必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.104.48.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.104.48.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:16:19 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 211.48.104.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.48.104.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.163.129.81 attack
Honeypot attack, port: 23, PTR: ws81.zone31-163-129.zaural.ru.
2019-11-21 16:24:42
27.18.68.249 attackbotsspam
Fail2Ban Ban Triggered
2019-11-21 16:05:10
116.111.183.67 attackbotsspam
Nov 19 11:49:29 mxgate1 postfix/postscreen[659]: CONNECT from [116.111.183.67]:13818 to [176.31.12.44]:25
Nov 19 11:49:29 mxgate1 postfix/dnsblog[666]: addr 116.111.183.67 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 11:49:29 mxgate1 postfix/dnsblog[666]: addr 116.111.183.67 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 11:49:29 mxgate1 postfix/dnsblog[666]: addr 116.111.183.67 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 11:49:29 mxgate1 postfix/dnsblog[667]: addr 116.111.183.67 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 11:49:29 mxgate1 postfix/dnsblog[665]: addr 116.111.183.67 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 11:49:35 mxgate1 postfix/postscreen[659]: DNSBL rank 4 for [116.111.183.67]:13818
Nov x@x
Nov 19 11:49:36 mxgate1 postfix/postscreen[659]: HANGUP after 1 from [116.111.183.67]:13818 in tests after SMTP handshake
Nov 19 11:49:36 mxgate1 postfix/postscreen[659]: DISCONNECT [116.111.183.67]:13818


........
----------------------------------
2019-11-21 16:19:34
173.22.8.112 attackspambots
Nov 19 05:51:15 ACSRAD auth.info sshd[31712]: Invalid user heizmann from 173.22.8.112 port 47968
Nov 19 05:51:15 ACSRAD auth.info sshd[31712]: Failed password for invalid user heizmann from 173.22.8.112 port 47968 ssh2
Nov 19 05:51:15 ACSRAD auth.info sshd[31712]: Received disconnect from 173.22.8.112 port 47968:11: Bye Bye [preauth]
Nov 19 05:51:15 ACSRAD auth.info sshd[31712]: Disconnected from 173.22.8.112 port 47968 [preauth]
Nov 19 05:51:16 ACSRAD auth.notice sshguard[21413]: Attack from "173.22.8.112" on service 100 whostnameh danger 10.
Nov 19 05:51:16 ACSRAD auth.warn sshguard[21413]: Blocking "173.22.8.112/32" for 120 secs (3 attacks in 1089 secs, after 1 abuses over 1089 secs.)
Nov 19 05:54:49 ACSRAD auth.info sshd[1194]: Invalid user duo from 173.22.8.112 port 58712
Nov 19 05:54:49 ACSRAD auth.info sshd[1194]: Failed password for invalid user duo from 173.22.8.112 port 58712 ssh2
Nov 19 05:54:49 ACSRAD auth.info sshd[1194]: Received disconnect from 173.22.8.11........
------------------------------
2019-11-21 16:23:58
37.187.17.45 attackbotsspam
Lines containing failures of 37.187.17.45
Nov 19 10:41:09 shared04 sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.17.45  user=r.r
Nov 19 10:41:11 shared04 sshd[31416]: Failed password for r.r from 37.187.17.45 port 34500 ssh2
Nov 19 10:41:11 shared04 sshd[31416]: Received disconnect from 37.187.17.45 port 34500:11: Bye Bye [preauth]
Nov 19 10:41:11 shared04 sshd[31416]: Disconnected from authenticating user r.r 37.187.17.45 port 34500 [preauth]
Nov 19 10:59:08 shared04 sshd[2658]: Invalid user admin from 37.187.17.45 port 57498
Nov 19 10:59:08 shared04 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.17.45
Nov 19 10:59:10 shared04 sshd[2658]: Failed password for invalid user admin from 37.187.17.45 port 57498 ssh2
Nov 19 10:59:10 shared04 sshd[2658]: Received disconnect from 37.187.17.45 port 57498:11: Bye Bye [preauth]
Nov 19 10:59:10 shared04 sshd[2658........
------------------------------
2019-11-21 16:08:53
45.143.220.46 attackbots
\[2019-11-21 03:21:14\] NOTICE\[2754\] chan_sip.c: Registration from '373 \' failed for '45.143.220.46:59230' - Wrong password
\[2019-11-21 03:21:14\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-21T03:21:14.480-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="373",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.46/59230",Challenge="758aeadd",ReceivedChallenge="758aeadd",ReceivedHash="7ae52e99b9b0c67e84ffae62896d722b"
\[2019-11-21 03:21:15\] NOTICE\[2754\] chan_sip.c: Registration from '371 \' failed for '45.143.220.46:54031' - Wrong password
\[2019-11-21 03:21:15\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-21T03:21:15.409-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="371",SessionID="0x7f26c4a90648",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.14
2019-11-21 16:42:05
114.79.160.36 attack
" "
2019-11-21 16:34:03
36.91.107.167 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-21 16:35:50
172.58.157.208 attack
TCP Port Scanning
2019-11-21 16:11:07
13.75.69.108 attackbots
Nov 21 06:21:07 web8 sshd\[16651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.75.69.108  user=root
Nov 21 06:21:10 web8 sshd\[16651\]: Failed password for root from 13.75.69.108 port 11266 ssh2
Nov 21 06:24:41 web8 sshd\[18272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.75.69.108  user=root
Nov 21 06:24:42 web8 sshd\[18272\]: Failed password for root from 13.75.69.108 port 48270 ssh2
Nov 21 06:28:13 web8 sshd\[20126\]: Invalid user guest from 13.75.69.108
2019-11-21 16:10:25
122.117.26.250 attackbotsspam
" "
2019-11-21 16:41:49
173.244.200.169 attackspam
TCP Port Scanning
2019-11-21 16:07:50
14.253.150.143 attackbots
Nov 19 11:43:48 mxgate1 postfix/postscreen[659]: CONNECT from [14.253.150.143]:43384 to [176.31.12.44]:25
Nov 19 11:43:48 mxgate1 postfix/dnsblog[665]: addr 14.253.150.143 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 11:43:48 mxgate1 postfix/dnsblog[668]: addr 14.253.150.143 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 11:43:48 mxgate1 postfix/dnsblog[668]: addr 14.253.150.143 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 11:43:49 mxgate1 postfix/dnsblog[667]: addr 14.253.150.143 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 11:43:54 mxgate1 postfix/postscreen[659]: DNSBL rank 4 for [14.253.150.143]:43384
Nov x@x
Nov 19 11:43:55 mxgate1 postfix/postscreen[659]: HANGUP after 1.3 from [14.253.150.143]:43384 in tests after SMTP handshake
Nov 19 11:43:55 mxgate1 postfix/postscreen[659]: DISCONNECT [14.253.150.143]:43384


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.253.150.143
2019-11-21 16:14:31
121.244.27.222 attackspam
5x Failed Password
2019-11-21 16:33:38
180.247.119.231 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-21 16:40:53

最近上报的IP列表

26.105.47.199 150.200.66.6 160.119.60.209 253.215.136.41
54.86.245.173 80.110.237.175 168.53.27.200 109.0.213.119
159.27.31.67 76.245.236.17 149.184.95.52 185.115.233.210
198.26.82.223 208.180.74.202 131.60.40.182 76.8.210.19
222.203.189.218 215.62.58.69 19.46.46.116 24.158.6.47