必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.113.120.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.113.120.142.			IN	A

;; AUTHORITY SECTION:
.			164	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:45:01 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
142.120.113.13.in-addr.arpa domain name pointer ec2-13-113-120-142.ap-northeast-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.120.113.13.in-addr.arpa	name = ec2-13-113-120-142.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.209.209.15 attack
Sep 11 21:40:26 sip sshd[3110]: Failed password for root from 35.209.209.15 port 33608 ssh2
Sep 11 21:56:09 sip sshd[7187]: Failed password for root from 35.209.209.15 port 59848 ssh2
2020-09-12 07:24:19
159.226.170.253 attackbots
Sep 11 18:54:18 sshgateway sshd\[27343\]: Invalid user jorgec from 159.226.170.253
Sep 11 18:54:18 sshgateway sshd\[27343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.170.253
Sep 11 18:54:20 sshgateway sshd\[27343\]: Failed password for invalid user jorgec from 159.226.170.253 port 50244 ssh2
2020-09-12 07:29:06
140.143.137.170 attack
Sep 12 00:48:52 fhem-rasp sshd[26204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.137.170
Sep 12 00:48:53 fhem-rasp sshd[26204]: Failed password for invalid user svn from 140.143.137.170 port 42148 ssh2
...
2020-09-12 07:14:59
45.143.221.3 attackbotsspam
firewall-block, port(s): 5060/udp
2020-09-12 07:14:47
131.196.5.250 attackbotsspam
Unauthorized connection attempt from IP address 131.196.5.250 on Port 445(SMB)
2020-09-12 06:52:12
51.145.242.1 attackbots
Invalid user etms from 51.145.242.1 port 43594
2020-09-12 07:15:35
51.79.156.90 attackbotsspam
Sep 11 23:14:12 sshgateway sshd\[31459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-b1e1dbaf.vps.ovh.ca  user=root
Sep 11 23:14:14 sshgateway sshd\[31459\]: Failed password for root from 51.79.156.90 port 57816 ssh2
Sep 11 23:18:29 sshgateway sshd\[32113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-b1e1dbaf.vps.ovh.ca  user=root
2020-09-12 07:29:40
103.81.153.133 attackspam
Invalid user mo360 from 103.81.153.133 port 56836
2020-09-12 07:21:55
103.76.191.93 attack
Port Scan
...
2020-09-12 06:53:46
49.235.190.177 attack
Sep 11 23:42:33 sshgateway sshd\[3247\]: Invalid user robert from 49.235.190.177
Sep 11 23:42:33 sshgateway sshd\[3247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.190.177
Sep 11 23:42:36 sshgateway sshd\[3247\]: Failed password for invalid user robert from 49.235.190.177 port 48072 ssh2
2020-09-12 07:17:52
201.116.194.210 attackspam
Sep 11 21:24:57 email sshd\[11206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210  user=root
Sep 11 21:24:59 email sshd\[11206\]: Failed password for root from 201.116.194.210 port 60306 ssh2
Sep 11 21:28:26 email sshd\[11806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210  user=root
Sep 11 21:28:28 email sshd\[11806\]: Failed password for root from 201.116.194.210 port 19453 ssh2
Sep 11 21:32:08 email sshd\[12445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.194.210  user=root
...
2020-09-12 07:10:47
161.35.32.43 attack
Sep 11 21:12:57 sshgateway sshd\[12659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.32.43  user=root
Sep 11 21:12:59 sshgateway sshd\[12659\]: Failed password for root from 161.35.32.43 port 37248 ssh2
Sep 11 21:15:40 sshgateway sshd\[13044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.32.43  user=root
2020-09-12 07:05:51
180.76.134.238 attackspam
Automatic report - Banned IP Access
2020-09-12 07:25:21
31.187.0.153 attackbotsspam
1599843280 - 09/11/2020 18:54:40 Host: 31.187.0.153/31.187.0.153 Port: 445 TCP Blocked
2020-09-12 07:12:33
116.75.107.232 attackspam
20/9/11@12:55:04: FAIL: IoT-Telnet address from=116.75.107.232
...
2020-09-12 06:53:26

最近上报的IP列表

13.112.75.163 13.113.116.137 13.113.108.132 104.21.66.109
13.113.127.64 13.113.105.197 13.113.13.242 13.113.131.217
13.113.129.232 13.113.10.202 13.113.132.88 13.113.13.49
13.113.144.31 13.113.111.140 13.113.144.132 13.113.18.78
13.113.164.57 13.113.158.125 104.21.66.120 13.113.185.159