必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.131.205.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.131.205.83.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 03 15:27:41 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 83.205.131.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 83.205.131.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.137.86.43 attack
Oct  3 23:45:08 markkoudstaal sshd[30832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.43
Oct  3 23:45:11 markkoudstaal sshd[30832]: Failed password for invalid user ftpuser from 79.137.86.43 port 60542 ssh2
Oct  3 23:48:49 markkoudstaal sshd[31139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.43
2019-10-04 06:24:22
222.186.190.2 attack
Oct  4 00:00:35 MK-Soft-Root1 sshd[5727]: Failed password for root from 222.186.190.2 port 26816 ssh2
Oct  4 00:00:40 MK-Soft-Root1 sshd[5727]: Failed password for root from 222.186.190.2 port 26816 ssh2
...
2019-10-04 06:07:17
189.210.191.106 attack
Automatic report - Port Scan Attack
2019-10-04 06:35:14
45.64.139.181 attack
Oct  2 00:08:50 mail01 postfix/postscreen[12956]: CONNECT from [45.64.139.181]:54715 to [94.130.181.95]:25
Oct  2 00:08:50 mail01 postfix/dnsblog[12957]: addr 45.64.139.181 listed by domain bl.blocklist.de as 127.0.0.9
Oct  2 00:08:50 mail01 postfix/dnsblog[12959]: addr 45.64.139.181 listed by domain zen.spamhaus.org as 127.0.0.3
Oct  2 00:08:50 mail01 postfix/dnsblog[12959]: addr 45.64.139.181 listed by domain zen.spamhaus.org as 127.0.0.11
Oct  2 00:08:50 mail01 postfix/dnsblog[12959]: addr 45.64.139.181 listed by domain zen.spamhaus.org as 127.0.0.4
Oct  2 00:08:50 mail01 postfix/dnsblog[12958]: addr 45.64.139.181 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct  2 00:08:50 mail01 postfix/postscreen[12956]: PREGREET 20 after 0.79 from [45.64.139.181]:54715: EHLO luserverglass.hostname

Oct  2 00:08:50 mail01 postfix/postscreen[12956]: DNSBL rank 5 for [45.64.139.181]:54715
Oct x@x
Oct x@x
Oct  2 00:08:52 mail01 postfix/postscreen[12956]: HANGUP after 2 from [45.........
-------------------------------
2019-10-04 06:01:19
128.199.88.188 attackspambots
Oct  4 00:26:09 markkoudstaal sshd[2097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.188
Oct  4 00:26:12 markkoudstaal sshd[2097]: Failed password for invalid user ssreedhar from 128.199.88.188 port 47212 ssh2
Oct  4 00:30:21 markkoudstaal sshd[2490]: Failed password for root from 128.199.88.188 port 38947 ssh2
2019-10-04 06:33:11
218.94.136.90 attack
2019-10-03T22:07:34.298004abusebot-7.cloudsearch.cf sshd\[14873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90  user=root
2019-10-04 06:07:43
217.61.161.181 attackbotsspam
Oct  1 02:27:24 amida sshd[168503]: Failed password for r.r from 217.61.161.181 port 37933 ssh2
Oct  1 02:27:26 amida sshd[168503]: Failed password for r.r from 217.61.161.181 port 37933 ssh2
Oct  1 02:27:27 amida sshd[168503]: Failed password for r.r from 217.61.161.181 port 37933 ssh2
Oct  1 02:27:29 amida sshd[168503]: Failed password for r.r from 217.61.161.181 port 37933 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.61.161.181
2019-10-04 06:04:39
106.12.133.247 attack
Oct  3 23:57:40 localhost sshd\[8522\]: Invalid user if from 106.12.133.247 port 41220
Oct  3 23:57:40 localhost sshd\[8522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.247
Oct  3 23:57:41 localhost sshd\[8522\]: Failed password for invalid user if from 106.12.133.247 port 41220 ssh2
2019-10-04 05:59:51
47.98.138.161 attackbotsspam
Automatic report - Port Scan Attack
2019-10-04 06:32:10
82.165.64.156 attackspambots
Oct  4 03:30:24 areeb-Workstation sshd[8909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.64.156
Oct  4 03:30:26 areeb-Workstation sshd[8909]: Failed password for invalid user rescue from 82.165.64.156 port 48260 ssh2
...
2019-10-04 06:06:19
49.88.112.90 attack
Oct  4 00:01:54 localhost sshd\[8975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Oct  4 00:01:55 localhost sshd\[8975\]: Failed password for root from 49.88.112.90 port 46373 ssh2
Oct  4 00:01:57 localhost sshd\[8975\]: Failed password for root from 49.88.112.90 port 46373 ssh2
2019-10-04 06:03:14
27.254.194.99 attack
2019-10-03T21:57:36.928256abusebot-5.cloudsearch.cf sshd\[23028\]: Invalid user guest from 27.254.194.99 port 40046
2019-10-04 06:14:40
218.188.210.214 attackbots
Oct  3 23:53:37 vps01 sshd[21842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.188.210.214
Oct  3 23:53:39 vps01 sshd[21842]: Failed password for invalid user mysql from 218.188.210.214 port 53002 ssh2
2019-10-04 05:58:19
49.207.180.197 attackbots
Oct  3 21:56:57 web8 sshd\[28196\]: Invalid user CENT0S2019 from 49.207.180.197
Oct  3 21:56:57 web8 sshd\[28196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.180.197
Oct  3 21:56:58 web8 sshd\[28196\]: Failed password for invalid user CENT0S2019 from 49.207.180.197 port 27920 ssh2
Oct  3 22:01:20 web8 sshd\[30232\]: Invalid user \#EDCXZAQ! from 49.207.180.197
Oct  3 22:01:20 web8 sshd\[30232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.180.197
2019-10-04 06:11:47
148.70.253.207 attackspam
HTTP: ThinkPHP CMS Getshell Vulnerability
HTTP: SQL Injection Attempt Detected
2019-10-04 06:05:48

最近上报的IP列表

161.97.121.147 215.143.200.60 67.15.178.188 178.128.29.91
182.172.56.199 100.48.36.231 45.231.89.60 69.196.203.88
17.113.160.218 249.205.249.17 2.56.56.77 210.61.151.255
231.169.51.83 5.26.255.84 13.33.96.1 236.96.148.185
206.197.89.121 189.36.7.195 239.57.182.23 96.70.23.10