必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.213.27.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.213.27.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:13:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.27.213.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.27.213.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.238 attack
2019-10-22T19:22:11.806451scmdmz1 sshd\[26651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
2019-10-22T19:22:13.921287scmdmz1 sshd\[26651\]: Failed password for root from 112.85.42.238 port 25864 ssh2
2019-10-22T19:22:16.034829scmdmz1 sshd\[26651\]: Failed password for root from 112.85.42.238 port 25864 ssh2
...
2019-10-23 01:29:53
71.6.165.200 attackbots
Port scan: Attack repeated for 24 hours
2019-10-23 02:02:39
117.208.124.55 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-10-2019 12:45:32.
2019-10-23 01:52:17
80.82.64.127 attackspambots
Multiport scan : 12 ports scanned 2001 3357 4411 5005 5050 5589 8933 9833 23432 32145 33039 34543
2019-10-23 02:08:45
5.140.7.207 attackspambots
Chat Spam
2019-10-23 01:53:10
61.76.169.138 attackbotsspam
2019-10-22T12:33:18.1141371495-001 sshd\[8208\]: Failed password for root from 61.76.169.138 port 29135 ssh2
2019-10-22T13:36:58.3646901495-001 sshd\[10958\]: Invalid user student from 61.76.169.138 port 13411
2019-10-22T13:36:58.3695841495-001 sshd\[10958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138
2019-10-22T13:37:00.5853051495-001 sshd\[10958\]: Failed password for invalid user student from 61.76.169.138 port 13411 ssh2
2019-10-22T13:41:13.9783571495-001 sshd\[11154\]: Invalid user openerp from 61.76.169.138 port 13394
2019-10-22T13:41:13.9865141495-001 sshd\[11154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138
...
2019-10-23 01:51:45
182.16.115.130 attackspambots
Oct 22 14:49:25 MK-Soft-VM6 sshd[26106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.115.130 
Oct 22 14:49:27 MK-Soft-VM6 sshd[26106]: Failed password for invalid user Triple2017 from 182.16.115.130 port 51068 ssh2
...
2019-10-23 02:12:12
51.252.103.239 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 22-10-2019 12:45:37.
2019-10-23 01:42:21
2.90.251.145 attack
2019-10-21 x@x
2019-10-21 10:40:22 unexpected disconnection while reading SMTP command from ([2.90.251.145]) [2.90.251.145]:19416 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-10-21 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=2.90.251.145
2019-10-23 01:41:39
111.10.43.244 attackspambots
Oct 22 17:50:37 herz-der-gamer sshd[315]: Invalid user sysv from 111.10.43.244 port 39623
...
2019-10-23 01:58:58
106.12.34.188 attackbots
Oct 22 11:07:27 odroid64 sshd\[8555\]: Invalid user workshop from 106.12.34.188
Oct 22 11:07:27 odroid64 sshd\[8555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.188
Oct 22 11:07:29 odroid64 sshd\[8555\]: Failed password for invalid user workshop from 106.12.34.188 port 51872 ssh2
Oct 22 15:25:43 odroid64 sshd\[3772\]: Invalid user ah from 106.12.34.188
Oct 22 15:25:43 odroid64 sshd\[3772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.188
Oct 22 15:25:44 odroid64 sshd\[3772\]: Failed password for invalid user ah from 106.12.34.188 port 43400 ssh2
Oct 22 15:31:40 odroid64 sshd\[4295\]: Invalid user FuwuqiXP! from 106.12.34.188
Oct 22 15:31:40 odroid64 sshd\[4295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.188
Oct 22 15:31:42 odroid64 sshd\[4295\]: Failed password for invalid user FuwuqiXP! from 106.12.34.188 port 5
...
2019-10-23 02:00:51
205.185.120.190 attackspambots
web-1 [ssh_2] SSH Attack
2019-10-23 01:38:49
185.176.27.54 attack
10/22/2019-19:28:53.504467 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-23 01:44:02
165.255.241.15 attack
2019-10-21 x@x
2019-10-21 10:34:20 unexpected disconnection while reading SMTP command from (165-255-241-15.ip.adsl.co.za) [165.255.241.15]:44311 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.255.241.15
2019-10-23 01:31:10
220.149.241.71 attackbots
ssh intrusion attempt
2019-10-23 01:51:56

最近上报的IP列表

28.211.13.79 164.134.209.46 50.242.213.244 36.171.185.16
14.5.3.125 152.240.90.30 150.56.80.14 66.227.148.166
99.73.131.128 255.87.53.113 221.249.128.12 130.186.103.240
72.120.88.76 2.38.196.251 96.11.104.116 4.79.255.188
95.202.10.146 46.44.191.224 195.52.89.236 37.144.51.85