必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.102.98.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.102.98.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 16:29:30 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 133.98.102.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.98.102.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.176.189.139 attackspam
SpamScore above: 10.0
2020-07-15 12:17:32
141.98.81.138 attackbotsspam
Jul 15 04:29:52 vps647732 sshd[32304]: Failed password for root from 141.98.81.138 port 64125 ssh2
...
2020-07-15 12:08:47
112.85.42.188 attackbots
07/14/2020-23:26:07.962636 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-07-15 11:51:27
211.253.129.225 attackbots
Automatic Fail2ban report - Trying login SSH
2020-07-15 12:08:20
40.88.126.212 attack
Jul 14 07:10:00 josie sshd[30372]: Invalid user jabarchives from 40.88.126.212
Jul 14 07:10:00 josie sshd[30372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88.126.212 
Jul 14 07:10:00 josie sshd[30374]: Invalid user admin from 40.88.126.212
Jul 14 07:10:00 josie sshd[30374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88.126.212 
Jul 14 07:10:00 josie sshd[30376]: Invalid user jabarchives from 40.88.126.212
Jul 14 07:10:00 josie sshd[30378]: Invalid user admin from 40.88.126.212
Jul 14 07:10:00 josie sshd[30378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88.126.212 
Jul 14 07:10:00 josie sshd[30376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88.126.212 
Jul 14 07:10:00 josie sshd[30375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88........
-------------------------------
2020-07-15 11:47:31
52.249.186.176 attack
SSH Brute-Force reported by Fail2Ban
2020-07-15 12:19:16
185.143.73.48 attack
2020-07-15 04:12:45 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=flv2@csmailer.org)
2020-07-15 04:13:16 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=reuters@csmailer.org)
2020-07-15 04:13:43 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=hack4u@csmailer.org)
2020-07-15 04:14:10 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=bergen-gw2@csmailer.org)
2020-07-15 04:14:37 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=sd@csmailer.org)
...
2020-07-15 12:18:02
109.169.81.147 attackspambots
Jul 15 05:30:51 journals sshd\[38489\]: Invalid user msr from 109.169.81.147
Jul 15 05:30:51 journals sshd\[38489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.169.81.147
Jul 15 05:30:53 journals sshd\[38489\]: Failed password for invalid user msr from 109.169.81.147 port 39164 ssh2
Jul 15 05:33:59 journals sshd\[38832\]: Invalid user jf from 109.169.81.147
Jul 15 05:33:59 journals sshd\[38832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.169.81.147
...
2020-07-15 11:57:44
113.161.31.119 attackspam
Lines containing failures of 113.161.31.119
Jul 15 03:47:27 keyhelp sshd[1811]: Did not receive identification string from 113.161.31.119 port 50247
Jul 15 03:47:31 keyhelp sshd[1812]: Invalid user adminixxxr from 113.161.31.119 port 50511
Jul 15 03:47:31 keyhelp sshd[1812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.31.119
Jul 15 03:47:33 keyhelp sshd[1812]: Failed password for invalid user adminixxxr from 113.161.31.119 port 50511 ssh2
Jul 15 03:47:33 keyhelp sshd[1812]: Connection closed by invalid user adminixxxr 113.161.31.119 port 50511 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.161.31.119
2020-07-15 12:00:44
62.57.227.12 attackbots
Jul 14 21:07:51 dignus sshd[31274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.57.227.12
Jul 14 21:07:53 dignus sshd[31274]: Failed password for invalid user hyx from 62.57.227.12 port 39964 ssh2
Jul 14 21:11:06 dignus sshd[31944]: Invalid user lcm from 62.57.227.12 port 36670
Jul 14 21:11:06 dignus sshd[31944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.57.227.12
Jul 14 21:11:08 dignus sshd[31944]: Failed password for invalid user lcm from 62.57.227.12 port 36670 ssh2
...
2020-07-15 12:20:06
36.71.95.224 attack
Automatic report - Port Scan Attack
2020-07-15 12:15:34
147.135.253.94 attack
[2020-07-14 23:36:47] NOTICE[1150] chan_sip.c: Registration from '' failed for '147.135.253.94:57510' - Wrong password
[2020-07-14 23:36:47] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-14T23:36:47.423-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8001",SessionID="0x7fcb4c25c888",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.253.94/57510",Challenge="572b6702",ReceivedChallenge="572b6702",ReceivedHash="08e7800c69d982f307f1062397f3ef77"
[2020-07-14 23:37:51] NOTICE[1150] chan_sip.c: Registration from '' failed for '147.135.253.94:54464' - Wrong password
[2020-07-14 23:37:51] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-14T23:37:51.472-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7001",SessionID="0x7fcb4c25c888",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.25
...
2020-07-15 11:51:05
119.45.10.5 attackspambots
SSH Brute-Force. Ports scanning.
2020-07-15 12:02:40
37.239.180.146 attackspambots
2020-07-15 03:44:17 plain_virtual_exim authenticator failed for ([37.239.180.146]) [37.239.180.146]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.239.180.146
2020-07-15 11:54:59
142.93.154.174 attack
Jul 15 05:04:35 vpn01 sshd[11061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174
Jul 15 05:04:38 vpn01 sshd[11061]: Failed password for invalid user remi from 142.93.154.174 port 37732 ssh2
...
2020-07-15 12:05:54

最近上报的IP列表

213.45.168.223 101.69.105.222 63.52.43.160 163.236.183.217
93.110.243.98 193.239.10.185 53.247.166.162 140.214.63.201
19.38.169.253 43.53.168.183 169.216.159.30 245.153.238.14
53.49.17.205 26.163.161.107 29.222.251.156 208.248.198.40
174.67.198.126 211.235.200.44 133.182.25.65 47.117.218.194