必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.78.149.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.78.149.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:27:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 241.149.78.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.149.78.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.121.110.97 attack
Sep 24 15:50:41 core sshd[15814]: Invalid user md from 91.121.110.97 port 40412
Sep 24 15:50:43 core sshd[15814]: Failed password for invalid user md from 91.121.110.97 port 40412 ssh2
...
2019-09-24 21:56:29
89.138.9.201 attackbots
LGS,WP GET /wp-login.php
2019-09-24 21:39:09
159.65.155.227 attack
Sep 24 13:54:28 game-panel sshd[11295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.227
Sep 24 13:54:30 game-panel sshd[11295]: Failed password for invalid user live from 159.65.155.227 port 57230 ssh2
Sep 24 13:59:06 game-panel sshd[11505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.227
2019-09-24 22:02:09
118.25.92.221 attack
Sep 24 16:24:26 vps01 sshd[24217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.92.221
Sep 24 16:24:28 vps01 sshd[24217]: Failed password for invalid user green from 118.25.92.221 port 37088 ssh2
2019-09-24 22:27:32
125.212.247.15 attackbotsspam
Sep 24 04:14:34 eddieflores sshd\[7845\]: Invalid user tony from 125.212.247.15
Sep 24 04:14:34 eddieflores sshd\[7845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.247.15
Sep 24 04:14:37 eddieflores sshd\[7845\]: Failed password for invalid user tony from 125.212.247.15 port 34948 ssh2
Sep 24 04:21:16 eddieflores sshd\[8371\]: Invalid user temp from 125.212.247.15
Sep 24 04:21:16 eddieflores sshd\[8371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.247.15
2019-09-24 22:27:10
217.144.185.139 attack
[portscan] Port scan
2019-09-24 21:55:48
40.114.44.98 attackspambots
F2B jail: sshd. Time: 2019-09-24 15:21:01, Reported by: VKReport
2019-09-24 21:43:11
142.112.115.160 attackbotsspam
ssh intrusion attempt
2019-09-24 22:26:09
193.47.72.15 attackspam
Sep 24 04:05:18 lcdev sshd\[32168\]: Invalid user tamara from 193.47.72.15
Sep 24 04:05:18 lcdev sshd\[32168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.72.15
Sep 24 04:05:20 lcdev sshd\[32168\]: Failed password for invalid user tamara from 193.47.72.15 port 33082 ssh2
Sep 24 04:09:28 lcdev sshd\[32613\]: Invalid user tr from 193.47.72.15
Sep 24 04:09:28 lcdev sshd\[32613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.72.15
2019-09-24 22:21:19
198.199.83.143 attack
Sep 24 13:14:17 unicornsoft sshd\[16526\]: Invalid user master from 198.199.83.143
Sep 24 13:14:17 unicornsoft sshd\[16526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.83.143
Sep 24 13:14:19 unicornsoft sshd\[16526\]: Failed password for invalid user master from 198.199.83.143 port 57306 ssh2
2019-09-24 21:42:39
122.228.208.113 attackspambots
Sep 24 14:43:05 h2177944 kernel: \[2205293.020642\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=36297 PROTO=TCP SPT=48966 DPT=8081 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 24 14:43:36 h2177944 kernel: \[2205323.932608\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=27967 PROTO=TCP SPT=48966 DPT=808 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 24 14:44:08 h2177944 kernel: \[2205356.563439\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=40235 PROTO=TCP SPT=48966 DPT=8118 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 24 14:44:29 h2177944 kernel: \[2205376.805901\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=38778 PROTO=TCP SPT=48966 DPT=8998 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 24 14:45:04 h2177944 kernel: \[2205411.704908\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.
2019-09-24 22:17:50
222.186.52.107 attack
Sep 24 09:47:13 ny01 sshd[15214]: Failed password for root from 222.186.52.107 port 52868 ssh2
Sep 24 09:47:31 ny01 sshd[15214]: error: maximum authentication attempts exceeded for root from 222.186.52.107 port 52868 ssh2 [preauth]
Sep 24 09:47:43 ny01 sshd[15293]: Failed password for root from 222.186.52.107 port 16618 ssh2
2019-09-24 22:08:22
115.68.207.48 attackbotsspam
ssh failed login
2019-09-24 22:04:34
138.197.93.133 attackbotsspam
Sep 24 15:27:36 microserver sshd[46470]: Invalid user sacre from 138.197.93.133 port 57202
Sep 24 15:27:36 microserver sshd[46470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.93.133
Sep 24 15:27:38 microserver sshd[46470]: Failed password for invalid user sacre from 138.197.93.133 port 57202 ssh2
Sep 24 15:30:58 microserver sshd[47067]: Invalid user pvp from 138.197.93.133 port 41920
Sep 24 15:30:58 microserver sshd[47067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.93.133
Sep 24 15:41:27 microserver sshd[48459]: Invalid user rszhu from 138.197.93.133 port 52534
Sep 24 15:41:27 microserver sshd[48459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.93.133
Sep 24 15:41:29 microserver sshd[48459]: Failed password for invalid user rszhu from 138.197.93.133 port 52534 ssh2
Sep 24 15:44:59 microserver sshd[48647]: Invalid user temp from 138.197.93.133 port 37250
2019-09-24 21:56:50
115.159.198.130 attack
Sep 24 13:53:09  postfix/smtpd: warning: unknown[115.159.198.130]: SASL LOGIN authentication failed
2019-09-24 22:19:33

最近上报的IP列表

181.72.63.245 232.92.164.170 128.115.197.25 6.140.143.117
82.92.167.94 221.190.69.102 204.157.155.189 226.63.241.81
178.121.220.29 216.72.227.43 30.140.40.50 109.107.62.42
166.182.249.68 65.189.43.156 56.90.155.26 173.247.215.31
157.165.117.85 129.169.187.82 116.73.66.74 68.138.40.140