必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.4.204.122 attackspambots
Sep 28 19:03:45 markkoudstaal sshd[14326]: Failed password for root from 142.4.204.122 port 49890 ssh2
Sep 28 19:10:02 markkoudstaal sshd[16180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122
Sep 28 19:10:04 markkoudstaal sshd[16180]: Failed password for invalid user juancarlos from 142.4.204.122 port 53488 ssh2
...
2020-09-29 05:59:12
142.4.204.122 attack
Bruteforce detected by fail2ban
2020-09-28 22:23:56
142.4.204.122 attackspam
(sshd) Failed SSH login from 142.4.204.122 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 00:39:40 server2 sshd[20915]: Invalid user admin from 142.4.204.122
Sep 28 00:39:40 server2 sshd[20915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122 
Sep 28 00:39:42 server2 sshd[20915]: Failed password for invalid user admin from 142.4.204.122 port 37394 ssh2
Sep 28 00:56:38 server2 sshd[7095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
Sep 28 00:56:40 server2 sshd[7095]: Failed password for root from 142.4.204.122 port 33019 ssh2
2020-09-28 14:29:41
142.4.204.122 attackbotsspam
Sep 25 01:06:46 prox sshd[22468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122 
Sep 25 01:06:48 prox sshd[22468]: Failed password for invalid user tommy from 142.4.204.122 port 47727 ssh2
2020-09-25 09:27:54
142.4.204.122 attackbots
(sshd) Failed SSH login from 142.4.204.122 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 00:50:11 server sshd[27305]: Invalid user telnet from 142.4.204.122 port 60670
Sep 24 00:50:13 server sshd[27305]: Failed password for invalid user telnet from 142.4.204.122 port 60670 ssh2
Sep 24 00:54:27 server sshd[28339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
Sep 24 00:54:29 server sshd[28339]: Failed password for root from 142.4.204.122 port 47902 ssh2
Sep 24 00:56:48 server sshd[29000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
2020-09-24 23:28:10
142.4.204.122 attackspambots
(sshd) Failed SSH login from 142.4.204.122 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 00:50:11 server sshd[27305]: Invalid user telnet from 142.4.204.122 port 60670
Sep 24 00:50:13 server sshd[27305]: Failed password for invalid user telnet from 142.4.204.122 port 60670 ssh2
Sep 24 00:54:27 server sshd[28339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
Sep 24 00:54:29 server sshd[28339]: Failed password for root from 142.4.204.122 port 47902 ssh2
Sep 24 00:56:48 server sshd[29000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
2020-09-24 15:15:12
142.4.204.122 attackbotsspam
Brute force attempt
2020-09-24 06:41:16
142.4.204.122 attackbotsspam
Sep  6 17:03:26 eventyay sshd[28124]: Failed password for root from 142.4.204.122 port 49936 ssh2
Sep  6 17:05:51 eventyay sshd[28174]: Failed password for root from 142.4.204.122 port 32812 ssh2
...
2020-09-07 03:57:20
142.4.204.122 attackbots
...
2020-09-06 19:29:32
142.4.204.122 attackspam
Sep  4 12:27:56 mout sshd[24346]: Invalid user phoenix from 142.4.204.122 port 44031
Sep  4 12:27:58 mout sshd[24346]: Failed password for invalid user phoenix from 142.4.204.122 port 44031 ssh2
Sep  4 12:28:00 mout sshd[24346]: Disconnected from invalid user phoenix 142.4.204.122 port 44031 [preauth]
2020-09-05 03:54:21
142.4.204.122 attackbotsspam
Sep  4 12:27:56 mout sshd[24346]: Invalid user phoenix from 142.4.204.122 port 44031
Sep  4 12:27:58 mout sshd[24346]: Failed password for invalid user phoenix from 142.4.204.122 port 44031 ssh2
Sep  4 12:28:00 mout sshd[24346]: Disconnected from invalid user phoenix 142.4.204.122 port 44031 [preauth]
2020-09-04 19:25:05
142.4.204.122 attackspambots
$f2bV_matches
2020-08-30 17:10:48
142.4.209.40 attackbots
 TCP (SYN) 142.4.209.40:56258 -> port 80, len 60
2020-08-27 03:42:11
142.4.204.122 attackspambots
Aug 13 17:59:16 mail sshd\[43437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
...
2020-08-14 07:41:53
142.4.205.238 attackbotsspam
2020-08-13T04:51:28.657963perso.[domain] sshd[1068407]: Failed password for root from 142.4.205.238 port 47452 ssh2 2020-08-13T04:51:31.376235perso.[domain] sshd[1068407]: Failed password for root from 142.4.205.238 port 47452 ssh2 2020-08-13T04:51:33.606419perso.[domain] sshd[1068407]: Failed password for root from 142.4.205.238 port 47452 ssh2 ...
