必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.60.247.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.60.247.20.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020801 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 02:46:34 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 20.247.60.142.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 20.247.60.142.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.140.86.74 attackbotsspam
Lines containing failures of 175.140.86.74
Sep 15 01:09:41 newdogma sshd[18275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.86.74  user=r.r
Sep 15 01:09:43 newdogma sshd[18275]: Failed password for r.r from 175.140.86.74 port 56182 ssh2
Sep 15 01:09:45 newdogma sshd[18275]: Received disconnect from 175.140.86.74 port 56182:11: Bye Bye [preauth]
Sep 15 01:09:45 newdogma sshd[18275]: Disconnected from authenticating user r.r 175.140.86.74 port 56182 [preauth]
Sep 15 01:18:57 newdogma sshd[18619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.86.74  user=r.r
Sep 15 01:18:59 newdogma sshd[18619]: Failed password for r.r from 175.140.86.74 port 37230 ssh2
Sep 15 01:19:01 newdogma sshd[18619]: Received disconnect from 175.140.86.74 port 37230:11: Bye Bye [preauth]
Sep 15 01:19:01 newdogma sshd[18619]: Disconnected from authenticating user r.r 175.140.86.74 port 37230 [preauth........
------------------------------
2020-09-16 17:03:26
167.99.83.190 attackspam
fell into ViewStateTrap:amsterdam
2020-09-16 17:02:06
200.73.129.102 attack
Sep 16 10:38:24 vm1 sshd[9124]: Failed password for root from 200.73.129.102 port 54808 ssh2
Sep 16 11:07:03 vm1 sshd[9676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.129.102
...
2020-09-16 17:08:20
202.105.98.210 attackspambots
Sep 16 03:10:19 mail sshd\[32003\]: Invalid user admln from 202.105.98.210
...
2020-09-16 16:57:59
120.53.12.94 attackbots
2020-09-15 18:23:13.582211-0500  localhost sshd[48122]: Failed password for root from 120.53.12.94 port 39354 ssh2
2020-09-16 16:49:50
61.185.114.130 attack
$f2bV_matches
2020-09-16 16:55:11
61.12.67.133 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-16 16:52:31
218.111.88.185 attackbotsspam
DATE:2020-09-15 23:38:01, IP:218.111.88.185, PORT:ssh SSH brute force auth (docker-dc)
2020-09-16 16:31:32
159.89.114.40 attack
Sep 16 07:37:39 vserver sshd\[5204\]: Failed password for root from 159.89.114.40 port 46398 ssh2Sep 16 07:41:45 vserver sshd\[5270\]: Invalid user ix from 159.89.114.40Sep 16 07:41:46 vserver sshd\[5270\]: Failed password for invalid user ix from 159.89.114.40 port 58908 ssh2Sep 16 07:45:47 vserver sshd\[5312\]: Invalid user git from 159.89.114.40
...
2020-09-16 16:37:07
167.99.172.181 attack
srv02 Mass scanning activity detected Target: 31525  ..
2020-09-16 16:34:21
111.175.186.150 attackbotsspam
111.175.186.150 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 08:33:13 server2 sshd[25973]: Failed password for root from 211.254.215.197 port 56132 ssh2
Sep 16 08:35:26 server2 sshd[26552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.175.186.150  user=root
Sep 16 08:35:28 server2 sshd[26552]: Failed password for root from 111.175.186.150 port 29952 ssh2
Sep 16 08:34:58 server2 sshd[26441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.91.213  user=root
Sep 16 08:35:00 server2 sshd[26441]: Failed password for root from 129.211.91.213 port 43350 ssh2
Sep 16 08:35:45 server2 sshd[26557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.36.119.15  user=root

IP Addresses Blocked:

211.254.215.197 (KR/South Korea/-)
2020-09-16 16:37:36
195.144.21.56 attack
srvr2: (mod_security) mod_security (id:920350) triggered by 195.144.21.56 (AT/-/red3.census.shodan.io): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/16 07:30:56 [error] 20373#0: *44947 [client 195.144.21.56] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "160023425615.962953"] [ref "o0,13v47,13"], client: 195.144.21.56, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-09-16 17:05:26
219.243.212.100 attackbotsspam
 TCP (SYN) 219.243.212.100:40118 -> port 80, len 44
2020-09-16 16:36:36
111.229.60.6 attackbots
111.229.60.6 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 04:09:26 server2 sshd[30411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.60.6  user=root
Sep 16 04:09:28 server2 sshd[30411]: Failed password for root from 111.229.60.6 port 53366 ssh2
Sep 16 04:09:52 server2 sshd[30531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.184.116  user=root
Sep 16 04:09:30 server2 sshd[30414]: Failed password for root from 190.202.124.93 port 49284 ssh2
Sep 16 04:09:40 server2 sshd[30477]: Failed password for root from 93.147.129.222 port 35798 ssh2

IP Addresses Blocked:
2020-09-16 16:46:09
148.72.64.192 attack
xmlrpc attack
2020-09-16 16:40:31

最近上报的IP列表

129.235.147.242 230.27.29.40 242.219.80.162 93.202.54.86
131.115.175.32 34.137.177.138 205.186.184.137 2.171.163.236
192.153.137.249 116.0.0.232 153.44.153.125 116.0.0.9
114.110.248.232 59.28.193.228 163.59.146.164 144.70.34.26
1.199.154.5 223.93.82.240 1.4.147.242 9.8.58.123