必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.114.239.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.114.239.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:43:42 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
147.239.114.142.in-addr.arpa domain name pointer bras-base-toroon3514w-grc-58-142-114-239-147.dsl.bell.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.239.114.142.in-addr.arpa	name = bras-base-toroon3514w-grc-58-142-114-239-147.dsl.bell.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
184.105.139.105 attackbots
Port scan denied
2020-09-21 03:32:22
176.111.173.11 attackbotsspam
Sep 20 06:15:44 Host-KLAX-C postfix/smtpd[391482]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 06:29:14 Host-KLAX-C postfix/smtpd[392313]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 06:41:39 Host-KLAX-C postfix/smtpd[392839]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 06:54:03 Host-KLAX-C postfix/smtpd[392839]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 07:06:33 Host-KLAX-C postfix/smtpd[392839]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 07:18:51 Host-KLAX-C postfix/smtpd[394511]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 07:31:09 Host-KLAX-C postfix/smtpd[394511]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 07:43:30 Host-KLAX-C postfix/smtpd[395831]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 07:55:52 Host-KLAX-C postfix/smtpd[395831]: lost connection after AUTH from unknown[176.111.173.11]
Sep 20 08:08:14 Host-KLAX-C postfix/s
...
2020-09-21 03:18:57
171.97.98.18 attackbots
Icarus honeypot on github
2020-09-21 03:35:09
106.54.119.121 attack
Sep 20 20:42:44 MainVPS sshd[31411]: Invalid user postgres from 106.54.119.121 port 45488
Sep 20 20:42:44 MainVPS sshd[31411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.119.121
Sep 20 20:42:44 MainVPS sshd[31411]: Invalid user postgres from 106.54.119.121 port 45488
Sep 20 20:42:47 MainVPS sshd[31411]: Failed password for invalid user postgres from 106.54.119.121 port 45488 ssh2
Sep 20 20:47:52 MainVPS sshd[8957]: Invalid user server from 106.54.119.121 port 45076
...
2020-09-21 03:30:15
165.22.69.147 attackspambots
SSH Brute-Force attacks
2020-09-21 03:36:42
222.109.26.50 attackbots
2020-09-20T14:07:20.5106231495-001 sshd[33573]: Failed password for invalid user admin from 222.109.26.50 port 44450 ssh2
2020-09-20T14:09:35.5537861495-001 sshd[33713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.109.26.50  user=root
2020-09-20T14:09:37.3084791495-001 sshd[33713]: Failed password for root from 222.109.26.50 port 49686 ssh2
2020-09-20T14:11:49.1180021495-001 sshd[33851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.109.26.50  user=mysql
2020-09-20T14:11:50.6016981495-001 sshd[33851]: Failed password for mysql from 222.109.26.50 port 54924 ssh2
2020-09-20T14:14:01.4127591495-001 sshd[34000]: Invalid user admin from 222.109.26.50 port 60166
...
2020-09-21 03:06:08
192.81.63.110 attack
Sep 19 18:58:20 nuernberg-4g-01 sshd[20925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.63.110 
Sep 19 18:58:22 nuernberg-4g-01 sshd[20925]: Failed password for invalid user admin from 192.81.63.110 port 40858 ssh2
Sep 19 18:58:26 nuernberg-4g-01 sshd[20948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.63.110
2020-09-21 03:03:48
104.206.128.42 attackbots
 TCP (SYN) 104.206.128.42:60566 -> port 5060, len 44
2020-09-21 03:33:43
144.168.164.26 attack
144.168.164.26 (CA/Canada/-), 5 distributed sshd attacks on account [admin] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 20 09:33:24 server2 sshd[23361]: Invalid user admin from 134.122.76.222
Sep 20 09:54:53 server2 sshd[4376]: Invalid user admin from 198.251.83.73
Sep 20 09:50:29 server2 sshd[1657]: Invalid user admin from 64.227.111.215
Sep 20 09:54:56 server2 sshd[4376]: Failed password for invalid user admin from 198.251.83.73 port 59326 ssh2
Sep 20 09:54:58 server2 sshd[4416]: Invalid user admin from 144.168.164.26

IP Addresses Blocked:

134.122.76.222 (US/United States/-)
198.251.83.73 (US/United States/-)
64.227.111.215 (US/United States/-)
2020-09-21 03:17:21
138.88.181.243 attack
Unauthorised access (Sep 20) SRC=138.88.181.243 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=47576 TCP DPT=23 WINDOW=30185 SYN
2020-09-21 03:03:11
161.35.88.139 attackbots
fail2ban detected brute force on sshd
2020-09-21 03:23:51
23.102.154.52 attackbots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=42421  .  dstport=3391  .     (1990)
2020-09-21 03:28:41
46.182.21.248 attack
(sshd) Failed SSH login from 46.182.21.248 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 02:59:34 server5 sshd[17237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.21.248  user=root
Sep 20 02:59:37 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
Sep 20 02:59:39 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
Sep 20 02:59:42 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
Sep 20 02:59:43 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
2020-09-21 03:13:34
2605:7380:1000:1310:9c59:c3ff:fe14:7a8d attackbots
spf=neutral (google.com: 2605:7380:1000:1310:9c59:c3ff:fe14:7a8d is neither permitted nor denied by domain of bobby@jrosleys.co.uk) smtp.mailfrom=bobby@jrosleys.co.uk
2020-09-21 03:20:20
207.244.117.125 attackspam
Massiver Kommentar-Spam
2020-09-21 03:22:12

最近上报的IP列表

213.121.94.224 45.83.145.152 224.15.9.95 9.197.32.186
86.249.235.35 61.50.128.200 28.109.173.129 159.174.130.80
242.161.61.185 68.46.38.253 185.4.5.62 201.54.180.244
252.87.4.127 149.17.168.164 158.160.218.48 73.242.225.226
22.141.130.60 150.175.234.2 232.127.234.60 107.253.112.107