必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.222.232.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14651
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.222.232.146.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 22:52:20 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 146.232.222.142.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 146.232.222.142.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.172.66.227 attackspam
...
2020-04-16 15:10:10
59.120.189.230 attackspambots
Apr 16 08:02:17 pkdns2 sshd\[17151\]: Invalid user single from 59.120.189.230Apr 16 08:02:19 pkdns2 sshd\[17151\]: Failed password for invalid user single from 59.120.189.230 port 62212 ssh2Apr 16 08:06:36 pkdns2 sshd\[17346\]: Invalid user ftp from 59.120.189.230Apr 16 08:06:38 pkdns2 sshd\[17346\]: Failed password for invalid user ftp from 59.120.189.230 port 62726 ssh2Apr 16 08:10:44 pkdns2 sshd\[17533\]: Invalid user virus from 59.120.189.230Apr 16 08:10:46 pkdns2 sshd\[17533\]: Failed password for invalid user virus from 59.120.189.230 port 63238 ssh2
...
2020-04-16 14:55:32
49.88.112.72 attackbotsspam
Apr 16 09:30:23 pkdns2 sshd\[21304\]: Failed password for root from 49.88.112.72 port 58536 ssh2Apr 16 09:31:07 pkdns2 sshd\[21339\]: Failed password for root from 49.88.112.72 port 64484 ssh2Apr 16 09:31:09 pkdns2 sshd\[21339\]: Failed password for root from 49.88.112.72 port 64484 ssh2Apr 16 09:31:11 pkdns2 sshd\[21339\]: Failed password for root from 49.88.112.72 port 64484 ssh2Apr 16 09:31:55 pkdns2 sshd\[21349\]: Failed password for root from 49.88.112.72 port 37085 ssh2Apr 16 09:31:56 pkdns2 sshd\[21349\]: Failed password for root from 49.88.112.72 port 37085 ssh2
...
2020-04-16 14:51:11
80.82.70.239 attackspambots
firewall-block, port(s): 6011/tcp
2020-04-16 15:15:16
128.199.199.217 attack
Apr 16 04:39:40 *** sshd[5531]: User root from 128.199.199.217 not allowed because not listed in AllowUsers
2020-04-16 15:03:20
213.180.203.1 attack
[Thu Apr 16 10:52:43.481831 2020] [:error] [pid 26533:tid 140327401670400] [client 213.180.203.1:52924] [client 213.180.203.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XpfWiwgMfcwBi0GyvasHrgAABOw"]
...
2020-04-16 15:06:50
35.245.33.180 attackbots
2020-04-16T02:33:24.4908921495-001 sshd[34810]: Invalid user dy from 35.245.33.180 port 41532
2020-04-16T02:33:26.7327391495-001 sshd[34810]: Failed password for invalid user dy from 35.245.33.180 port 41532 ssh2
2020-04-16T02:39:08.7696491495-001 sshd[35085]: Invalid user test from 35.245.33.180 port 48064
2020-04-16T02:39:08.7768031495-001 sshd[35085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.33.245.35.bc.googleusercontent.com
2020-04-16T02:39:08.7696491495-001 sshd[35085]: Invalid user test from 35.245.33.180 port 48064
2020-04-16T02:39:10.9022011495-001 sshd[35085]: Failed password for invalid user test from 35.245.33.180 port 48064 ssh2
...
2020-04-16 15:01:20
104.211.164.150 attack
Invalid user 3comcso from 104.211.164.150 port 54096
2020-04-16 15:08:34
50.56.174.145 attackbots
Apr 16 05:34:33 XXX sshd[52328]: Invalid user update from 50.56.174.145 port 33535
2020-04-16 15:12:04
178.154.200.157 attackspambots
[Thu Apr 16 10:53:16.444176 2020] [:error] [pid 26533:tid 140327310583552] [client 178.154.200.157:38330] [client 178.154.200.157] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XpfWrAgMfcwBi0GyvasHrwAABO4"]
...
2020-04-16 14:46:00
103.242.56.209 attackspambots
Apr 16 09:41:50 pkdns2 sshd\[21872\]: Invalid user aa from 103.242.56.209Apr 16 09:41:52 pkdns2 sshd\[21872\]: Failed password for invalid user aa from 103.242.56.209 port 46758 ssh2Apr 16 09:45:07 pkdns2 sshd\[22050\]: Invalid user admin from 103.242.56.209Apr 16 09:45:09 pkdns2 sshd\[22050\]: Failed password for invalid user admin from 103.242.56.209 port 35334 ssh2Apr 16 09:47:44 pkdns2 sshd\[22187\]: Invalid user test from 103.242.56.209Apr 16 09:47:46 pkdns2 sshd\[22187\]: Failed password for invalid user test from 103.242.56.209 port 42602 ssh2
...
2020-04-16 15:00:48
80.90.169.242 attackbots
Unauthorized connection attempt from IP address 80.90.169.242 on Port 445(SMB)
2020-04-16 15:03:01
125.212.233.50 attackbots
Invalid user box from 125.212.233.50 port 41022
2020-04-16 15:10:45
5.196.70.107 attack
Apr 16 13:15:25 webhost01 sshd[30404]: Failed password for root from 5.196.70.107 port 36046 ssh2
...
2020-04-16 14:43:34
119.28.104.62 attackspambots
B: f2b ssh aggressive 3x
2020-04-16 15:20:07

最近上报的IP列表

192.40.170.48 14.40.125.154 244.122.76.64 14.112.236.86
27.166.207.212 5.156.212.147 48.17.252.120 14.182.70.64
148.139.3.59 60.135.219.237 211.179.198.184 40.165.132.75
192.242.220.161 233.84.17.8 53.223.235.81 199.211.220.63
210.206.21.37 45.211.99.131 128.147.208.89 57.49.61.224