必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.91.159.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.91.159.140.			IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:21:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 140.159.91.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.159.91.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.15.230 attackbotsspam
IP blocked
2019-12-30 18:52:59
42.56.70.90 attackspam
Dec 30 08:19:26 srv-ubuntu-dev3 sshd[11618]: Invalid user zhaoxiuying from 42.56.70.90
Dec 30 08:19:26 srv-ubuntu-dev3 sshd[11618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.56.70.90
Dec 30 08:19:26 srv-ubuntu-dev3 sshd[11618]: Invalid user zhaoxiuying from 42.56.70.90
Dec 30 08:19:27 srv-ubuntu-dev3 sshd[11618]: Failed password for invalid user zhaoxiuying from 42.56.70.90 port 39007 ssh2
Dec 30 08:24:34 srv-ubuntu-dev3 sshd[12059]: Invalid user cn from 42.56.70.90
Dec 30 08:24:34 srv-ubuntu-dev3 sshd[12059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.56.70.90
Dec 30 08:24:34 srv-ubuntu-dev3 sshd[12059]: Invalid user cn from 42.56.70.90
Dec 30 08:24:35 srv-ubuntu-dev3 sshd[12059]: Failed password for invalid user cn from 42.56.70.90 port 54767 ssh2
Dec 30 08:27:15 srv-ubuntu-dev3 sshd[12285]: Invalid user P@$$w0rt@2016 from 42.56.70.90
...
2019-12-30 18:25:33
112.85.42.229 attackspambots
--- report ---
Dec 30 07:15:50 -0300 sshd: Connection from 112.85.42.229 port 42689
2019-12-30 18:41:05
80.250.217.50 attackspam
Dec 30 08:59:53 h2177944 sshd\[11975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.250.217.50
Dec 30 08:59:55 h2177944 sshd\[11975\]: Failed password for invalid user siger68 from 80.250.217.50 port 38063 ssh2
Dec 30 10:00:12 h2177944 sshd\[14697\]: Invalid user chia-yin from 80.250.217.50 port 11223
Dec 30 10:00:12 h2177944 sshd\[14697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.250.217.50
...
2019-12-30 18:37:32
51.77.211.94 attack
--- report ---
Dec 30 07:29:35 -0300 sshd: Connection from 51.77.211.94 port 47692
2019-12-30 18:49:15
186.147.237.51 attack
--- report ---
Dec 30 03:14:32 -0300 sshd: Connection from 186.147.237.51 port 41104
Dec 30 03:14:34 -0300 sshd: Invalid user vnc from 186.147.237.51
Dec 30 03:14:36 -0300 sshd: Failed password for invalid user vnc from 186.147.237.51 port 41104 ssh2
Dec 30 03:14:36 -0300 sshd: Received disconnect from 186.147.237.51: 11: Bye Bye [preauth]
2019-12-30 18:41:51
180.76.100.183 attack
Dec 30 07:25:03 lnxmysql61 sshd[13627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.100.183
2019-12-30 18:51:59
125.70.244.4 attack
Dec 30 07:01:40 kmh-wmh-001-nbg01 sshd[12323]: Invalid user tester from 125.70.244.4 port 52878
Dec 30 07:01:40 kmh-wmh-001-nbg01 sshd[12323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.70.244.4
Dec 30 07:01:41 kmh-wmh-001-nbg01 sshd[12323]: Failed password for invalid user tester from 125.70.244.4 port 52878 ssh2
Dec 30 07:01:41 kmh-wmh-001-nbg01 sshd[12323]: Received disconnect from 125.70.244.4 port 52878:11: Bye Bye [preauth]
Dec 30 07:01:41 kmh-wmh-001-nbg01 sshd[12323]: Disconnected from 125.70.244.4 port 52878 [preauth]
Dec 30 07:13:43 kmh-wmh-001-nbg01 sshd[13535]: Invalid user kellar from 125.70.244.4 port 50934
Dec 30 07:13:43 kmh-wmh-001-nbg01 sshd[13535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.70.244.4
Dec 30 07:13:44 kmh-wmh-001-nbg01 sshd[13535]: Failed password for invalid user kellar from 125.70.244.4 port 50934 ssh2
Dec 30 07:13:44 kmh-wmh-001-nbg01 ssh........
-------------------------------
2019-12-30 18:54:20
86.124.64.97 attack
" "
2019-12-30 18:53:35
103.132.171.2 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-12-30 18:30:19
192.95.23.128 attack
(mod_security) mod_security (id:920440) triggered by 192.95.23.128 (US/United States/ip128.ip-192-95-23.net): 5 in the last 3600 secs
2019-12-30 18:16:18
165.22.32.146 attackspam
URL Abuse to a Bank in Myanmar
2019-12-30 18:18:41
95.167.225.81 attack
Dec 30 09:24:01 server sshd\[15257\]: Invalid user kichorowsky from 95.167.225.81
Dec 30 09:24:01 server sshd\[15257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81 
Dec 30 09:24:03 server sshd\[15257\]: Failed password for invalid user kichorowsky from 95.167.225.81 port 40114 ssh2
Dec 30 09:25:38 server sshd\[15864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81  user=ftp
Dec 30 09:25:40 server sshd\[15864\]: Failed password for ftp from 95.167.225.81 port 50286 ssh2
...
2019-12-30 18:23:29
63.81.87.83 attackspambots
Dec 30 08:23:55 grey postfix/smtpd\[18972\]: NOQUEUE: reject: RCPT from zippy.vidyad.com\[63.81.87.83\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.83\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.83\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-30 18:54:06
181.211.112.2 attackbotsspam
Dec 30 06:25:30 *** sshd[8240]: Invalid user supervisor from 181.211.112.2
2019-12-30 18:27:30

最近上报的IP列表

142.91.159.145 142.91.159.147 142.91.159.146 142.91.159.150
142.91.159.153 142.91.159.155 142.93.102.104 142.91.159.163
142.91.159.169 142.91.159.167 142.93.116.249 142.93.109.207
142.93.111.38 142.91.159.172 142.93.120.227 142.91.170.108
142.93.245.60 142.93.32.160 142.93.235.83 142.93.250.56