必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       142.100.0.0 - 142.100.255.255
CIDR:           142.100.0.0/16
NetName:        CNESST01
NetHandle:      NET-142-100-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Commission de Sante et de Securite au Travail (CDSEDSAT)
RegDate:        1993-10-21
Updated:        2023-02-14
Ref:            https://rdap.arin.net/registry/ip/142.100.0.0


OrgName:        Commission de Sante et de Securite au Travail
OrgId:          CDSEDSAT
Address:        1600, avenue D'Estimauville
City:           Quebec
StateProv:      QC
PostalCode:     G1J 0H7
Country:        CA
RegDate:        1993-10-21
Updated:        2023-02-14
Ref:            https://rdap.arin.net/registry/entity/CDSEDSAT


OrgNOCHandle: ADMIN6338-ARIN
OrgNOCName:   Admin-142-100-0-0
OrgNOCPhone:  +1-418-266-4434 
OrgNOCEmail:  reseau-perimetre.gr@cnesst.gouv.qc.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/ADMIN6338-ARIN

OrgTechHandle: ADMIN6338-ARIN
OrgTechName:   Admin-142-100-0-0
OrgTechPhone:  +1-418-266-4434 
OrgTechEmail:  reseau-perimetre.gr@cnesst.gouv.qc.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN6338-ARIN

OrgAbuseHandle: ADMIN6338-ARIN
OrgAbuseName:   Admin-142-100-0-0
OrgAbusePhone:  +1-418-266-4434 
OrgAbuseEmail:  reseau-perimetre.gr@cnesst.gouv.qc.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ADMIN6338-ARIN

RNOCHandle: ADMIN6338-ARIN
RNOCName:   Admin-142-100-0-0
RNOCPhone:  +1-418-266-4434 
RNOCEmail:  reseau-perimetre.gr@cnesst.gouv.qc.ca
RNOCRef:    https://rdap.arin.net/registry/entity/ADMIN6338-ARIN

RAbuseHandle: ADMIN6338-ARIN
RAbuseName:   Admin-142-100-0-0
RAbusePhone:  +1-418-266-4434 
RAbuseEmail:  reseau-perimetre.gr@cnesst.gouv.qc.ca
RAbuseRef:    https://rdap.arin.net/registry/entity/ADMIN6338-ARIN

