必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.136.81.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.136.81.136.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:19:17 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
136.81.136.142.in-addr.arpa domain name pointer www.twcsc.com.
136.81.136.142.in-addr.arpa domain name pointer twcnc.com.
136.81.136.142.in-addr.arpa domain name pointer twcdigitalphone.com.
136.81.136.142.in-addr.arpa domain name pointer timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa domain name pointer elpaquetazo.com.
136.81.136.142.in-addr.arpa domain name pointer www.timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa domain name pointer elpaq.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcarolina.com.
136.81.136.142.in-addr.arpa domain name pointer twcarolina.com.
136.81.136.142.in-addr.arpa domain name pointer twcsc.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcdigitalphone.com.
136.81.136.142.in-addr.arpa domain name pointer www.elpaquetazo.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcnc.com.
136.81.136.142.in-addr.arpa domain name pointer www.elpaq.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.81.136.142.in-addr.arpa	name = www.twcsc.com.
136.81.136.142.in-addr.arpa	name = twcnc.com.
136.81.136.142.in-addr.arpa	name = twcdigitalphone.com.
136.81.136.142.in-addr.arpa	name = timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa	name = elpaquetazo.com.
136.81.136.142.in-addr.arpa	name = www.timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa	name = elpaq.com.
136.81.136.142.in-addr.arpa	name = www.twcarolina.com.
136.81.136.142.in-addr.arpa	name = twcarolina.com.
136.81.136.142.in-addr.arpa	name = twcsc.com.
136.81.136.142.in-addr.arpa	name = www.twcdigitalphone.com.
136.81.136.142.in-addr.arpa	name = www.elpaquetazo.com.
136.81.136.142.in-addr.arpa	name = www.twcnc.com.
136.81.136.142.in-addr.arpa	name = www.elpaq.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.215.10.6 attack
postfix
2020-04-18 16:26:09
182.50.132.103 attack
182.50.132.103 has been banned for [WebApp Attack]
...
2020-04-18 15:46:47
62.234.151.121 attackbots
$f2bV_matches
2020-04-18 15:56:54
210.21.226.2 attackspam
2020-04-17T23:33:33.2515591495-001 sshd[12651]: Invalid user test from 210.21.226.2 port 32600
2020-04-17T23:33:34.8148771495-001 sshd[12651]: Failed password for invalid user test from 210.21.226.2 port 32600 ssh2
2020-04-17T23:37:13.7031591495-001 sshd[12786]: Invalid user oracle from 210.21.226.2 port 1307
2020-04-17T23:37:13.7092131495-001 sshd[12786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2
2020-04-17T23:37:13.7031591495-001 sshd[12786]: Invalid user oracle from 210.21.226.2 port 1307
2020-04-17T23:37:15.7968921495-001 sshd[12786]: Failed password for invalid user oracle from 210.21.226.2 port 1307 ssh2
...
2020-04-18 16:19:27
188.166.34.129 attackspam
Port Scan
2020-04-18 16:19:49
222.186.30.35 attackbots
2020-04-18T10:00:57.224077vps773228.ovh.net sshd[23013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-04-18T10:00:59.339597vps773228.ovh.net sshd[23013]: Failed password for root from 222.186.30.35 port 30150 ssh2
2020-04-18T10:00:57.224077vps773228.ovh.net sshd[23013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-04-18T10:00:59.339597vps773228.ovh.net sshd[23013]: Failed password for root from 222.186.30.35 port 30150 ssh2
2020-04-18T10:01:02.297907vps773228.ovh.net sshd[23013]: Failed password for root from 222.186.30.35 port 30150 ssh2
...
2020-04-18 16:03:25
222.186.31.166 attackspambots
Apr 18 10:20:36 vmd38886 sshd\[26816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Apr 18 10:20:38 vmd38886 sshd\[26816\]: Failed password for root from 222.186.31.166 port 49237 ssh2
Apr 18 10:20:40 vmd38886 sshd\[26816\]: Failed password for root from 222.186.31.166 port 49237 ssh2
2020-04-18 16:27:23
106.12.33.181 attackbots
Apr 18 05:53:51 ns381471 sshd[17188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.181
Apr 18 05:53:53 ns381471 sshd[17188]: Failed password for invalid user ubuntu from 106.12.33.181 port 38812 ssh2
2020-04-18 15:58:35
41.223.142.211 attackbots
(sshd) Failed SSH login from 41.223.142.211 (BW/Botswana/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 18 09:09:51 srv sshd[25916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211  user=root
Apr 18 09:09:53 srv sshd[25916]: Failed password for root from 41.223.142.211 port 52136 ssh2
Apr 18 09:20:52 srv sshd[26117]: Invalid user iz from 41.223.142.211 port 57256
Apr 18 09:20:55 srv sshd[26117]: Failed password for invalid user iz from 41.223.142.211 port 57256 ssh2
Apr 18 09:24:19 srv sshd[26195]: Invalid user test6 from 41.223.142.211 port 51064
2020-04-18 16:00:29
182.71.221.78 attackspambots
Invalid user root2 from 182.71.221.78 port 48016
2020-04-18 16:24:43
162.243.128.127 attackbots
Unauthorized connection attempt detected from IP address 162.243.128.127 to port 587
2020-04-18 15:47:17
164.68.127.40 attackspambots
Apr 18 06:51:46 legacy sshd[19897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.127.40
Apr 18 06:51:48 legacy sshd[19897]: Failed password for invalid user oracle from 164.68.127.40 port 42176 ssh2
Apr 18 06:57:25 legacy sshd[20030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.127.40
...
2020-04-18 15:58:54
222.186.31.83 attackbots
Apr 18 07:41:05 ip-172-31-61-156 sshd[24342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Apr 18 07:41:07 ip-172-31-61-156 sshd[24342]: Failed password for root from 222.186.31.83 port 48095 ssh2
...
2020-04-18 15:54:17
163.179.126.39 attack
Invalid user gpas from 163.179.126.39 port 38738
2020-04-18 15:55:33
110.137.44.19 attack
Unauthorized connection attempt detected from IP address 110.137.44.19 to port 445
2020-04-18 15:59:10

最近上报的IP列表

142.137.248.90 142.139.24.123 142.136.81.135 142.139.25.42
142.146.96.11 142.147.105.19 142.147.109.8 142.147.99.156
142.154.237.15 142.147.97.90 142.154.121.88 142.154.111.71
142.154.62.208 142.156.90.42 142.154.74.173 142.164.252.13
142.154.97.230 142.165.148.140 142.165.148.57 142.165.95.198