必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.57.94.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.57.94.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 11:49:46 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 34.94.57.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.94.57.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.121.40 attackspambots
Oct 23 18:03:59 hanapaa sshd\[1091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.121.40  user=root
Oct 23 18:04:01 hanapaa sshd\[1091\]: Failed password for root from 106.12.121.40 port 52640 ssh2
Oct 23 18:08:41 hanapaa sshd\[1445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.121.40  user=root
Oct 23 18:08:43 hanapaa sshd\[1445\]: Failed password for root from 106.12.121.40 port 33434 ssh2
Oct 23 18:13:15 hanapaa sshd\[1929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.121.40  user=root
2019-10-24 13:10:14
198.16.43.133 attackbotsspam
445/tcp 1433/tcp
[2019-10-20/24]2pkt
2019-10-24 13:43:17
209.90.178.190 attackbotsspam
Oct 24 05:39:22 km20725 sshd[5363]: reveeclipse mapping checking getaddrinfo for 209.90.178.190.gs.unused.primus.ca [209.90.178.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 24 05:39:22 km20725 sshd[5363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.90.178.190  user=r.r
Oct 24 05:39:23 km20725 sshd[5363]: Failed password for r.r from 209.90.178.190 port 50846 ssh2
Oct 24 05:39:24 km20725 sshd[5363]: Received disconnect from 209.90.178.190: 11: Bye Bye [preauth]
Oct 24 05:51:39 km20725 sshd[6004]: reveeclipse mapping checking getaddrinfo for 209.90.178.190.gs.unused.primus.ca [209.90.178.190] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 24 05:51:39 km20725 sshd[6004]: Invalid user super from 209.90.178.190
Oct 24 05:51:39 km20725 sshd[6004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.90.178.190
Oct 24 05:51:41 km20725 sshd[6004]: Failed password for invalid user super from 209.90.1........
-------------------------------
2019-10-24 12:58:16
94.158.245.185 attackspambots
Oct 24 00:50:37 plusreed sshd[11573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.158.245.185  user=root
Oct 24 00:50:39 plusreed sshd[11573]: Failed password for root from 94.158.245.185 port 49966 ssh2
...
2019-10-24 12:52:48
104.42.30.9 attackspambots
23/tcp 23/tcp 23/tcp...
[2019-10-04/24]6pkt,1pt.(tcp)
2019-10-24 12:59:00
222.186.175.140 attack
Oct 24 07:18:55 dcd-gentoo sshd[7029]: User root from 222.186.175.140 not allowed because none of user's groups are listed in AllowGroups
Oct 24 07:18:59 dcd-gentoo sshd[7029]: error: PAM: Authentication failure for illegal user root from 222.186.175.140
Oct 24 07:18:55 dcd-gentoo sshd[7029]: User root from 222.186.175.140 not allowed because none of user's groups are listed in AllowGroups
Oct 24 07:18:59 dcd-gentoo sshd[7029]: error: PAM: Authentication failure for illegal user root from 222.186.175.140
Oct 24 07:18:55 dcd-gentoo sshd[7029]: User root from 222.186.175.140 not allowed because none of user's groups are listed in AllowGroups
Oct 24 07:18:59 dcd-gentoo sshd[7029]: error: PAM: Authentication failure for illegal user root from 222.186.175.140
Oct 24 07:18:59 dcd-gentoo sshd[7029]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.140 port 45682 ssh2
...
2019-10-24 13:20:56
88.214.26.19 attack
191023 21:28:12 \[Warning\] Access denied for user 'root'@'88.214.26.19' \(using password: YES\)
191023 23:11:45 \[Warning\] Access denied for user 'root'@'88.214.26.19' \(using password: YES\)
191023 23:44:50 \[Warning\] Access denied for user 'root'@'88.214.26.19' \(using password: YES\)
...
2019-10-24 13:05:57
40.83.76.21 attackspam
1433/tcp 1433/tcp
[2019-10-19/24]2pkt
2019-10-24 13:39:46
222.186.175.220 attackbots
Oct 24 07:13:16 MK-Soft-Root1 sshd[5877]: Failed password for root from 222.186.175.220 port 25362 ssh2
Oct 24 07:13:26 MK-Soft-Root1 sshd[5877]: Failed password for root from 222.186.175.220 port 25362 ssh2
...
2019-10-24 13:15:16
23.251.128.200 attackbots
Oct 23 18:40:45 hanapaa sshd\[4173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.128.251.23.bc.googleusercontent.com  user=root
Oct 23 18:40:47 hanapaa sshd\[4173\]: Failed password for root from 23.251.128.200 port 51998 ssh2
Oct 23 18:44:20 hanapaa sshd\[4469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.128.251.23.bc.googleusercontent.com  user=root
Oct 23 18:44:22 hanapaa sshd\[4469\]: Failed password for root from 23.251.128.200 port 43162 ssh2
Oct 23 18:47:54 hanapaa sshd\[4761\]: Invalid user lo98ik, from 23.251.128.200
Oct 23 18:47:54 hanapaa sshd\[4761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.128.251.23.bc.googleusercontent.com
2019-10-24 13:08:41
112.175.124.2 attackbots
10/24/2019-01:28:02.838844 112.175.124.2 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-24 13:30:03
43.254.45.10 attackspambots
Oct 24 06:50:37 www2 sshd\[54180\]: Invalid user P@$$W0rd01 from 43.254.45.10Oct 24 06:50:39 www2 sshd\[54180\]: Failed password for invalid user P@$$W0rd01 from 43.254.45.10 port 48314 ssh2Oct 24 06:54:56 www2 sshd\[54505\]: Invalid user MELSEC from 43.254.45.10
...
2019-10-24 12:57:04
23.224.141.254 attackbots
1433/tcp 445/tcp...
[2019-09-19/10-24]9pkt,2pt.(tcp)
2019-10-24 13:20:39
210.17.195.138 attackspambots
Automatic report - Banned IP Access
2019-10-24 13:11:26
144.217.15.161 attackspam
detected by Fail2Ban
2019-10-24 12:52:18

最近上报的IP列表

97.127.36.23 7.31.110.132 160.159.105.128 187.36.89.128
216.128.111.219 146.51.154.35 23.132.210.213 245.13.229.197
151.211.82.27 47.75.31.107 210.0.17.158 9.36.0.169
255.202.198.161 141.96.53.199 34.147.99.15 234.124.181.105
70.111.40.32 48.66.238.214 171.222.86.213 69.98.210.27