必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.4.204.122 attackspambots
Sep 28 19:03:45 markkoudstaal sshd[14326]: Failed password for root from 142.4.204.122 port 49890 ssh2
Sep 28 19:10:02 markkoudstaal sshd[16180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122
Sep 28 19:10:04 markkoudstaal sshd[16180]: Failed password for invalid user juancarlos from 142.4.204.122 port 53488 ssh2
...
2020-09-29 05:59:12
142.4.204.122 attack
Bruteforce detected by fail2ban
2020-09-28 22:23:56
142.4.204.122 attackspam
(sshd) Failed SSH login from 142.4.204.122 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 00:39:40 server2 sshd[20915]: Invalid user admin from 142.4.204.122
Sep 28 00:39:40 server2 sshd[20915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122 
Sep 28 00:39:42 server2 sshd[20915]: Failed password for invalid user admin from 142.4.204.122 port 37394 ssh2
Sep 28 00:56:38 server2 sshd[7095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
Sep 28 00:56:40 server2 sshd[7095]: Failed password for root from 142.4.204.122 port 33019 ssh2
2020-09-28 14:29:41
142.4.204.122 attackbotsspam
Sep 25 01:06:46 prox sshd[22468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122 
Sep 25 01:06:48 prox sshd[22468]: Failed password for invalid user tommy from 142.4.204.122 port 47727 ssh2
2020-09-25 09:27:54
142.4.204.122 attackbots
(sshd) Failed SSH login from 142.4.204.122 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 00:50:11 server sshd[27305]: Invalid user telnet from 142.4.204.122 port 60670
Sep 24 00:50:13 server sshd[27305]: Failed password for invalid user telnet from 142.4.204.122 port 60670 ssh2
Sep 24 00:54:27 server sshd[28339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
Sep 24 00:54:29 server sshd[28339]: Failed password for root from 142.4.204.122 port 47902 ssh2
Sep 24 00:56:48 server sshd[29000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
2020-09-24 23:28:10
142.4.204.122 attackspambots
(sshd) Failed SSH login from 142.4.204.122 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 00:50:11 server sshd[27305]: Invalid user telnet from 142.4.204.122 port 60670
Sep 24 00:50:13 server sshd[27305]: Failed password for invalid user telnet from 142.4.204.122 port 60670 ssh2
Sep 24 00:54:27 server sshd[28339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
Sep 24 00:54:29 server sshd[28339]: Failed password for root from 142.4.204.122 port 47902 ssh2
Sep 24 00:56:48 server sshd[29000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
2020-09-24 15:15:12
142.4.204.122 attackbotsspam
Brute force attempt
2020-09-24 06:41:16
142.4.204.122 attackbotsspam
Sep  6 17:03:26 eventyay sshd[28124]: Failed password for root from 142.4.204.122 port 49936 ssh2
Sep  6 17:05:51 eventyay sshd[28174]: Failed password for root from 142.4.204.122 port 32812 ssh2
...
2020-09-07 03:57:20
142.4.204.122 attackbots
...
2020-09-06 19:29:32
142.4.204.122 attackspam
Sep  4 12:27:56 mout sshd[24346]: Invalid user phoenix from 142.4.204.122 port 44031
Sep  4 12:27:58 mout sshd[24346]: Failed password for invalid user phoenix from 142.4.204.122 port 44031 ssh2
Sep  4 12:28:00 mout sshd[24346]: Disconnected from invalid user phoenix 142.4.204.122 port 44031 [preauth]
2020-09-05 03:54:21
142.4.204.122 attackbotsspam
Sep  4 12:27:56 mout sshd[24346]: Invalid user phoenix from 142.4.204.122 port 44031
Sep  4 12:27:58 mout sshd[24346]: Failed password for invalid user phoenix from 142.4.204.122 port 44031 ssh2
Sep  4 12:28:00 mout sshd[24346]: Disconnected from invalid user phoenix 142.4.204.122 port 44031 [preauth]
2020-09-04 19:25:05
142.4.204.122 attackspambots
$f2bV_matches
2020-08-30 17:10:48
142.4.209.40 attackbots
 TCP (SYN) 142.4.209.40:56258 -> port 80, len 60
2020-08-27 03:42:11
142.4.204.122 attackspambots
Aug 13 17:59:16 mail sshd\[43437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122  user=root
...
2020-08-14 07:41:53
142.4.205.238 attackbotsspam
2020-08-13T04:51:28.657963perso.[domain] sshd[1068407]: Failed password for root from 142.4.205.238 port 47452 ssh2 2020-08-13T04:51:31.376235perso.[domain] sshd[1068407]: Failed password for root from 142.4.205.238 port 47452 ssh2 2020-08-13T04:51:33.606419perso.[domain] sshd[1068407]: Failed password for root from 142.4.205.238 port 47452 ssh2 ...
