:50 localhost sshd[115240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34
Oct  2 11:50:50 localhost sshd[115240]: Invalid user tor from 218.241.134.34 port 19694
Oct  2 11:50:51 localhost sshd[115240]: Failed password for invalid user tor from 218.241.134.34 port 19694 ssh2
Oct  2 11:55:26 localhost sshd[115676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34  user=root
Oct  2 11:55:27 localhost sshd[115676]: Failed password for root from 218.241.134.34 port 51575 ssh2
...
2020-10-02 20:02:42
180.76.141.221 attackspambots
(sshd) Failed SSH login from 180.76.141.221 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  2 06:52:10 server sshd[10241]: Invalid user admin from 180.76.141.221 port 54318
Oct  2 06:52:12 server sshd[10241]: Failed password for invalid user admin from 180.76.141.221 port 54318 ssh2
Oct  2 07:01:51 server sshd[12629]: Invalid user svnuser from 180.76.141.221 port 55407
Oct  2 07:01:53 server sshd[12629]: Failed password for invalid user svnuser from 180.76.141.221 port 55407 ssh2
Oct  2 07:11:25 server sshd[15123]: Invalid user tmp from 180.76.141.221 port 55981
2020-10-02 20:01:23
162.243.128.133 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-02 20:08:47
125.121.170.115 attack
Oct  1 20:33:04 CT3029 sshd[7708]: Invalid user user from 125.121.170.115 port 55410
Oct  1 20:33:04 CT3029 sshd[7708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.121.170.115
Oct  1 20:33:06 CT3029 sshd[7708]: Failed password for invalid user user from 125.121.170.115 port 55410 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.121.170.115
2020-10-02 19:49:26
193.106.175.55 attackspambots
2020-10-02 04:05:57.692272-0500  localhost smtpd[17887]: NOQUEUE: reject: RCPT from unknown[193.106.175.55]: 554 5.7.1 Service unavailable; Client host [193.106.175.55] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL495727; from= to= proto=ESMTP helo=
2020-10-02 20:02:59
218.108.186.218 attackspambots
Unauthorized SSH login attempts
2020-10-02 19:49:07
217.71.225.150 attack
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=50832  .  dstport=445 SMB  .     (3852)
2020-10-02 19:31:14
222.186.30.76 attack
Oct  2 07:57:13 NPSTNNYC01T sshd[32424]: Failed password for root from 222.186.30.76 port 24703 ssh2
Oct  2 07:57:25 NPSTNNYC01T sshd[32437]: Failed password for root from 222.186.30.76 port 64729 ssh2
...
2020-10-02 20:07:25
124.207.98.213 attack
2020-10-02T14:02:57.095354lavrinenko.info sshd[9313]: Invalid user siva from 124.207.98.213 port 14344
2020-10-02T14:02:57.102418lavrinenko.info sshd[9313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.98.213
2020-10-02T14:02:57.095354lavrinenko.info sshd[9313]: Invalid user siva from 124.207.98.213 port 14344
2020-10-02T14:02:58.948578lavrinenko.info sshd[9313]: Failed password for invalid user siva from 124.207.98.213 port 14344 ssh2
2020-10-02T14:06:32.574392lavrinenko.info sshd[9409]: Invalid user user from 124.207.98.213 port 21192
...
2020-10-02 19:51:56
118.24.109.70 attackspam
Oct  2 14:05:27 itv-usvr-01 sshd[10927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.109.70  user=root
Oct  2 14:05:29 itv-usvr-01 sshd[10927]: Failed password for root from 118.24.109.70 port 37766 ssh2
Oct  2 14:13:45 itv-usvr-01 sshd[11801]: Invalid user wt from 118.24.109.70
Oct  2 14:13:45 itv-usvr-01 sshd[11801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.109.70
Oct  2 14:13:45 itv-usvr-01 sshd[11801]: Invalid user wt from 118.24.109.70
Oct  2 14:13:47 itv-usvr-01 sshd[11801]: Failed password for invalid user wt from 118.24.109.70 port 51466 ssh2
2020-10-02 19:44:24
182.162.17.234 attack
2020-10-02T08:57:52.363735ks3355764 sshd[10584]: Invalid user user from 182.162.17.234 port 56691
2020-10-02T08:57:53.814508ks3355764 sshd[10584]: Failed password for invalid user user from 182.162.17.234 port 56691 ssh2
...
2020-10-02 19:41:36

最近上报的IP列表

161.10.61.127 3.255.95.57 192.75.197.47 114.207.64.97
145.34.166.179 20.118.69.65 84.226.53.57 151.213.127.225
44.216.35.103 177.144.92.122 3.139.122.187 123.163.205.47
53.121.182.83 6.87.236.44 58.97.77.42 89.61.191.77
40.76.101.246 199.213.134.191 39.193.47.165 52.104.23.131