必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.70.245.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.70.245.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:00:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.245.70.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.245.70.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.212.141.50 attack
Lines containing failures of 116.212.141.50
Jul 29 03:44:04 MAKserver05 sshd[894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.212.141.50  user=r.r
Jul 29 03:44:06 MAKserver05 sshd[894]: Failed password for r.r from 116.212.141.50 port 38746 ssh2
Jul 29 03:44:07 MAKserver05 sshd[894]: Received disconnect from 116.212.141.50 port 38746:11: Bye Bye [preauth]
Jul 29 03:44:07 MAKserver05 sshd[894]: Disconnected from authenticating user r.r 116.212.141.50 port 38746 [preauth]
Jul 29 04:10:58 MAKserver05 sshd[1743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.212.141.50  user=r.r
Jul 29 04:10:59 MAKserver05 sshd[1743]: Failed password for r.r from 116.212.141.50 port 57504 ssh2
Jul 29 04:11:01 MAKserver05 sshd[1743]: Received disconnect from 116.212.141.50 port 57504:11: Bye Bye [preauth]
Jul 29 04:11:01 MAKserver05 sshd[1743]: Disconnected from authenticating user r.r 116.212.141.5........
------------------------------
2019-07-30 18:52:15
14.32.51.90 attackspambots
23/tcp 23/tcp 23/tcp...
[2019-06-13/07-29]90pkt,1pt.(tcp)
2019-07-30 18:28:37
94.68.129.160 attack
23/tcp 23/tcp
[2019-07-11/29]2pkt
2019-07-30 17:46:29
154.8.232.149 attackbots
Jul 30 04:19:23 pornomens sshd\[26760\]: Invalid user vcsa from 154.8.232.149 port 33372
Jul 30 04:19:23 pornomens sshd\[26760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.232.149
Jul 30 04:19:26 pornomens sshd\[26760\]: Failed password for invalid user vcsa from 154.8.232.149 port 33372 ssh2
...
2019-07-30 17:45:59
109.134.11.171 attackbotsspam
Jul 30 04:18:20 host sshd\[33017\]: Invalid user rk3229 from 109.134.11.171 port 55556
Jul 30 04:18:20 host sshd\[33017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.134.11.171
...
2019-07-30 18:45:56
50.84.194.222 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(07301024)
2019-07-30 18:17:41
180.245.170.202 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-30 18:38:13
138.97.94.46 attackbots
2019-07-30T04:19:11.254319stark.klein-stark.info sshd\[4626\]: Invalid user admin from 138.97.94.46 port 41588
2019-07-30T04:19:11.260363stark.klein-stark.info sshd\[4626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.94.46
2019-07-30T04:19:13.659616stark.klein-stark.info sshd\[4626\]: Failed password for invalid user admin from 138.97.94.46 port 41588 ssh2
...
2019-07-30 17:53:33
112.217.225.61 attackbots
2019-07-30T08:04:47.642348abusebot.cloudsearch.cf sshd\[14977\]: Invalid user vidya from 112.217.225.61 port 43589
2019-07-30 18:55:30
114.40.163.156 attack
Jul 29 14:47:05 localhost kernel: [15670218.565419] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=43479 PROTO=TCP SPT=25227 DPT=37215 WINDOW=43653 RES=0x00 SYN URGP=0 
Jul 29 14:47:05 localhost kernel: [15670218.565443] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=43479 PROTO=TCP SPT=25227 DPT=37215 SEQ=758669438 ACK=0 WINDOW=43653 RES=0x00 SYN URGP=0 
Jul 29 22:18:07 localhost kernel: [15697280.836784] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=40979 PROTO=TCP SPT=39489 DPT=37215 WINDOW=33370 RES=0x00 SYN URGP=0 
Jul 29 22:18:07 localhost kernel: [15697280.836793] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=114.40.163.156 DST=[mungedIP2] LEN=40 TOS
2019-07-30 18:56:16
51.83.73.160 attackspambots
2019-07-30T09:34:56.969438abusebot-2.cloudsearch.cf sshd\[5821\]: Invalid user server from 51.83.73.160 port 34342
2019-07-30 17:51:32
186.151.193.58 attack
445/tcp 445/tcp 445/tcp...
[2019-06-20/07-29]9pkt,1pt.(tcp)
2019-07-30 18:54:24
222.73.52.214 attack
445/tcp 445/tcp 445/tcp...
[2019-06-10/07-29]8pkt,1pt.(tcp)
2019-07-30 18:37:05
54.39.98.253 attackspam
Jul 30 06:45:27 db sshd\[28253\]: Invalid user bret from 54.39.98.253
Jul 30 06:45:27 db sshd\[28253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-54-39-98.net 
Jul 30 06:45:29 db sshd\[28253\]: Failed password for invalid user bret from 54.39.98.253 port 54408 ssh2
Jul 30 06:53:52 db sshd\[28354\]: Invalid user elastic from 54.39.98.253
Jul 30 06:53:52 db sshd\[28354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-54-39-98.net 
...
2019-07-30 18:13:49
209.6.224.163 attackspam
Honeypot attack, port: 23, PTR: 209-6-224-163.s4257.c3-0.wtr-cbr1.sbo-wtr.ma.cable.rcncustomer.com.
2019-07-30 18:43:14

最近上报的IP列表

208.172.209.163 122.51.30.111 81.251.106.20 48.66.98.41
76.55.30.229 218.197.95.216 150.157.187.161 41.246.10.77
37.90.180.248 150.19.77.93 197.179.171.53 52.35.170.124
20.44.149.199 135.224.209.169 72.78.177.132 75.218.16.181
207.190.172.117 73.167.18.228 157.3.137.12 197.43.0.146