必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Winnipeg

省份(region): Manitoba

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.138.221.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45312
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.138.221.105.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082700 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 28 00:41:20 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 105.221.138.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 105.221.138.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.137.82.213 attackbots
Feb 17 05:47:52 vtv3 sshd\[30070\]: Invalid user intro1 from 79.137.82.213 port 57538
Feb 17 05:47:52 vtv3 sshd\[30070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
Feb 17 05:47:54 vtv3 sshd\[30070\]: Failed password for invalid user intro1 from 79.137.82.213 port 57538 ssh2
Feb 17 05:55:47 vtv3 sshd\[32521\]: Invalid user rtkit from 79.137.82.213 port 48354
Feb 17 05:55:47 vtv3 sshd\[32521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
Feb 21 02:35:50 vtv3 sshd\[2277\]: Invalid user user from 79.137.82.213 port 41370
Feb 21 02:35:50 vtv3 sshd\[2277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
Feb 21 02:35:52 vtv3 sshd\[2277\]: Failed password for invalid user user from 79.137.82.213 port 41370 ssh2
Feb 21 02:41:20 vtv3 sshd\[3788\]: Invalid user user from 79.137.82.213 port 59566
Feb 21 02:41:20 vtv3 sshd\[3788\]: pam_unix\(s
2019-09-29 18:35:25
218.92.0.201 attackspambots
Sep 29 12:07:42 dcd-gentoo sshd[5521]: User root from 218.92.0.201 not allowed because none of user's groups are listed in AllowGroups
Sep 29 12:07:45 dcd-gentoo sshd[5521]: error: PAM: Authentication failure for illegal user root from 218.92.0.201
Sep 29 12:07:42 dcd-gentoo sshd[5521]: User root from 218.92.0.201 not allowed because none of user's groups are listed in AllowGroups
Sep 29 12:07:45 dcd-gentoo sshd[5521]: error: PAM: Authentication failure for illegal user root from 218.92.0.201
Sep 29 12:07:42 dcd-gentoo sshd[5521]: User root from 218.92.0.201 not allowed because none of user's groups are listed in AllowGroups
Sep 29 12:07:45 dcd-gentoo sshd[5521]: error: PAM: Authentication failure for illegal user root from 218.92.0.201
Sep 29 12:07:45 dcd-gentoo sshd[5521]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.201 port 47167 ssh2
...
2019-09-29 18:47:41
192.3.177.213 attackspam
2019-09-29T04:15:39.0214401495-001 sshd\[52246\]: Failed password for invalid user user from 192.3.177.213 port 45718 ssh2
2019-09-29T04:28:21.5740091495-001 sshd\[53142\]: Invalid user simran from 192.3.177.213 port 56004
2019-09-29T04:28:21.5809761495-001 sshd\[53142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213
2019-09-29T04:28:22.9155221495-001 sshd\[53142\]: Failed password for invalid user simran from 192.3.177.213 port 56004 ssh2
2019-09-29T04:32:35.8574381495-001 sshd\[53458\]: Invalid user admin from 192.3.177.213 port 40610
2019-09-29T04:32:35.8679041495-001 sshd\[53458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213
...
2019-09-29 18:26:17
54.39.44.47 attack
Automated report - ssh fail2ban:
Sep 29 05:43:24 authentication failure 
Sep 29 05:43:25 wrong password, user=testuser, port=48320, ssh2
Sep 29 05:47:27 authentication failure
2019-09-29 18:45:34
114.32.230.189 attack
Sep 29 11:48:10 jane sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.230.189 
Sep 29 11:48:12 jane sshd[11265]: Failed password for invalid user ts3bot from 114.32.230.189 port 27879 ssh2
...
2019-09-29 18:46:57
51.254.205.6 attackspambots
Sep 29 07:52:58 vps01 sshd[16532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
Sep 29 07:53:00 vps01 sshd[16532]: Failed password for invalid user wilhelm from 51.254.205.6 port 51348 ssh2
2019-09-29 18:25:30
89.165.2.239 attackspambots
Fail2Ban Ban Triggered
2019-09-29 18:34:02
183.82.248.251 attackspambots
Honeypot attack, port: 23, PTR: broadband.actcorp.in.
2019-09-29 18:33:02
46.189.174.35 attackspam
Forbidden directory scan :: 2019/09/29 18:04:18 [error] 1103#1103: *499111 access forbidden by rule, client: 46.189.174.35, server: [censored_4], request: "GET //dump.sql HTTP/1.1", host: "[censored_4]", referrer: "http://[censored_4]:80//dump.sql"
2019-09-29 18:49:50
116.52.9.220 attackspam
Sep 29 10:26:43 vpn01 sshd[20140]: Failed password for root from 116.52.9.220 port 56111 ssh2
Sep 29 10:26:45 vpn01 sshd[20140]: Failed password for root from 116.52.9.220 port 56111 ssh2
...
2019-09-29 18:28:33
183.157.170.88 attackbotsspam
Chat Spam
2019-09-29 18:50:10
117.92.16.72 attack
[Aegis] @ 2019-09-29 04:47:39  0100 -> Sendmail rejected message.
2019-09-29 18:33:37
77.247.110.203 attackspam
\[2019-09-29 06:14:06\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '77.247.110.203:58656' - Wrong password
\[2019-09-29 06:14:06\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-29T06:14:06.173-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2222222266",SessionID="0x7f1e1d0b85d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.203/58656",Challenge="175c3bf1",ReceivedChallenge="175c3bf1",ReceivedHash="c38107fb4cd5ed2fd5174db51b1a087b"
\[2019-09-29 06:14:43\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '77.247.110.203:60124' - Wrong password
\[2019-09-29 06:14:43\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-29T06:14:43.956-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2222222277",SessionID="0x7f1e1c3f8aa8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV
2019-09-29 18:23:40
41.239.26.248 attack
Honeypot attack, port: 23, PTR: host-41.239.26.248.tedata.net.
2019-09-29 18:27:31
192.157.236.124 attackspam
Sep 29 05:22:54 dallas01 sshd[26396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.157.236.124
Sep 29 05:22:56 dallas01 sshd[26396]: Failed password for invalid user shauney from 192.157.236.124 port 44996 ssh2
Sep 29 05:26:26 dallas01 sshd[26887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.157.236.124
2019-09-29 18:46:06

最近上报的IP列表

61.161.210.92 176.121.184.62 238.215.132.197 83.115.23.73
78.209.19.207 177.139.18.185 182.128.175.73 104.220.206.212
24.146.232.81 236.119.153.77 109.207.79.116 111.251.82.156
152.36.14.132 166.165.226.255 246.34.58.102 144.186.215.146
178.161.41.136 61.1.254.210 104.148.70.72 145.121.89.45