必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.90.242.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.90.242.234.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:29:31 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
234.242.90.94.in-addr.arpa domain name pointer host-94-90-242-234.business.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.242.90.94.in-addr.arpa	name = host-94-90-242-234.business.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.228.19.79 attackspam
Unauthorized connection attempt detected from IP address 122.228.19.79 to port 9595
2020-03-24 19:29:09
119.188.242.32 attackbotsspam
Unauthorized connection attempt detected from IP address 119.188.242.32 to port 1521
2020-03-24 18:57:06
123.189.3.170 attackspambots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-24 18:53:17
60.206.66.79 attack
Unauthorized connection attempt detected from IP address 60.206.66.79 to port 1433 [T]
2020-03-24 19:07:52
49.234.107.101 attack
Unauthorized connection attempt detected from IP address 49.234.107.101 to port 1433 [T]
2020-03-24 19:09:00
180.183.57.49 attack
Unauthorized connection attempt detected from IP address 180.183.57.49 to port 445 [T]
2020-03-24 19:23:00
121.227.31.162 attackbotsspam
Unauthorized connection attempt detected from IP address 121.227.31.162 to port 80 [T]
2020-03-24 19:30:39
114.93.75.85 attack
Unauthorized connection attempt detected from IP address 114.93.75.85 to port 445 [T]
2020-03-24 19:33:59
213.135.78.237 attackspambots
Unauthorized connection attempt detected from IP address 213.135.78.237 to port 1550 [T]
2020-03-24 19:17:48
39.153.252.196 attack
Unauthorized connection attempt detected from IP address 39.153.252.196 to port 1433 [T]
2020-03-24 19:12:24
210.106.39.202 attackbots
Unauthorized connection attempt detected from IP address 210.106.39.202 to port 23 [T]
2020-03-24 19:18:25
164.52.24.177 attackspam
Unauthorized connection attempt detected from IP address 164.52.24.177 to port 8090 [T]
2020-03-24 19:24:20
113.233.26.70 attack
Mar 24 11:30:02 debian-2gb-nbg1-2 kernel: \[7304886.847352\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=113.233.26.70 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=42 ID=50730 PROTO=TCP SPT=54146 DPT=5555 WINDOW=35282 RES=0x00 SYN URGP=0
2020-03-24 19:34:36
114.242.245.32 attackspam
(sshd) Failed SSH login from 114.242.245.32 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 24 12:32:49 s1 sshd[11929]: Invalid user nate from 114.242.245.32 port 48170
Mar 24 12:32:51 s1 sshd[11929]: Failed password for invalid user nate from 114.242.245.32 port 48170 ssh2
Mar 24 12:40:28 s1 sshd[12130]: Invalid user dolly from 114.242.245.32 port 29374
Mar 24 12:40:30 s1 sshd[12130]: Failed password for invalid user dolly from 114.242.245.32 port 29374 ssh2
Mar 24 12:44:23 s1 sshd[12196]: Invalid user losavio from 114.242.245.32 port 55410
2020-03-24 19:00:43
123.59.148.35 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-24 19:28:09

最近上报的IP列表

180.222.94.184 12.20.34.190 40.160.159.46 179.50.38.155
211.222.167.41 17.204.141.15 109.250.178.208 7.197.20.144
18.11.254.116 125.113.157.141 172.136.128.29 61.174.22.132
114.156.179.9 203.178.56.57 150.151.25.195 28.234.124.236
88.36.149.45 189.226.226.9 130.31.81.129 199.240.204.195