必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Halifax

省份(region): Nova Scotia

国家(country): Canada

运营商(isp): Bell Canada

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
...
2020-02-02 04:12:55
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.68.134.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.68.134.155.			IN	A

;; AUTHORITY SECTION:
.			250	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 04:12:52 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
155.134.68.142.in-addr.arpa domain name pointer hlfxns017vw-142-68-134-155.dhcp-dynamic.fibreop.ns.bellaliant.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
155.134.68.142.in-addr.arpa	name = hlfxns017vw-142-68-134-155.dhcp-dynamic.fibreop.ns.bellaliant.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.234.215.242 attackbots
failed_logins
2019-06-22 01:24:34
213.14.216.41 attackbotsspam
Portscanning on different or same port(s).
2019-06-22 01:36:18
119.110.198.116 attackspambots
Unauthorized connection attempt from IP address 119.110.198.116 on Port 445(SMB)
2019-06-22 01:27:06
170.246.88.189 attack
Jun 21 10:56:12 mxgate1 postfix/postscreen[27302]: CONNECT from [170.246.88.189]:22699 to [176.31.12.44]:25
Jun 21 10:56:12 mxgate1 postfix/dnsblog[27409]: addr 170.246.88.189 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 21 10:56:12 mxgate1 postfix/dnsblog[27413]: addr 170.246.88.189 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 21 10:56:13 mxgate1 postfix/dnsblog[27412]: addr 170.246.88.189 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 21 10:56:18 mxgate1 postfix/postscreen[27302]: DNSBL rank 4 for [170.246.88.189]:22699
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=170.246.88.189
2019-06-22 01:44:36
180.248.102.163 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:05:22]
2019-06-22 02:14:14
114.237.221.248 attackspambots
2019-06-21 11:48:06 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:4357: 535 Incorrect authentication data (set_id=sales)
2019-06-21 11:48:13 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:4593: 535 Incorrect authentication data (set_id=sales)
2019-06-21 11:48:26 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:4996: 535 Incorrect authentication data (set_id=sales)
2019-06-21 11:48:44 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:1659: 535 Incorrect authentication data
2019-06-21 11:48:55 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:2150: 535 Incorrect authentication data
2019-06-21 11:49:07 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:2779: 535 Incorrect authentication data
2019-06-21 11:49:18 dovecot_login authenticator failed for (ylmf-pc) [114.237.221.248]:3314: 535 Incorrect authentication data
2019-06-21 11:49:29 dovecot_login authenticator fai........
------------------------------
2019-06-22 01:22:37
119.123.224.167 attackbotsspam
Jun 21 10:51:07 xb3 sshd[29496]: Failed password for invalid user tester from 119.123.224.167 port 30483 ssh2
Jun 21 10:51:07 xb3 sshd[29496]: Received disconnect from 119.123.224.167: 11: Bye Bye [preauth]
Jun 21 10:52:57 xb3 sshd[1350]: Failed password for invalid user server from 119.123.224.167 port 34677 ssh2
Jun 21 10:52:57 xb3 sshd[1350]: Received disconnect from 119.123.224.167: 11: Bye Bye [preauth]
Jun 21 10:54:34 xb3 sshd[5724]: Failed password for invalid user ubuntu from 119.123.224.167 port 20889 ssh2
Jun 21 10:54:34 xb3 sshd[5724]: Received disconnect from 119.123.224.167: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.123.224.167
2019-06-22 01:34:59
183.81.156.205 attackbots
Unauthorized connection attempt from IP address 183.81.156.205 on Port 445(SMB)
2019-06-22 02:13:34
78.131.95.211 attackspam
Jun 21 10:48:18 lvps87-230-18-106 sshd[23854]: Did not receive identification string from 78.131.95.211
Jun 21 10:55:32 lvps87-230-18-106 sshd[24038]: Received disconnect from 78.131.95.211: 11: Bye Bye [preauth]
Jun 21 10:59:35 lvps87-230-18-106 sshd[24125]: Invalid user admin from 78.131.95.211
Jun 21 10:59:35 lvps87-230-18-106 sshd[24125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78-131-95-211.pool.digikabel.hu 
Jun 21 10:59:37 lvps87-230-18-106 sshd[24125]: Failed password for invalid user admin from 78.131.95.211 port 46572 ssh2
Jun 21 10:59:37 lvps87-230-18-106 sshd[24125]: Received disconnect from 78.131.95.211: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.131.95.211
2019-06-22 01:54:42
1.127.214.57 attackbots
SMTP_hacking
2019-06-22 01:55:29
1.127.217.142 attack
SMTP_hacking
2019-06-22 01:27:37
1.127.219.25 attack
SMTP_hacking
2019-06-22 02:07:40
145.239.123.117 attackbotsspam
145.239.123.117 - - \[21/Jun/2019:19:06:45 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.123.117 - - \[21/Jun/2019:19:06:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.123.117 - - \[21/Jun/2019:19:06:46 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.123.117 - - \[21/Jun/2019:19:06:46 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.123.117 - - \[21/Jun/2019:19:06:46 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.123.117 - - \[21/Jun/2019:19:06:46 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\
2019-06-22 01:34:19
184.105.139.87 attackbots
389/tcp 445/tcp 6379/tcp...
[2019-04-23/06-21]38pkt,11pt.(tcp),1pt.(udp)
2019-06-22 02:05:16
180.179.124.182 attackbots
Unauthorized connection attempt from IP address 180.179.124.182 on Port 445(SMB)
2019-06-22 01:25:19

最近上报的IP列表

84.241.201.234 24.9.201.188 56.117.91.26 94.156.174.15
181.76.197.194 119.123.118.231 212.92.115.7 87.133.78.125
216.166.216.138 72.97.250.103 73.173.156.212 95.86.42.126
73.192.130.51 103.51.103.22 222.183.205.211 18.226.233.83
173.228.87.183 78.157.217.150 23.168.70.29 196.52.32.124