必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.21.45.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.21.45.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 09:21:53 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 142.45.21.103.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 142.45.21.103.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.31.138 attackspam
" "
2020-02-10 09:13:38
109.86.218.112 attackspambots
Feb 10 02:27:06 tuotantolaitos sshd[4539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.86.218.112
Feb 10 02:27:07 tuotantolaitos sshd[4539]: Failed password for invalid user mms from 109.86.218.112 port 35305 ssh2
...
2020-02-10 09:04:52
203.130.242.68 attackbots
Feb  7 06:34:20 host sshd[7871]: reveeclipse mapping checking getaddrinfo for txxxxxxx4.techscape.co.id [203.130.242.68] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  7 06:34:20 host sshd[7871]: Invalid user qly from 203.130.242.68
Feb  7 06:34:20 host sshd[7871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.242.68 
Feb  7 06:34:21 host sshd[7871]: Failed password for invalid user qly from 203.130.242.68 port 47326 ssh2
Feb  7 06:34:22 host sshd[7871]: Received disconnect from 203.130.242.68: 11: Bye Bye [preauth]
Feb  7 06:55:14 host sshd[5658]: reveeclipse mapping checking getaddrinfo for txxxxxxx4.techscape.co.id [203.130.242.68] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  7 06:55:14 host sshd[5658]: Invalid user mrv from 203.130.242.68
Feb  7 06:55:14 host sshd[5658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.242.68 
Feb  7 06:55:16 host sshd[5658]: Failed password for i........
-------------------------------
2020-02-10 08:51:05
222.186.180.130 attackbots
Feb 10 01:26:22 h2177944 sshd\[6459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Feb 10 01:26:24 h2177944 sshd\[6459\]: Failed password for root from 222.186.180.130 port 24600 ssh2
Feb 10 01:26:25 h2177944 sshd\[6459\]: Failed password for root from 222.186.180.130 port 24600 ssh2
Feb 10 01:26:27 h2177944 sshd\[6459\]: Failed password for root from 222.186.180.130 port 24600 ssh2
...
2020-02-10 08:48:18
95.239.78.21 attack
firewall-block, port(s): 23/tcp
2020-02-10 08:28:30
58.187.78.170 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-10 08:58:16
186.91.158.105 attack
Honeypot attack, port: 445, PTR: 186-91-158-105.genericrev.cantv.net.
2020-02-10 08:29:46
212.64.89.221 attackspambots
SSH / Telnet Brute Force Attempts on Honeypot
2020-02-10 08:48:34
178.128.90.40 attack
Feb  9 19:03:49 firewall sshd[7379]: Invalid user qsy from 178.128.90.40
Feb  9 19:03:51 firewall sshd[7379]: Failed password for invalid user qsy from 178.128.90.40 port 34348 ssh2
Feb  9 19:06:57 firewall sshd[7513]: Invalid user jco from 178.128.90.40
...
2020-02-10 08:30:24
185.143.221.55 attackspam
02/10/2020-00:55:36.229725 185.143.221.55 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-10 09:00:52
106.52.84.117 attack
Lines containing failures of 106.52.84.117
Feb  7 19:45:58 mx-in-02 sshd[4608]: Invalid user wz from 106.52.84.117 port 45754
Feb  7 19:45:58 mx-in-02 sshd[4608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.84.117 
Feb  7 19:45:59 mx-in-02 sshd[4608]: Failed password for invalid user wz from 106.52.84.117 port 45754 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.52.84.117
2020-02-10 08:54:16
103.197.206.204 attackbots
trying to access non-authorized port
2020-02-10 08:39:19
206.189.142.10 attack
Feb 10 02:00:21 MK-Soft-Root2 sshd[1088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10 
Feb 10 02:00:24 MK-Soft-Root2 sshd[1088]: Failed password for invalid user vra from 206.189.142.10 port 57538 ssh2
...
2020-02-10 09:05:32
59.72.122.148 attackbotsspam
Feb  9 22:06:54 thevastnessof sshd[27700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.122.148
...
2020-02-10 08:33:06
122.51.242.122 attack
Brute-force attempt banned
2020-02-10 08:46:49

最近上报的IP列表

244.58.160.34 244.254.218.51 245.185.168.35 170.63.228.172
93.114.200.71 101.106.5.63 234.94.93.181 100.49.8.74
81.116.54.108 123.42.174.14 120.73.108.29 198.92.75.133
80.242.201.72 156.91.63.207 28.85.75.58 57.135.170.38
140.220.160.31 242.97.121.19 77.122.26.133 129.68.136.231