必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.207.145.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.207.145.31.			IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:02:03 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
31.145.207.142.in-addr.arpa domain name pointer www.acme-journal.org.
31.145.207.142.in-addr.arpa domain name pointer acme-journal.org.
31.145.207.142.in-addr.arpa domain name pointer pg-uni-ojs-03.unbc.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
31.145.207.142.in-addr.arpa	name = www.acme-journal.org.
31.145.207.142.in-addr.arpa	name = acme-journal.org.
31.145.207.142.in-addr.arpa	name = pg-uni-ojs-03.unbc.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.54.160.180 attack
<6 unauthorized SSH connections
2020-07-25 15:18:39
121.204.145.50 attackspam
SSH Bruteforce attack
2020-07-25 15:36:27
3.230.154.144 attack
[SatJul2505:53:06.5408832020][:error][pid15693:tid47647169726208][client3.230.154.144:37226][client3.230.154.144]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"harya.ch"][uri"/"][unique_id"Xxusov5M77FgP3OXvb94pwAAAIQ"][SatJul2505:53:07.0303762020][:error][pid15839:tid47647186536192][client3.230.154.144:37248][client3.230.154.144]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"harya.ch"][uri"
2020-07-25 15:16:04
218.146.20.61 attack
Invalid user username from 218.146.20.61 port 45314
2020-07-25 15:33:15
185.234.218.82 attackbots
2020-07-25T01:19:32.298929linuxbox-skyline auth[15157]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=label rhost=185.234.218.82
...
2020-07-25 15:24:14
62.210.194.9 attack
Jul 25 05:33:49 mail.srvfarm.net postfix/smtpd[366539]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Jul 25 05:35:55 mail.srvfarm.net postfix/smtpd[369031]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Jul 25 05:38:00 mail.srvfarm.net postfix/smtpd[369051]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Jul 25 05:40:07 mail.srvfarm.net postfix/smtpd[369056]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Jul 25 05:41:08 mail.srvfarm.net postfix/smtpd[369046]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
2020-07-25 15:10:11
201.149.55.53 attackbots
<6 unauthorized SSH connections
2020-07-25 15:16:20
92.62.237.185 attack
Jul 25 05:35:27 mail.srvfarm.net postfix/smtps/smtpd[369855]: warning: unknown[92.62.237.185]: SASL PLAIN authentication failed: 
Jul 25 05:35:27 mail.srvfarm.net postfix/smtps/smtpd[369855]: lost connection after AUTH from unknown[92.62.237.185]
Jul 25 05:35:36 mail.srvfarm.net postfix/smtpd[369051]: warning: unknown[92.62.237.185]: SASL PLAIN authentication failed: 
Jul 25 05:35:36 mail.srvfarm.net postfix/smtpd[369051]: lost connection after AUTH from unknown[92.62.237.185]
Jul 25 05:38:28 mail.srvfarm.net postfix/smtpd[369031]: warning: unknown[92.62.237.185]: SASL PLAIN authentication failed:
2020-07-25 15:07:58
65.50.209.87 attackbotsspam
$f2bV_matches
2020-07-25 15:37:44
195.54.160.183 attackbots
<6 unauthorized SSH connections
2020-07-25 15:14:02
80.82.64.98 attack
(pop3d) Failed POP3 login from 80.82.64.98 (NL/Netherlands/-): 10 in the last 3600 secs; ID: rub
2020-07-25 14:57:06
45.227.253.190 attackbots
21 attempts against mh_ha-misbehave-ban on lb
2020-07-25 15:21:57
201.16.246.71 attackbotsspam
Invalid user spooky from 201.16.246.71 port 57118
2020-07-25 15:22:13
45.176.213.97 attackspambots
Jul 25 05:05:30 mail.srvfarm.net postfix/smtps/smtpd[352428]: warning: unknown[45.176.213.97]: SASL PLAIN authentication failed: 
Jul 25 05:05:31 mail.srvfarm.net postfix/smtps/smtpd[352428]: lost connection after AUTH from unknown[45.176.213.97]
Jul 25 05:06:34 mail.srvfarm.net postfix/smtpd[353277]: warning: unknown[45.176.213.97]: SASL PLAIN authentication failed: 
Jul 25 05:06:35 mail.srvfarm.net postfix/smtpd[353277]: lost connection after AUTH from unknown[45.176.213.97]
Jul 25 05:08:52 mail.srvfarm.net postfix/smtps/smtpd[352435]: warning: unknown[45.176.213.97]: SASL PLAIN authentication failed:
2020-07-25 15:11:55
35.247.248.24 attack
Invalid user web1 from 35.247.248.24 port 34242
2020-07-25 15:13:27

最近上报的IP列表

142.234.109.155 142.234.139.47 142.234.17.199 47.220.181.184
142.251.40.170 142.251.40.112 142.251.40.234 142.251.40.202
142.251.40.208 142.251.40.176 142.251.40.147 142.251.40.101
142.251.40.165 142.251.4.129 142.251.40.240 142.251.40.144
142.251.41.10 142.251.41.16 142.251.41.5 142.252.198.211