必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): Videotron

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.64.51.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.64.51.196.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122601 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 27 04:46:49 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 196.51.64.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.51.64.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
146.185.161.40 attackspambots
Invalid user aon from 146.185.161.40 port 56273
2020-05-23 12:59:23
114.67.169.68 attackspambots
$f2bV_matches
2020-05-23 13:11:33
200.209.145.251 attackbotsspam
May 22 22:12:24 server1 sshd\[22967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.145.251 
May 22 22:12:26 server1 sshd\[22967\]: Failed password for invalid user exb from 200.209.145.251 port 26680 ssh2
May 22 22:16:33 server1 sshd\[24101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.145.251  user=lp
May 22 22:16:35 server1 sshd\[24101\]: Failed password for lp from 200.209.145.251 port 21611 ssh2
May 22 22:20:42 server1 sshd\[25249\]: Invalid user znk from 200.209.145.251
...
2020-05-23 12:42:13
104.248.176.46 attack
ssh brute force
2020-05-23 13:15:45
186.232.119.84 attackbotsspam
May 23 00:26:32 NPSTNNYC01T sshd[26339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.232.119.84
May 23 00:26:34 NPSTNNYC01T sshd[26339]: Failed password for invalid user sunyufei from 186.232.119.84 port 51660 ssh2
May 23 00:29:24 NPSTNNYC01T sshd[26568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.232.119.84
...
2020-05-23 12:48:11
122.202.32.70 attackspambots
Invalid user yct from 122.202.32.70 port 42276
2020-05-23 13:04:54
193.70.0.42 attackspambots
Invalid user ymy from 193.70.0.42 port 33386
2020-05-23 12:45:06
106.13.19.75 attack
3x Failed Password
2020-05-23 13:15:02
106.13.160.249 attack
Invalid user hdw from 106.13.160.249 port 49836
2020-05-23 13:14:35
104.236.112.52 attack
May 22 19:01:27 web9 sshd\[21607\]: Invalid user rpb from 104.236.112.52
May 22 19:01:27 web9 sshd\[21607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.112.52
May 22 19:01:29 web9 sshd\[21607\]: Failed password for invalid user rpb from 104.236.112.52 port 36997 ssh2
May 22 19:08:23 web9 sshd\[22681\]: Invalid user fpa from 104.236.112.52
May 22 19:08:23 web9 sshd\[22681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.112.52
2020-05-23 13:16:27
142.93.216.175 attackbots
Invalid user tsd from 142.93.216.175 port 41312
2020-05-23 12:59:48
163.172.113.19 attack
SSH Brute-Force reported by Fail2Ban
2020-05-23 12:56:08
167.71.228.227 attackspambots
Invalid user hud from 167.71.228.227 port 52230
2020-05-23 12:55:51
117.86.30.148 attackbotsspam
Invalid user administrator from 117.86.30.148 port 17630
2020-05-23 13:09:49
201.26.18.43 attack
Invalid user admin from 201.26.18.43 port 62850
2020-05-23 12:41:56

最近上报的IP列表

179.197.234.209 171.136.211.66 98.168.31.72 237.126.30.36
78.141.209.232 14.180.143.80 194.37.6.202 2.21.69.15
69.86.174.246 132.10.18.164 207.41.195.94 31.39.30.128
244.71.81.123 54.114.66.222 129.227.38.172 116.94.137.34
152.61.55.234 237.220.242.78 37.228.250.137 76.65.87.210