必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.142.43.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.142.43.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:52:52 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
53.43.142.116.in-addr.arpa domain name pointer 53.43.142.116.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.43.142.116.in-addr.arpa	name = 53.43.142.116.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
209.97.191.190 attackspambots
Lines containing failures of 209.97.191.190
Aug  3 02:41:13 shared01 sshd[16318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.191.190  user=r.r
Aug  3 02:41:16 shared01 sshd[16318]: Failed password for r.r from 209.97.191.190 port 37744 ssh2
Aug  3 02:41:16 shared01 sshd[16318]: Received disconnect from 209.97.191.190 port 37744:11: Bye Bye [preauth]
Aug  3 02:41:16 shared01 sshd[16318]: Disconnected from authenticating user r.r 209.97.191.190 port 37744 [preauth]
Aug  3 02:47:38 shared01 sshd[18279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.191.190  user=r.r
Aug  3 02:47:40 shared01 sshd[18279]: Failed password for r.r from 209.97.191.190 port 35090 ssh2
Aug  3 02:47:40 shared01 sshd[18279]: Received disconnect from 209.97.191.190 port 35090:11: Bye Bye [preauth]
Aug  3 02:47:40 shared01 sshd[18279]: Disconnected from authenticating user r.r 209.97.191.190 port 35090........
------------------------------
2020-08-04 20:15:22
165.22.69.147 attackbotsspam
detected by Fail2Ban
2020-08-04 20:14:23
186.147.160.189 attackspambots
Aug  4 08:56:34 ws24vmsma01 sshd[201389]: Failed password for root from 186.147.160.189 port 34058 ssh2
...
2020-08-04 20:13:06
45.15.24.97 attackspam
Aug  3 02:08:52 xxxxxxx8 sshd[31182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.15.24.97  user=r.r
Aug  3 02:08:54 xxxxxxx8 sshd[31182]: Failed password for r.r from 45.15.24.97 port 33912 ssh2
Aug  3 02:19:34 xxxxxxx8 sshd[32062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.15.24.97  user=r.r
Aug  3 02:19:36 xxxxxxx8 sshd[32062]: Failed password for r.r from 45.15.24.97 port 58838 ssh2
Aug  3 02:23:41 xxxxxxx8 sshd[32406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.15.24.97  user=r.r
Aug  3 02:23:43 xxxxxxx8 sshd[32406]: Failed password for r.r from 45.15.24.97 port 46052 ssh2
Aug  3 02:27:38 xxxxxxx8 sshd[32695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.15.24.97  user=r.r
Aug  3 02:27:40 xxxxxxx8 sshd[32695]: Failed password for r.r from 45.15.24.97 port 34566 ssh2
Aug  3 02:31:........
------------------------------
2020-08-04 19:52:05
138.197.210.217 attackspambots
138.197.210.217 - - [04/Aug/2020:10:06:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2383 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.210.217 - - [04/Aug/2020:10:06:22 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.210.217 - - [04/Aug/2020:10:25:35 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 20:14:50
222.186.15.158 attackbots
Aug  4 14:03:29 vps sshd[147723]: Failed password for root from 222.186.15.158 port 30198 ssh2
Aug  4 14:03:32 vps sshd[147723]: Failed password for root from 222.186.15.158 port 30198 ssh2
Aug  4 14:03:36 vps sshd[148407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Aug  4 14:03:38 vps sshd[148407]: Failed password for root from 222.186.15.158 port 54715 ssh2
Aug  4 14:03:40 vps sshd[148407]: Failed password for root from 222.186.15.158 port 54715 ssh2
...
2020-08-04 20:06:30
51.15.204.27 attack
2020-08-04T06:28:53.2572931495-001 sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
2020-08-04T06:28:55.1318081495-001 sshd[15840]: Failed password for root from 51.15.204.27 port 50226 ssh2
2020-08-04T06:32:46.7898341495-001 sshd[16082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
2020-08-04T06:32:48.6537751495-001 sshd[16082]: Failed password for root from 51.15.204.27 port 60960 ssh2
2020-08-04T06:36:34.8692001495-001 sshd[16241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
2020-08-04T06:36:37.0345551495-001 sshd[16241]: Failed password for root from 51.15.204.27 port 43478 ssh2
...
2020-08-04 20:00:47
188.40.60.247 attackspambots
Aug  1 13:23:36 xxxxxxx4 sshd[414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=r.r
Aug  1 13:23:38 xxxxxxx4 sshd[414]: Failed password for r.r from 188.40.60.247 port 36256 ssh2
Aug  1 13:35:22 xxxxxxx4 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=r.r
Aug  1 13:35:24 xxxxxxx4 sshd[2658]: Failed password for r.r from 188.40.60.247 port 33066 ssh2
Aug  1 13:39:17 xxxxxxx4 sshd[3051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=r.r
Aug  1 13:39:20 xxxxxxx4 sshd[3051]: Failed password for r.r from 188.40.60.247 port 48878 ssh2
Aug  1 13:43:23 xxxxxxx4 sshd[3551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=r.r
Aug  1 13:43:24 xxxxxxx4 sshd[3551]: Failed password for r.r from 188.40.60.247 port 36460 ssh2
Aug  1 ........
------------------------------
2020-08-04 19:47:23
202.21.188.250 attack
[2020/8/4 上午 10:11:22] [1292] 服務接受從 202.21.188.250 來的連線
[2020/8/4 上午 10:11:28] [1292] Reject IP : 202.21.188.250  , It did WannaCry Virus.
2020-08-04 19:48:01
51.15.229.198 attack
Aug  4 13:35:31 buvik sshd[31002]: Failed password for root from 51.15.229.198 port 51840 ssh2
Aug  4 13:39:28 buvik sshd[31552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.229.198  user=root
Aug  4 13:39:29 buvik sshd[31552]: Failed password for root from 51.15.229.198 port 33242 ssh2
...
2020-08-04 19:44:39
167.99.183.237 attackbots
Aug  4 07:21:53 NPSTNNYC01T sshd[19758]: Failed password for root from 167.99.183.237 port 38232 ssh2
Aug  4 07:26:00 NPSTNNYC01T sshd[20130]: Failed password for root from 167.99.183.237 port 50656 ssh2
...
2020-08-04 19:49:50
113.212.108.90 attackspambots
1596533147 - 08/04/2020 11:25:47 Host: 113.212.108.90/113.212.108.90 Port: 445 TCP Blocked
2020-08-04 20:09:00
120.131.13.186 attackspambots
Aug  4 00:36:51 web9 sshd\[10474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Aug  4 00:36:52 web9 sshd\[10474\]: Failed password for root from 120.131.13.186 port 23350 ssh2
Aug  4 00:40:02 web9 sshd\[10887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
Aug  4 00:40:04 web9 sshd\[10887\]: Failed password for root from 120.131.13.186 port 60760 ssh2
Aug  4 00:43:17 web9 sshd\[11244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.13.186  user=root
2020-08-04 19:55:14
113.173.176.146 attackspam
Exchange online refresh token phishing
2020-08-04 19:44:17
149.202.40.210 attackbots
Fail2Ban
2020-08-04 20:12:14

最近上报的IP列表

195.0.130.175 131.117.200.86 3.162.82.25 252.89.233.253
175.116.106.194 72.22.58.199 62.181.190.240 241.82.135.10
150.25.211.35 7.13.177.247 211.225.135.222 201.110.243.139
161.186.43.31 44.243.125.249 81.96.242.144 5.21.164.221
236.194.82.92 161.195.61.26 181.0.116.238 143.151.89.49