必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.122.215.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.122.215.142.		IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:58:06 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 142.215.122.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.215.122.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.235.82.68 attack
Dec 22 01:32:25 vps647732 sshd[18835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.82.68
Dec 22 01:32:27 vps647732 sshd[18835]: Failed password for invalid user www from 148.235.82.68 port 46496 ssh2
...
2019-12-22 08:45:36
128.199.95.60 attackbots
Invalid user webadmin from 128.199.95.60 port 54918
2019-12-22 08:17:08
167.71.179.114 attackspambots
Dec 21 13:48:55 kapalua sshd\[3920\]: Invalid user %username% from 167.71.179.114
Dec 21 13:48:55 kapalua sshd\[3920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.179.114
Dec 21 13:48:58 kapalua sshd\[3920\]: Failed password for invalid user %username% from 167.71.179.114 port 36284 ssh2
Dec 21 13:53:43 kapalua sshd\[4400\]: Invalid user 1q2w3e4r from 167.71.179.114
Dec 21 13:53:43 kapalua sshd\[4400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.179.114
2019-12-22 08:24:59
77.42.89.96 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-22 08:21:18
183.64.62.173 attackspam
Dec 21 23:57:24 ns41 sshd[22960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.64.62.173
2019-12-22 08:20:59
104.236.124.45 attack
Dec 21 18:35:22 plusreed sshd[26559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45  user=root
Dec 21 18:35:24 plusreed sshd[26559]: Failed password for root from 104.236.124.45 port 42451 ssh2
...
2019-12-22 08:45:18
207.154.194.145 attackbotsspam
Invalid user rusich from 207.154.194.145 port 52450
2019-12-22 08:19:17
95.110.159.28 attackbotsspam
Dec 21 19:33:15 ny01 sshd[27002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.159.28
Dec 21 19:33:16 ny01 sshd[27002]: Failed password for invalid user steinmann from 95.110.159.28 port 44050 ssh2
Dec 21 19:39:05 ny01 sshd[27613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.159.28
2019-12-22 08:40:30
221.205.154.251 attackspam
Honeypot attack, port: 23, PTR: 251.154.205.221.adsl-pool.sx.cn.
2019-12-22 08:26:29
177.36.8.226 attackspam
[munged]::443 177.36.8.226 - - [22/Dec/2019:00:18:37 +0100] "POST /[munged]: HTTP/1.1" 200 6093 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-22 08:27:29
46.101.187.76 attack
Dec 22 00:07:06 game-panel sshd[20365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.187.76
Dec 22 00:07:07 game-panel sshd[20365]: Failed password for invalid user towntalk from 46.101.187.76 port 39005 ssh2
Dec 22 00:12:12 game-panel sshd[20610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.187.76
2019-12-22 08:17:37
152.32.134.90 attack
Dec 21 15:57:12 mockhub sshd[19214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.134.90
Dec 21 15:57:14 mockhub sshd[19214]: Failed password for invalid user mysql from 152.32.134.90 port 51700 ssh2
...
2019-12-22 08:27:47
197.82.202.98 attack
Dec 22 05:55:34 vibhu-HP-Z238-Microtower-Workstation sshd\[26763\]: Invalid user admin from 197.82.202.98
Dec 22 05:55:34 vibhu-HP-Z238-Microtower-Workstation sshd\[26763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.82.202.98
Dec 22 05:55:37 vibhu-HP-Z238-Microtower-Workstation sshd\[26763\]: Failed password for invalid user admin from 197.82.202.98 port 39446 ssh2
Dec 22 06:02:27 vibhu-HP-Z238-Microtower-Workstation sshd\[27045\]: Invalid user ot from 197.82.202.98
Dec 22 06:02:27 vibhu-HP-Z238-Microtower-Workstation sshd\[27045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.82.202.98
...
2019-12-22 08:44:06
36.112.137.165 attack
Dec 22 01:30:47 MK-Soft-VM4 sshd[3659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.165 
Dec 22 01:30:48 MK-Soft-VM4 sshd[3659]: Failed password for invalid user test from 36.112.137.165 port 64131 ssh2
...
2019-12-22 08:34:51
112.21.191.244 attack
2019-12-21T23:30:05.868987shield sshd\[8457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.244  user=root
2019-12-21T23:30:07.938107shield sshd\[8457\]: Failed password for root from 112.21.191.244 port 59402 ssh2
2019-12-21T23:36:53.558083shield sshd\[11563\]: Invalid user blades from 112.21.191.244 port 55384
2019-12-21T23:36:53.562204shield sshd\[11563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.244
2019-12-21T23:36:55.641349shield sshd\[11563\]: Failed password for invalid user blades from 112.21.191.244 port 55384 ssh2
2019-12-22 08:18:03

最近上报的IP列表

119.122.215.104 119.122.215.163 119.122.215.2 119.122.215.239
119.122.215.43 119.122.215.26 119.122.215.46 119.122.215.202
119.122.215.54 119.122.215.80 116.62.195.138 119.122.28.151
119.122.28.87 119.122.29.21 119.122.29.3 119.122.29.67
119.122.29.93 119.122.30.16 119.122.30.253 119.122.31.96