必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.135.166.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.135.166.218.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:27:02 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 218.166.135.142.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 142.135.166.218.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.118.160.53 attackspam
 TCP (SYN) 92.118.160.53:55205 -> port 2086, len 44
2020-06-09 08:14:24
190.96.150.106 attackbotsspam
Jun  9 04:05:26 our-server-hostname sshd[23898]: reveeclipse mapping checking getaddrinfo for 190-96-150-106.telebucaramanga.net.co [190.96.150.106] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  9 04:05:26 our-server-hostname sshd[23898]: Invalid user aikawa from 190.96.150.106
Jun  9 04:05:26 our-server-hostname sshd[23898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.150.106 
Jun  9 04:05:28 our-server-hostname sshd[23898]: Failed password for invalid user aikawa from 190.96.150.106 port 63905 ssh2
Jun  9 04:14:04 our-server-hostname sshd[25635]: reveeclipse mapping checking getaddrinfo for 190-96-150-106.telebucaramanga.net.co [190.96.150.106] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  9 04:14:04 our-server-hostname sshd[25635]: Invalid user tice from 190.96.150.106
Jun  9 04:14:04 our-server-hostname sshd[25635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.150.106 
Jun  9 ........
-------------------------------
2020-06-09 07:47:47
218.161.78.192 attackspam
" "
2020-06-09 07:43:59
106.124.141.108 attack
Jun  8 22:27:31 rush sshd[16665]: Failed password for root from 106.124.141.108 port 51723 ssh2
Jun  8 22:31:18 rush sshd[16792]: Failed password for root from 106.124.141.108 port 50429 ssh2
...
2020-06-09 08:18:37
110.8.67.146 attackbotsspam
Jun  9 00:38:11 ns41 sshd[18179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.8.67.146
2020-06-09 08:15:39
94.177.235.23 attack
prod6
...
2020-06-09 07:47:12
106.12.205.137 attackspambots
2020-06-09T01:52:48.942719galaxy.wi.uni-potsdam.de sshd[4364]: Invalid user jefferson from 106.12.205.137 port 55826
2020-06-09T01:52:48.945137galaxy.wi.uni-potsdam.de sshd[4364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.137
2020-06-09T01:52:48.942719galaxy.wi.uni-potsdam.de sshd[4364]: Invalid user jefferson from 106.12.205.137 port 55826
2020-06-09T01:52:50.714153galaxy.wi.uni-potsdam.de sshd[4364]: Failed password for invalid user jefferson from 106.12.205.137 port 55826 ssh2
2020-06-09T01:55:21.008411galaxy.wi.uni-potsdam.de sshd[4898]: Invalid user support from 106.12.205.137 port 41544
2020-06-09T01:55:21.010796galaxy.wi.uni-potsdam.de sshd[4898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.137
2020-06-09T01:55:21.008411galaxy.wi.uni-potsdam.de sshd[4898]: Invalid user support from 106.12.205.137 port 41544
2020-06-09T01:55:23.452072galaxy.wi.uni-potsdam.de sshd[4898]:
...
2020-06-09 08:02:50
115.29.5.153 attack
Jun  7 19:48:27 mail sshd[11994]: Failed password for root from 115.29.5.153 port 35944 ssh2
...
2020-06-09 07:52:23
180.76.237.54 attackspam
Jun  8 22:09:43 roki-contabo sshd\[15934\]: Invalid user sangeeta from 180.76.237.54
Jun  8 22:09:43 roki-contabo sshd\[15934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.237.54
Jun  8 22:09:44 roki-contabo sshd\[15934\]: Failed password for invalid user sangeeta from 180.76.237.54 port 48928 ssh2
Jun  8 22:23:13 roki-contabo sshd\[16157\]: Invalid user hoge from 180.76.237.54
Jun  8 22:23:13 roki-contabo sshd\[16157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.237.54
...
2020-06-09 07:42:40
49.88.112.76 attack
Jun  8 20:28:54 firewall sshd[24231]: Failed password for root from 49.88.112.76 port 33557 ssh2
Jun  8 20:28:57 firewall sshd[24231]: Failed password for root from 49.88.112.76 port 33557 ssh2
Jun  8 20:28:59 firewall sshd[24231]: Failed password for root from 49.88.112.76 port 33557 ssh2
...
2020-06-09 08:20:22
85.113.14.18 attackbotsspam
Trying ports that it shouldn't be.
2020-06-09 07:50:18
222.186.61.191 attack
 TCP (SYN) 222.186.61.191:60000 -> port 5022, len 44
2020-06-09 07:42:16
182.216.13.205 attackspambots
$f2bV_matches
2020-06-09 08:08:15
185.130.184.202 attackbots
Comment spam
2020-06-09 08:20:44
178.27.122.118 attack
Unauthorized connection attempt detected from IP address 178.27.122.118 to port 8080
2020-06-09 07:48:39

最近上报的IP列表

221.89.253.155 133.254.61.223 232.15.248.146 38.65.22.255
6.114.142.2 74.42.209.245 82.193.61.49 145.161.171.16
26.149.76.191 228.223.42.11 186.233.31.208 207.36.168.255
136.254.23.48 58.183.134.102 235.128.204.151 218.192.244.239
204.254.188.184 60.103.253.202 39.190.254.217 103.223.12.194