必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.112.198.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.112.198.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 09:20:40 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
148.198.112.142.in-addr.arpa domain name pointer bras-base-toroon631ww-grc-23-142-112-198-148.dsl.bell.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.198.112.142.in-addr.arpa	name = bras-base-toroon631ww-grc-23-142-112-198-148.dsl.bell.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.192.247.23 attackspambots
port scan and connect, tcp 23 (telnet)
2019-10-16 05:44:50
65.49.212.67 attackbotsspam
Oct 15 10:57:53 hanapaa sshd\[439\]: Invalid user sims from 65.49.212.67
Oct 15 10:57:53 hanapaa sshd\[439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.212.67.16clouds.com
Oct 15 10:57:55 hanapaa sshd\[439\]: Failed password for invalid user sims from 65.49.212.67 port 45034 ssh2
Oct 15 11:03:30 hanapaa sshd\[1124\]: Invalid user m\&g_2008 from 65.49.212.67
Oct 15 11:03:30 hanapaa sshd\[1124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.212.67.16clouds.com
2019-10-16 05:41:52
58.241.155.142 attack
1433/tcp
[2019-10-15]1pkt
2019-10-16 06:00:42
94.191.108.176 attackspambots
2019-10-15T21:38:50.159791shield sshd\[31973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176  user=root
2019-10-15T21:38:52.116175shield sshd\[31973\]: Failed password for root from 94.191.108.176 port 38728 ssh2
2019-10-15T21:43:04.348387shield sshd\[32557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176  user=root
2019-10-15T21:43:06.174301shield sshd\[32557\]: Failed password for root from 94.191.108.176 port 45744 ssh2
2019-10-15T21:47:22.867506shield sshd\[1056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176  user=root
2019-10-16 05:52:57
211.136.105.74 attackbots
SSH brutforce
2019-10-16 05:42:05
51.75.255.166 attackspambots
Oct 15 23:22:27 vps01 sshd[18606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.166
Oct 15 23:22:29 vps01 sshd[18606]: Failed password for invalid user gadfly from 51.75.255.166 port 36782 ssh2
2019-10-16 06:00:13
177.8.162.218 attackbots
445/tcp
[2019-10-15]1pkt
2019-10-16 06:07:22
62.234.109.203 attack
Oct 15 23:00:27 * sshd[32547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.203
Oct 15 23:00:29 * sshd[32547]: Failed password for invalid user iskren from 62.234.109.203 port 38442 ssh2
2019-10-16 06:11:51
114.39.121.29 attackspambots
23/tcp
[2019-10-15]1pkt
2019-10-16 05:56:55
195.154.207.199 attackbotsspam
SSH Brute-Forcing (ownc)
2019-10-16 06:14:55
101.110.45.156 attack
2019-10-15T15:52:49.168263ns525875 sshd\[5061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156  user=root
2019-10-15T15:52:51.534502ns525875 sshd\[5061\]: Failed password for root from 101.110.45.156 port 38975 ssh2
2019-10-15T15:56:51.778321ns525875 sshd\[10159\]: Invalid user webmaster from 101.110.45.156 port 58593
2019-10-15T15:56:51.784065ns525875 sshd\[10159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156
...
2019-10-16 06:05:03
201.242.213.28 attackspambots
445/tcp
[2019-10-15]1pkt
2019-10-16 05:46:33
139.59.116.30 attackbotsspam
WordPress brute force
2019-10-16 05:40:50
164.132.100.28 attack
Oct 16 04:34:21 webhost01 sshd[15152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.100.28
Oct 16 04:34:23 webhost01 sshd[15152]: Failed password for invalid user dieter from 164.132.100.28 port 43034 ssh2
...
2019-10-16 05:45:13
108.191.163.194 attackbotsspam
85/tcp
[2019-10-15]1pkt
2019-10-16 06:12:25

最近上报的IP列表

46.75.16.254 152.73.162.147 154.28.64.166 88.89.249.93
185.192.201.238 181.201.24.108 133.219.181.26 221.168.188.175
160.18.197.186 109.67.174.57 189.34.69.246 23.147.247.128
169.120.8.10 166.249.36.99 84.178.45.166 218.229.185.242
223.67.127.213 78.22.80.104 228.247.78.238 67.132.249.189