必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.155.21.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.155.21.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:39:03 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 192.21.155.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.21.155.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.218.7.227 attackspambots
5x Failed Password
2020-06-30 01:09:18
51.68.251.202 attackbots
2020-06-29T13:05:55.159193vps773228.ovh.net sshd[28118]: Failed password for invalid user dorian from 51.68.251.202 port 59614 ssh2
2020-06-29T13:09:00.447313vps773228.ovh.net sshd[28139]: Invalid user hospital from 51.68.251.202 port 58054
2020-06-29T13:09:00.462418vps773228.ovh.net sshd[28139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip202.ip-51-68-251.eu
2020-06-29T13:09:00.447313vps773228.ovh.net sshd[28139]: Invalid user hospital from 51.68.251.202 port 58054
2020-06-29T13:09:02.708677vps773228.ovh.net sshd[28139]: Failed password for invalid user hospital from 51.68.251.202 port 58054 ssh2
...
2020-06-30 01:14:33
194.88.106.197 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-29T09:33:43Z and 2020-06-29T11:09:17Z
2020-06-30 01:00:56
191.5.130.69 attackbotsspam
Jun 29 13:07:25 roki-contabo sshd\[14455\]: Invalid user cdk from 191.5.130.69
Jun 29 13:07:25 roki-contabo sshd\[14455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.130.69
Jun 29 13:07:27 roki-contabo sshd\[14455\]: Failed password for invalid user cdk from 191.5.130.69 port 34530 ssh2
Jun 29 13:09:20 roki-contabo sshd\[14491\]: Invalid user mdb from 191.5.130.69
Jun 29 13:09:20 roki-contabo sshd\[14491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.130.69
...
2020-06-30 00:54:25
68.183.177.189 attackbots
Jun 29 17:56:12 sso sshd[1380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.177.189
Jun 29 17:56:14 sso sshd[1380]: Failed password for invalid user admin from 68.183.177.189 port 52068 ssh2
...
2020-06-30 00:54:43
157.245.37.203 attackbots
157.245.37.203 - - [29/Jun/2020:13:53:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.37.203 - - [29/Jun/2020:13:53:28 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.37.203 - - [29/Jun/2020:13:53:28 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-30 01:12:07
2800:810:516:149b:df9:bf5f:10ea:5ec7 attackbotsspam
2800:810:516:149b:df9:bf5f:10ea:5ec7 - - [29/Jun/2020:12:56:02 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
2800:810:516:149b:df9:bf5f:10ea:5ec7 - - [29/Jun/2020:12:56:04 +0100] "POST /wp-login.php HTTP/1.1" 200 8310 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
2800:810:516:149b:df9:bf5f:10ea:5ec7 - - [29/Jun/2020:13:14:09 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-06-30 00:50:56
103.104.119.141 attackbotsspam
Jun 29 15:04:04 meumeu sshd[92086]: Invalid user glassfish from 103.104.119.141 port 59356
Jun 29 15:04:04 meumeu sshd[92086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.119.141 
Jun 29 15:04:04 meumeu sshd[92086]: Invalid user glassfish from 103.104.119.141 port 59356
Jun 29 15:04:07 meumeu sshd[92086]: Failed password for invalid user glassfish from 103.104.119.141 port 59356 ssh2
Jun 29 15:07:34 meumeu sshd[92146]: Invalid user producao from 103.104.119.141 port 42210
Jun 29 15:07:34 meumeu sshd[92146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.119.141 
Jun 29 15:07:34 meumeu sshd[92146]: Invalid user producao from 103.104.119.141 port 42210
Jun 29 15:07:36 meumeu sshd[92146]: Failed password for invalid user producao from 103.104.119.141 port 42210 ssh2
Jun 29 15:11:08 meumeu sshd[92267]: Invalid user lpj from 103.104.119.141 port 53290
...
2020-06-30 01:18:31
109.235.70.138 attackbots
-
2020-06-30 01:00:33
129.211.111.239 attack
Jun 29 17:35:51 nextcloud sshd\[15923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.111.239  user=root
Jun 29 17:35:52 nextcloud sshd\[15923\]: Failed password for root from 129.211.111.239 port 37792 ssh2
Jun 29 17:41:20 nextcloud sshd\[22755\]: Invalid user ftp_id from 129.211.111.239
Jun 29 17:41:20 nextcloud sshd\[22755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.111.239
2020-06-30 00:47:44
197.229.1.26 attackspam
Jun 29 13:08:56 server postfix/smtpd[8032]: NOQUEUE: reject: RCPT from 8ta-229-1-26.telkomadsl.co.za[197.229.1.26]: 554 5.7.1 Service unavailable; Client host [197.229.1.26] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/197.229.1.26; from= to= proto=ESMTP helo=<8ta-229-1-113.telkomadsl.co.za>
2020-06-30 01:21:28
67.205.170.167 attackspambots
Jun 29 09:25:23 server1 sshd\[13188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.170.167  user=root
Jun 29 09:25:25 server1 sshd\[13188\]: Failed password for root from 67.205.170.167 port 56584 ssh2
Jun 29 09:28:49 server1 sshd\[15576\]: Invalid user noah from 67.205.170.167
Jun 29 09:28:50 server1 sshd\[15576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.170.167 
Jun 29 09:28:52 server1 sshd\[15576\]: Failed password for invalid user noah from 67.205.170.167 port 55484 ssh2
...
2020-06-30 01:18:48
171.224.190.1 attack
Jun 29 07:08:51 mail sshd\[2871\]: Invalid user 666666 from 171.224.190.1
...
2020-06-30 01:22:49
14.250.231.61 attackspambots
Time:     Mon Jun 29 09:52:46 2020 -0300
IP:       14.250.231.61 (VN/Vietnam/static.vnpt.vn)
Failures: 20 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-06-30 01:18:07
222.186.175.215 attack
Jun 29 18:31:19 sshgateway sshd\[28201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jun 29 18:31:21 sshgateway sshd\[28201\]: Failed password for root from 222.186.175.215 port 20452 ssh2
Jun 29 18:31:36 sshgateway sshd\[28201\]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 20452 ssh2 \[preauth\]
2020-06-30 01:00:22

最近上报的IP列表

136.181.149.107 48.131.111.110 162.10.189.174 25.243.106.88
36.71.146.148 68.111.120.131 154.2.234.56 30.233.81.127
47.179.165.196 145.49.26.113 250.67.106.18 188.178.164.106
193.145.15.197 86.39.99.93 169.220.208.23 170.198.9.170
97.131.49.109 162.219.198.23 3.237.117.187 38.113.140.169