必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.142.132.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.142.132.170.		IN	A

;; AUTHORITY SECTION:
.			397	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:11:52 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
Host 170.132.142.112.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 170.132.142.112.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.128.215 attackspambots
Aug 18 10:06:46 OPSO sshd\[16123\]: Invalid user hzw from 206.189.128.215 port 54548
Aug 18 10:06:46 OPSO sshd\[16123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.128.215
Aug 18 10:06:48 OPSO sshd\[16123\]: Failed password for invalid user hzw from 206.189.128.215 port 54548 ssh2
Aug 18 10:11:05 OPSO sshd\[17473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.128.215  user=root
Aug 18 10:11:06 OPSO sshd\[17473\]: Failed password for root from 206.189.128.215 port 33874 ssh2
2020-08-18 17:00:33
193.169.253.48 attack
Aug 18 10:05:46 srv01 postfix/smtpd\[4560\]: warning: unknown\[193.169.253.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:10:17 srv01 postfix/smtpd\[4580\]: warning: unknown\[193.169.253.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:11:23 srv01 postfix/smtpd\[4560\]: warning: unknown\[193.169.253.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:12:09 srv01 postfix/smtpd\[4560\]: warning: unknown\[193.169.253.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:18:14 srv01 postfix/smtpd\[30651\]: warning: unknown\[193.169.253.48\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-18 16:20:12
106.12.57.165 attackspambots
Aug 18 04:51:45 game-panel sshd[9205]: Failed password for root from 106.12.57.165 port 36516 ssh2
Aug 18 04:57:35 game-panel sshd[9471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.57.165
Aug 18 04:57:37 game-panel sshd[9471]: Failed password for invalid user teste from 106.12.57.165 port 51886 ssh2
2020-08-18 17:02:29
218.101.109.217 attackbotsspam
Automatic report - Port Scan Attack
2020-08-18 16:43:19
49.88.112.114 attackspambots
Aug 18 08:49:40 django-0 sshd[3091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Aug 18 08:49:42 django-0 sshd[3091]: Failed password for root from 49.88.112.114 port 26699 ssh2
...
2020-08-18 17:03:01
42.55.44.46 attackbots
Unauthorised access (Aug 18) SRC=42.55.44.46 LEN=40 TTL=46 ID=39243 TCP DPT=8080 WINDOW=13452 SYN
2020-08-18 16:48:33
103.228.160.220 attack
Aug 18 08:00:38 sip sshd[1343907]: Failed password for invalid user gy from 103.228.160.220 port 61363 ssh2
Aug 18 08:04:43 sip sshd[1343925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.160.220  user=root
Aug 18 08:04:45 sip sshd[1343925]: Failed password for root from 103.228.160.220 port 43400 ssh2
...
2020-08-18 16:41:25
213.251.185.63 attack
Aug 18 08:41:55 PorscheCustomer sshd[12361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.185.63
Aug 18 08:41:57 PorscheCustomer sshd[12361]: Failed password for invalid user alexander from 213.251.185.63 port 33365 ssh2
Aug 18 08:45:56 PorscheCustomer sshd[12469]: Failed password for postgres from 213.251.185.63 port 52090 ssh2
...
2020-08-18 16:25:00
140.213.24.90 spamattack
Penipu akun Facebook saya hampir diretas tolong beri loksi dia agar dia kapok
2020-08-18 16:21:43
104.236.151.120 attackspambots
Invalid user scheduler from 104.236.151.120 port 43766
2020-08-18 16:49:29
106.12.86.56 attackbots
Aug 18 09:07:04 myvps sshd[15442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.56 
Aug 18 09:07:06 myvps sshd[15442]: Failed password for invalid user ubuntu from 106.12.86.56 port 56038 ssh2
Aug 18 09:15:03 myvps sshd[20486]: Failed password for root from 106.12.86.56 port 42338 ssh2
...
2020-08-18 16:47:21
201.1.22.48 attackspam
Automatic report - Port Scan Attack
2020-08-18 16:51:17
110.16.76.213 attackspambots
Aug 18 08:27:41 ns381471 sshd[9118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.16.76.213
Aug 18 08:27:43 ns381471 sshd[9118]: Failed password for invalid user wp-user from 110.16.76.213 port 23791 ssh2
2020-08-18 16:29:04
212.70.149.20 attackspam
Aug 18 10:39:58 relay postfix/smtpd\[22436\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:40:25 relay postfix/smtpd\[21868\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:40:52 relay postfix/smtpd\[23510\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:41:19 relay postfix/smtpd\[21950\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 10:41:45 relay postfix/smtpd\[21936\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-18 16:44:07
191.232.161.73 attackspam
 TCP (SYN) 191.232.161.73:62210 -> port 23, len 40
2020-08-18 16:21:05

最近上报的IP列表

112.141.149.63 112.141.16.142 112.141.147.77 112.141.196.249
112.141.213.230 112.141.122.56 112.141.144.39 112.141.179.106
112.141.146.187 112.141.133.188 112.141.128.139 112.141.156.32
112.142.178.78 112.141.162.92 112.141.39.33 112.141.145.182
112.142.130.215 112.141.10.37 112.140.96.243 112.141.158.70