必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.132.132.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.132.132.137.		IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:42:51 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
137.132.132.142.in-addr.arpa domain name pointer static.137.132.132.142.clients.your-server.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.132.132.142.in-addr.arpa	name = static.137.132.132.142.clients.your-server.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.53.197.136 attackspambots
Aug  8 08:02:33 web1 postfix/smtpd[10433]: warning: unknown[191.53.197.136]: SASL PLAIN authentication failed: authentication failure
...
2019-08-09 01:04:59
213.186.34.124 attackbots
Aug  8 13:49:36 XXX sshd[55849]: Invalid user watcher from 213.186.34.124 port 48016
2019-08-09 01:12:59
110.35.79.23 attackbots
Aug  8 13:27:10 TORMINT sshd\[13798\]: Invalid user bodega from 110.35.79.23
Aug  8 13:27:10 TORMINT sshd\[13798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23
Aug  8 13:27:12 TORMINT sshd\[13798\]: Failed password for invalid user bodega from 110.35.79.23 port 41094 ssh2
...
2019-08-09 01:54:31
105.155.250.106 attackbotsspam
RDPBruteVIL
2019-08-09 01:36:06
42.112.231.200 attackspam
Unauthorized connection attempt from IP address 42.112.231.200 on Port 445(SMB)
2019-08-09 01:58:52
103.9.195.134 attackspambots
Automatic report - Banned IP Access
2019-08-09 01:36:43
2.50.143.90 attack
Unauthorized connection attempt from IP address 2.50.143.90 on Port 445(SMB)
2019-08-09 01:04:22
70.29.106.63 attackbots
Aug  8 13:52:44 XXX sshd[55892]: Invalid user postdrop from 70.29.106.63 port 43720
2019-08-09 01:08:45
157.230.94.157 attack
Aug  8 19:01:02 eventyay sshd[15974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.94.157
Aug  8 19:01:04 eventyay sshd[15974]: Failed password for invalid user sinusbot from 157.230.94.157 port 56235 ssh2
Aug  8 19:05:22 eventyay sshd[16972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.94.157
...
2019-08-09 01:14:17
182.135.64.12 attackbots
Aug  8 13:59:15 DAAP sshd[15565]: Invalid user ubuntu from 182.135.64.12 port 11136
Aug  8 13:59:15 DAAP sshd[15565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.135.64.12
Aug  8 13:59:15 DAAP sshd[15565]: Invalid user ubuntu from 182.135.64.12 port 11136
Aug  8 13:59:17 DAAP sshd[15565]: Failed password for invalid user ubuntu from 182.135.64.12 port 11136 ssh2
Aug  8 14:01:15 DAAP sshd[15607]: Invalid user mhensgen from 182.135.64.12 port 19677
...
2019-08-09 01:47:56
50.79.59.97 attackbots
Aug  8 19:00:31 h2177944 sshd\[13120\]: Invalid user am from 50.79.59.97 port 45089
Aug  8 19:00:31 h2177944 sshd\[13120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.79.59.97
Aug  8 19:00:33 h2177944 sshd\[13120\]: Failed password for invalid user am from 50.79.59.97 port 45089 ssh2
Aug  8 19:05:04 h2177944 sshd\[13191\]: Invalid user karl from 50.79.59.97 port 41931
...
2019-08-09 01:57:03
137.74.181.116 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: ip116.ip-137-74-181.eu.
2019-08-09 01:34:17
159.89.115.126 attack
Aug  8 15:37:54 ArkNodeAT sshd\[18411\]: Invalid user lynne from 159.89.115.126
Aug  8 15:37:54 ArkNodeAT sshd\[18411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126
Aug  8 15:37:55 ArkNodeAT sshd\[18411\]: Failed password for invalid user lynne from 159.89.115.126 port 51630 ssh2
2019-08-09 01:17:45
97.92.210.177 attackbots
LGS,WP GET /wp-login.php
2019-08-09 01:37:42
58.57.4.238 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 12:17:24,646 INFO [amun_request_handler] unknown vuln (Attacker: 58.57.4.238 Port: 25, Mess: ['QUIT
'] (6) Stages: ['IMAIL_STAGE2'])
2019-08-09 01:06:46

最近上报的IP列表

142.120.79.73 142.126.119.246 142.132.139.251 142.132.180.6
142.165.166.147 142.132.192.87 142.154.29.239 142.154.124.235
142.147.97.140 142.166.30.242 142.165.42.106 142.132.182.49
142.165.85.95 142.184.188.160 142.234.80.86 142.190.92.214
142.177.223.63 142.234.202.20 142.176.166.66 142.250.138.188