必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.133.186.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.133.186.213.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:50:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 213.186.133.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.186.133.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.129.131.165 attackbots
wp-login / xmlrpc attacks
Bot
Browser: Firefox version 61.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:61.0.1) Gecko/20120101 Firefox/61.0.1
2019-09-02 04:26:34
36.66.149.211 attackbots
Sep  1 12:28:58 *** sshd[32407]: Failed password for invalid user test from 36.66.149.211 port 52734 ssh2
Sep  1 12:36:47 *** sshd[32496]: Failed password for invalid user java from 36.66.149.211 port 39794 ssh2
2019-09-02 04:22:51
92.222.72.234 attack
Sep  1 21:46:37 v22019058497090703 sshd[10784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
Sep  1 21:46:40 v22019058497090703 sshd[10784]: Failed password for invalid user vm from 92.222.72.234 port 60346 ssh2
Sep  1 21:52:08 v22019058497090703 sshd[11189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
...
2019-09-02 04:17:16
27.223.89.238 attackspambots
Sep  1 19:36:02 hb sshd\[18282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238  user=root
Sep  1 19:36:04 hb sshd\[18282\]: Failed password for root from 27.223.89.238 port 37076 ssh2
Sep  1 19:40:51 hb sshd\[18663\]: Invalid user gk from 27.223.89.238
Sep  1 19:40:51 hb sshd\[18663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238
Sep  1 19:40:53 hb sshd\[18663\]: Failed password for invalid user gk from 27.223.89.238 port 51682 ssh2
2019-09-02 03:56:54
5.54.78.118 attack
Telnet Server BruteForce Attack
2019-09-02 03:44:43
189.148.216.68 attackspambots
NAME : MX-GDUN-LACNIC CIDR : 189.148.216.0/24 189.148.216.0/24 SYN Flood DDoS Attack MX - block certain countries :) IP: 189.148.216.68  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-09-02 04:26:05
46.33.225.84 attackbots
Sep  1 21:04:48 vps691689 sshd[25018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.33.225.84
Sep  1 21:04:49 vps691689 sshd[25018]: Failed password for invalid user kiefer from 46.33.225.84 port 58426 ssh2
...
2019-09-02 04:20:10
182.76.246.204 attackbots
Sep  1 09:31:08 eddieflores sshd\[9224\]: Invalid user ftpuser from 182.76.246.204
Sep  1 09:31:08 eddieflores sshd\[9224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.246.204
Sep  1 09:31:10 eddieflores sshd\[9224\]: Failed password for invalid user ftpuser from 182.76.246.204 port 35764 ssh2
Sep  1 09:37:33 eddieflores sshd\[9701\]: Invalid user ep from 182.76.246.204
Sep  1 09:37:33 eddieflores sshd\[9701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.246.204
2019-09-02 03:38:17
41.202.0.153 attack
Sep  1 10:16:41 kapalua sshd\[14308\]: Invalid user cmtsang from 41.202.0.153
Sep  1 10:16:41 kapalua sshd\[14308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.0.153
Sep  1 10:16:43 kapalua sshd\[14308\]: Failed password for invalid user cmtsang from 41.202.0.153 port 57283 ssh2
Sep  1 10:24:03 kapalua sshd\[14859\]: Invalid user 123456 from 41.202.0.153
Sep  1 10:24:03 kapalua sshd\[14859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.0.153
2019-09-02 04:28:58
112.35.46.21 attackspam
Sep  1 22:01:02 mail sshd\[6950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.46.21
Sep  1 22:01:05 mail sshd\[6950\]: Failed password for invalid user shoutcast from 112.35.46.21 port 36586 ssh2
Sep  1 22:04:19 mail sshd\[7375\]: Invalid user hr from 112.35.46.21 port 36496
Sep  1 22:04:19 mail sshd\[7375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.46.21
Sep  1 22:04:21 mail sshd\[7375\]: Failed password for invalid user hr from 112.35.46.21 port 36496 ssh2
2019-09-02 04:05:20
74.208.252.136 attackspam
Sep  1 20:02:26 thevastnessof sshd[15698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136
...
2019-09-02 04:06:34
46.101.224.184 attackbots
Sep  1 08:01:16 lcdev sshd\[8906\]: Invalid user piano from 46.101.224.184
Sep  1 08:01:16 lcdev sshd\[8906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
Sep  1 08:01:18 lcdev sshd\[8906\]: Failed password for invalid user piano from 46.101.224.184 port 41896 ssh2
Sep  1 08:05:07 lcdev sshd\[9256\]: Invalid user shane from 46.101.224.184
Sep  1 08:05:07 lcdev sshd\[9256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
2019-09-02 04:06:52
51.79.52.150 attackspam
SSH bruteforce (Triggered fail2ban)
2019-09-02 03:56:31
206.189.156.198 attackbots
Sep  1 21:22:26 pkdns2 sshd\[5445\]: Invalid user toro from 206.189.156.198Sep  1 21:22:28 pkdns2 sshd\[5445\]: Failed password for invalid user toro from 206.189.156.198 port 52750 ssh2Sep  1 21:27:02 pkdns2 sshd\[5647\]: Invalid user testmail from 206.189.156.198Sep  1 21:27:04 pkdns2 sshd\[5647\]: Failed password for invalid user testmail from 206.189.156.198 port 41026 ssh2Sep  1 21:31:41 pkdns2 sshd\[5885\]: Invalid user florian from 206.189.156.198Sep  1 21:31:43 pkdns2 sshd\[5885\]: Failed password for invalid user florian from 206.189.156.198 port 57548 ssh2
...
2019-09-02 03:43:30
183.82.121.34 attackbots
2019-09-01T19:44:22.359Z CLOSE host=183.82.121.34 port=52394 fd=8 time=370.110 bytes=548
...
2019-09-02 04:01:04

最近上报的IP列表

174.127.69.77 127.101.49.50 139.230.251.75 193.17.95.3
150.61.132.170 108.22.208.252 211.67.98.50 189.118.108.46
38.2.30.32 199.157.149.172 29.168.127.128 254.63.5.170
191.147.156.165 198.11.195.249 222.60.85.119 154.99.198.31
185.247.74.82 210.77.128.128 35.11.240.89 35.27.139.199