必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.142.252.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.142.252.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:24:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
18.252.142.136.in-addr.arpa domain name pointer vl2562.lf123-voice-a-1.c3750.voip.pitt.edu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.252.142.136.in-addr.arpa	name = vl2562.lf123-voice-a-1.c3750.voip.pitt.edu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.79.255.84 attackspambots
Unauthorized connection attempt detected from IP address 36.79.255.84 to port 445
2020-01-13 19:09:12
191.55.128.37 attackbots
Unauthorized connection attempt detected from IP address 191.55.128.37 to port 23 [J]
2020-01-13 18:30:29
103.118.87.194 attackspam
Jan  8 20:48:50 git-ovh sshd[21750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.118.87.194 
...
2020-01-13 18:36:59
121.173.126.110 attackbotsspam
unauthorized connection attempt
2020-01-13 18:33:57
14.162.186.101 attack
unauthorized connection attempt
2020-01-13 18:39:51
36.110.27.18 attackspam
Jan 13 03:00:48 giraffe sshd[10956]: Invalid user guest from 36.110.27.18
Jan 13 03:00:48 giraffe sshd[10956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.18
Jan 13 03:00:49 giraffe sshd[10956]: Failed password for invalid user guest from 36.110.27.18 port 33788 ssh2
Jan 13 03:00:50 giraffe sshd[10956]: Received disconnect from 36.110.27.18 port 33788:11: Bye Bye [preauth]
Jan 13 03:00:50 giraffe sshd[10956]: Disconnected from 36.110.27.18 port 33788 [preauth]
Jan 13 03:21:59 giraffe sshd[12157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.18  user=r.r
Jan 13 03:22:02 giraffe sshd[12157]: Failed password for r.r from 36.110.27.18 port 47590 ssh2
Jan 13 03:22:02 giraffe sshd[12157]: Received disconnect from 36.110.27.18 port 47590:11: Bye Bye [preauth]
Jan 13 03:22:02 giraffe sshd[12157]: Disconnected from 36.110.27.18 port 47590 [preauth]
Jan 13 03:26:06 giraffe s........
-------------------------------
2020-01-13 19:07:02
182.23.56.46 attackbotsspam
1578890865 - 01/13/2020 05:47:45 Host: 182.23.56.46/182.23.56.46 Port: 445 TCP Blocked
2020-01-13 18:56:19
201.33.22.80 attackspam
Unauthorized connection attempt detected from IP address 201.33.22.80 to port 1433 [J]
2020-01-13 18:45:25
121.165.73.1 attackspambots
Unauthorized connection attempt detected from IP address 121.165.73.1 to port 2220 [J]
2020-01-13 18:40:21
106.51.130.196 attackspam
Unauthorized connection attempt detected from IP address 106.51.130.196 to port 2220 [J]
2020-01-13 19:04:17
177.155.91.191 attackbotsspam
unauthorized connection attempt
2020-01-13 18:36:35
103.115.104.229 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.229  user=root
Failed password for root from 103.115.104.229 port 49140 ssh2
Invalid user hm from 103.115.104.229 port 50344
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.229
Failed password for invalid user hm from 103.115.104.229 port 50344 ssh2
2020-01-13 18:38:16
180.247.25.172 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 19:02:40
203.205.35.187 attackspam
Honeypot attack, port: 445, PTR: static.cmcti.vn.
2020-01-13 18:30:12
103.81.240.198 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 19:05:58

最近上报的IP列表

123.17.111.21 58.115.55.7 160.136.130.176 154.6.0.63
3.10.132.208 30.210.195.64 178.142.198.117 207.79.126.117
232.227.30.213 196.55.217.40 75.181.68.249 38.2.102.106
4.254.10.97 42.157.204.139 216.53.184.30 201.232.208.102
246.216.147.242 14.244.15.32 88.201.205.139 76.49.168.127