RTechHandle: ADMIN6338-ARIN
RTechName:   Admin-142-100-0-0
RTechPhone:  +1-418-266-4434 
RTechEmail:  reseau-perimetre.gr@cnesst.gouv.qc.ca
RTechRef:    https://rdap.arin.net/registry/entity/ADMIN6338-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.100.121.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.100.121.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 13:44:48 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 6.121.100.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 142.100.121.6.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.202.160.192 attack
Aug 18 13:45:57 sso sshd[5309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.160.192
Aug 18 13:45:59 sso sshd[5309]: Failed password for invalid user git from 149.202.160.192 port 50591 ssh2
...
2020-08-18 19:52:01
104.248.158.95 attackspam
104.248.158.95 - - [18/Aug/2020:07:01:38 +0100] "POST /wp-login.php HTTP/1.1" 200 2136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.158.95 - - [18/Aug/2020:07:01:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2156 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.158.95 - - [18/Aug/2020:07:01:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-18 19:55:52
139.59.92.19 attackspam
Failed password for postgres from 139.59.92.19 port 52552 ssh2
Invalid user ganyi from 139.59.92.19 port 34042
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.92.19
Invalid user ganyi from 139.59.92.19 port 34042
Failed password for invalid user ganyi from 139.59.92.19 port 34042 ssh2
2020-08-18 20:05:12
222.73.182.137 attack
k+ssh-bruteforce
2020-08-18 20:24:24
97.116.147.67 attackspam
SSH/22 MH Probe, BF, Hack -
2020-08-18 20:10:26
49.255.93.10 attackbotsspam
Invalid user guest from 49.255.93.10 port 50164
2020-08-18 20:23:14
174.138.43.162 attackbotsspam
Aug 17 02:05:05 mailrelay sshd[2264]: Invalid user SEIMO99 from 174.138.43.162 port 60394
Aug 17 02:05:05 mailrelay sshd[2264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.43.162
Aug 17 02:05:07 mailrelay sshd[2264]: Failed password for invalid user SEIMO99 from 174.138.43.162 port 60394 ssh2
Aug 17 02:05:07 mailrelay sshd[2264]: Received disconnect from 174.138.43.162 port 60394:11: Bye Bye [preauth]
Aug 17 02:05:07 mailrelay sshd[2264]: Disconnected from 174.138.43.162 port 60394 [preauth]
Aug 17 02:17:20 mailrelay sshd[2619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.43.162  user=r.r
Aug 17 02:17:22 mailrelay sshd[2619]: Failed password for r.r from 174.138.43.162 port 57954 ssh2
Aug 17 02:17:23 mailrelay sshd[2619]: Received disconnect from 174.138.43.162 port 57954:11: Bye Bye [preauth]
Aug 17 02:17:23 mailrelay sshd[2619]: Disconnected from 174.138.43.162 port........
-------------------------------
2020-08-18 20:09:18
188.166.150.254 attack
Aug 18 13:50:14 marvibiene sshd[8447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.254 
Aug 18 13:50:16 marvibiene sshd[8447]: Failed password for invalid user ftpuser from 188.166.150.254 port 40424 ssh2
Aug 18 13:57:44 marvibiene sshd[8798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.254
2020-08-18 20:22:52
118.24.219.30 attack
Aug 18 13:55:39 [host] sshd[31496]: Invalid user p
Aug 18 13:55:39 [host] sshd[31496]: pam_unix(sshd:
Aug 18 13:55:42 [host] sshd[31496]: Failed passwor
2020-08-18 20:13:24
123.126.106.88 attack
$f2bV_matches
2020-08-18 20:27:13
150.109.100.65 attackbotsspam
Aug 18 09:07:52 plex-server sshd[3186466]: Invalid user olga from 150.109.100.65 port 36616
Aug 18 09:07:52 plex-server sshd[3186466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.100.65 
Aug 18 09:07:52 plex-server sshd[3186466]: Invalid user olga from 150.109.100.65 port 36616
Aug 18 09:07:53 plex-server sshd[3186466]: Failed password for invalid user olga from 150.109.100.65 port 36616 ssh2
Aug 18 09:11:54 plex-server sshd[3188081]: Invalid user admin from 150.109.100.65 port 45346
...
2020-08-18 20:21:21
104.211.167.49 attack
2020-08-18T11:40:04.140362mail.standpoint.com.ua sshd[28703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.167.49
2020-08-18T11:40:04.137294mail.standpoint.com.ua sshd[28703]: Invalid user kvm from 104.211.167.49 port 1024
2020-08-18T11:40:06.379010mail.standpoint.com.ua sshd[28703]: Failed password for invalid user kvm from 104.211.167.49 port 1024 ssh2
2020-08-18T11:44:58.753946mail.standpoint.com.ua sshd[29269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.167.49  user=root
2020-08-18T11:45:00.685451mail.standpoint.com.ua sshd[29269]: Failed password for root from 104.211.167.49 port 1024 ssh2
...
2020-08-18 19:45:17
121.201.123.252 attack
Aug 18 08:17:51 ift sshd\[57961\]: Invalid user minecraft from 121.201.123.252Aug 18 08:17:54 ift sshd\[57961\]: Failed password for invalid user minecraft from 121.201.123.252 port 58926 ssh2Aug 18 08:21:09 ift sshd\[58523\]: Invalid user bi from 121.201.123.252Aug 18 08:21:10 ift sshd\[58523\]: Failed password for invalid user bi from 121.201.123.252 port 50696 ssh2Aug 18 08:24:31 ift sshd\[58751\]: Invalid user docker from 121.201.123.252
...
2020-08-18 19:56:55
188.112.7.125 attackspam
Brute force attempt
2020-08-18 20:25:45
202.70.136.161 attack
Invalid user semenov from 202.70.136.161 port 60290
2020-08-18 19:57:11

最近上报的IP列表

126.40.250.142 10.39.15.11 10.234.26.137 10.227.23.12
10.192.3.217 10.10.51.174 2606:4700:10::6814:9987 2606:4700:10::6814:8482
2606:4700:10::6814:4646 2606:4700:10::6816:4373 14.207.194.104 2606:4700:10::6814:6528
2606:4700:10::6814:8645 164.155.74.59 2606:4700:10::6816:501 122.192.203.58
210.182.22.112 195.50.181.206 193.112.219.164 222.106.204.211