2020-08-14 07:41:41
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.20.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.4.20.137.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:39:49 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
137.20.4.142.in-addr.arpa domain name pointer server.satranchaber.com.tr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.20.4.142.in-addr.arpa	name = server.satranchaber.com.tr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.180.41 attack
Nov 28 01:19:36 markkoudstaal sshd[22310]: Failed password for root from 222.186.180.41 port 30220 ssh2
Nov 28 01:19:48 markkoudstaal sshd[22310]: Failed password for root from 222.186.180.41 port 30220 ssh2
Nov 28 01:19:48 markkoudstaal sshd[22310]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 30220 ssh2 [preauth]
2019-11-28 08:23:09
167.71.82.184 attackspam
Automatic report - Banned IP Access
2019-11-28 08:03:28
104.254.92.54 attackbots
HTTP contact form spam
2019-11-28 07:57:20
218.92.0.170 attackbots
Nov 28 00:58:22 MK-Soft-Root1 sshd[13779]: Failed password for root from 218.92.0.170 port 45732 ssh2
Nov 28 00:58:26 MK-Soft-Root1 sshd[13779]: Failed password for root from 218.92.0.170 port 45732 ssh2
...
2019-11-28 08:13:59
188.166.229.205 attackspam
Invalid user backuppc from 188.166.229.205 port 43918
2019-11-28 08:23:27
111.231.89.197 attackspambots
Automatic report - Banned IP Access
2019-11-28 08:01:35
122.54.149.43 attackbots
port scan/probe/communication attempt; port 23
2019-11-28 07:54:39
222.186.175.163 attackspam
Nov 28 01:03:08 meumeu sshd[16521]: Failed password for root from 222.186.175.163 port 46790 ssh2
Nov 28 01:03:21 meumeu sshd[16521]: Failed password for root from 222.186.175.163 port 46790 ssh2
Nov 28 01:03:24 meumeu sshd[16521]: Failed password for root from 222.186.175.163 port 46790 ssh2
Nov 28 01:03:25 meumeu sshd[16521]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 46790 ssh2 [preauth]
...
2019-11-28 08:04:42
218.92.0.188 attack
2019-11-28T01:00:16.912837vps751288.ovh.net sshd\[31602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.188  user=root
2019-11-28T01:00:18.769275vps751288.ovh.net sshd\[31602\]: Failed password for root from 218.92.0.188 port 50918 ssh2
2019-11-28T01:00:21.923832vps751288.ovh.net sshd\[31602\]: Failed password for root from 218.92.0.188 port 50918 ssh2
2019-11-28T01:00:24.959500vps751288.ovh.net sshd\[31602\]: Failed password for root from 218.92.0.188 port 50918 ssh2
2019-11-28T01:00:28.405182vps751288.ovh.net sshd\[31602\]: Failed password for root from 218.92.0.188 port 50918 ssh2
2019-11-28 08:06:11
81.45.56.199 attackbotsspam
Nov 27 18:32:48 ny01 sshd[27727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
Nov 27 18:32:50 ny01 sshd[27727]: Failed password for invalid user snapper from 81.45.56.199 port 50130 ssh2
Nov 27 18:39:30 ny01 sshd[28367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
2019-11-28 07:46:39
112.85.42.176 attackspam
Nov 28 07:13:25 webhost01 sshd[27233]: Failed password for root from 112.85.42.176 port 60827 ssh2
Nov 28 07:13:36 webhost01 sshd[27233]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 60827 ssh2 [preauth]
...
2019-11-28 08:13:46
51.77.140.111 attack
Nov 27 12:52:37 web1 sshd\[21053\]: Invalid user meltsch from 51.77.140.111
Nov 27 12:52:37 web1 sshd\[21053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Nov 27 12:52:39 web1 sshd\[21053\]: Failed password for invalid user meltsch from 51.77.140.111 port 50720 ssh2
Nov 27 12:58:36 web1 sshd\[21573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111  user=root
Nov 27 12:58:38 web1 sshd\[21573\]: Failed password for root from 51.77.140.111 port 57854 ssh2
2019-11-28 07:53:45
1.245.61.144 attack
Nov 28 01:50:01 sauna sshd[58014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144
Nov 28 01:50:04 sauna sshd[58014]: Failed password for invalid user gx from 1.245.61.144 port 40030 ssh2
...
2019-11-28 07:58:57
165.22.121.222 attackbots
Excessive Port-Scanning
2019-11-28 08:20:55
49.88.112.113 attack
Nov 27 19:23:14 plusreed sshd[9849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Nov 27 19:23:17 plusreed sshd[9849]: Failed password for root from 49.88.112.113 port 46545 ssh2
...
2019-11-28 08:24:12

最近上报的IP列表

118.96.33.142 142.4.20.195 142.4.20.77 142.4.201.39
142.4.200.185 142.4.201.35 142.4.20.128 142.4.203.248
142.4.201.94 142.4.202.123 142.4.201.161 142.4.203.120
142.4.204.181 118.96.34.10 142.4.204.179 142.4.207.235
142.4.208.53 142.4.209.198 142.4.205.79 142.4.209.203