2020-08-14 07:41:41
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.20.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.4.20.119.			IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012402 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 25 12:09:08 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
119.20.4.142.in-addr.arpa domain name pointer 142-4-20-119.unifiedlayer.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.20.4.142.in-addr.arpa	name = 142-4-20-119.unifiedlayer.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.48.67.92 attackspam
Brute force attempt
2020-03-08 20:35:38
220.134.72.196 attackspambots
Honeypot attack, port: 81, PTR: 220-134-72-196.HINET-IP.hinet.net.
2020-03-08 20:43:20
115.75.103.27 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 20:15:08
94.191.86.249 attackbotsspam
Mar  8 09:03:40 ns382633 sshd\[31946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.86.249  user=root
Mar  8 09:03:42 ns382633 sshd\[31946\]: Failed password for root from 94.191.86.249 port 53402 ssh2
Mar  8 09:15:56 ns382633 sshd\[1857\]: Invalid user anil from 94.191.86.249 port 35652
Mar  8 09:15:56 ns382633 sshd\[1857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.86.249
Mar  8 09:15:58 ns382633 sshd\[1857\]: Failed password for invalid user anil from 94.191.86.249 port 35652 ssh2
2020-03-08 20:29:30
124.205.119.183 attackspam
Mar  8 03:04:15 ws12vmsma01 sshd[6835]: Invalid user student2 from 124.205.119.183
Mar  8 03:04:17 ws12vmsma01 sshd[6835]: Failed password for invalid user student2 from 124.205.119.183 port 1736 ssh2
Mar  8 03:14:05 ws12vmsma01 sshd[8236]: Invalid user testftp from 124.205.119.183
...
2020-03-08 20:10:46
220.132.176.232 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-08 20:17:02
196.201.83.10 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 20:38:45
173.205.13.236 attack
Jan 21 03:21:28 ms-srv sshd[31270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.205.13.236
Jan 21 03:21:30 ms-srv sshd[31270]: Failed password for invalid user factorio from 173.205.13.236 port 47872 ssh2
2020-03-08 20:31:39
27.72.102.190 attackbotsspam
Mar  8 11:18:47 hosting sshd[10288]: Invalid user test from 27.72.102.190 port 43262
...
2020-03-08 20:14:02
159.65.147.107 attackbotsspam
159.65.147.107 - - \[08/Mar/2020:13:06:51 +0100\] "POST /wp-login.php HTTP/1.1" 200 6148 "-" "-"
2020-03-08 20:18:59
79.115.127.100 attackspam
" "
2020-03-08 20:45:01
223.171.32.56 attackbots
2020-03-08T11:26:40.758009vps751288.ovh.net sshd\[25596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56  user=root
2020-03-08T11:26:42.644516vps751288.ovh.net sshd\[25596\]: Failed password for root from 223.171.32.56 port 42706 ssh2
2020-03-08T11:31:45.496630vps751288.ovh.net sshd\[25614\]: Invalid user mongodb from 223.171.32.56 port 42706
2020-03-08T11:31:45.504508vps751288.ovh.net sshd\[25614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56
2020-03-08T11:31:47.927999vps751288.ovh.net sshd\[25614\]: Failed password for invalid user mongodb from 223.171.32.56 port 42706 ssh2
2020-03-08 20:27:13
198.199.66.52 attack
Automatic report - XMLRPC Attack
2020-03-08 20:31:20
116.196.109.72 attackspambots
Mar  8 10:09:00 amit sshd\[18114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.109.72  user=root
Mar  8 10:09:02 amit sshd\[18114\]: Failed password for root from 116.196.109.72 port 35416 ssh2
Mar  8 10:15:52 amit sshd\[4945\]: Invalid user arul from 116.196.109.72
Mar  8 10:15:52 amit sshd\[4945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.109.72
...
2020-03-08 20:11:16
189.237.134.43 attackbotsspam
1583642937 - 03/08/2020 05:48:57 Host: 189.237.134.43/189.237.134.43 Port: 445 TCP Blocked
2020-03-08 20:17:35

最近上报的IP列表

222.137.85.172 202.132.6.20 145.135.208.237 114.63.222.20
138.243.145.90 126.50.243.138 115.92.22.245 113.167.172.212
112.230.6.45 202.26.61.41 121.231.91.31 55.42.176.112
107.35.248.77 179.124.24.215 137.61.222.249 102.86.92.173
101.231.16.240 45.21.114.77 63.113.205.224 82.190.25.137