必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Frankfurt am Main

省份(region): Hessen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.108.77 attackbots
Jun  9 06:53:15 * sshd[15763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.77
Jun  9 06:53:17 * sshd[15763]: Failed password for invalid user libuuid12345 from 142.93.108.77 port 51426 ssh2
2020-06-09 12:59:26
142.93.108.77 attackspam
May 22 19:06:50 sso sshd[31894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.77
May 22 19:06:52 sso sshd[31894]: Failed password for invalid user sez from 142.93.108.77 port 35300 ssh2
...
2020-05-23 02:06:13
142.93.108.77 attackspambots
May  5 03:34:56 [host] sshd[5408]: Invalid user sp
May  5 03:34:56 [host] sshd[5408]: pam_unix(sshd:a
May  5 03:34:58 [host] sshd[5408]: Failed password
2020-05-05 10:29:39
142.93.108.200 attackbots
fail2ban
2020-03-07 15:00:34
142.93.108.189 attackbots
Automatic report - XMLRPC Attack
2020-02-27 16:51:03
142.93.108.189 attack
Automatic report - Banned IP Access
2019-12-30 15:05:28
142.93.108.189 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-09 04:17:25
142.93.108.189 attackbotsspam
Automatic report - Banned IP Access
2019-11-08 15:37:59
142.93.108.212 attackbots
Wordpress brute-force
2019-10-30 03:32:23
142.93.108.212 attackspambots
xmlrpc attack
2019-10-29 14:05:44
142.93.108.189 attack
Automatic report - Banned IP Access
2019-10-20 17:23:37
142.93.108.189 attack
WordPress wp-login brute force :: 142.93.108.189 0.136 BYPASS [17/Oct/2019:08:02:15  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-17 05:03:15
142.93.108.200 attackspam
Sep 17 23:00:18 itv-usvr-02 sshd[23381]: Invalid user ayush from 142.93.108.200 port 45146
Sep 17 23:00:18 itv-usvr-02 sshd[23381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.200
Sep 17 23:00:18 itv-usvr-02 sshd[23381]: Invalid user ayush from 142.93.108.200 port 45146
Sep 17 23:00:19 itv-usvr-02 sshd[23381]: Failed password for invalid user ayush from 142.93.108.200 port 45146 ssh2
Sep 17 23:03:55 itv-usvr-02 sshd[23387]: Invalid user nehas from 142.93.108.200 port 33644
2019-09-18 01:55:01
142.93.108.200 attackbots
2019-09-16T10:26:20.639846  sshd[32004]: Invalid user admin from 142.93.108.200 port 46116
2019-09-16T10:26:20.653328  sshd[32004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.200
2019-09-16T10:26:20.639846  sshd[32004]: Invalid user admin from 142.93.108.200 port 46116
2019-09-16T10:26:22.579899  sshd[32004]: Failed password for invalid user admin from 142.93.108.200 port 46116 ssh2
2019-09-16T10:30:11.815933  sshd[32076]: Invalid user guess from 142.93.108.200 port 35232
...
2019-09-16 16:53:56
142.93.108.189 attackbotsspam
xmlrpc attack
2019-08-27 07:06:01
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       142.93.0.0 - 142.93.255.255
CIDR:           142.93.0.0/16
NetName:        DIGITALOCEAN-142-93-0-0
NetHandle:      NET-142-93-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2018-07-12
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/142.93.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.108.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.108.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022002 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 21 08:00:48 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 95.108.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 95.108.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.110.176.7 attackbots
Invalid user admin from 200.110.176.7 port 35037
2019-11-20 04:20:51
220.173.55.8 attackbots
fraudulent SSH attempt
2019-11-20 04:18:29
138.97.66.205 attackbots
Invalid user admin from 138.97.66.205 port 40122
2019-11-20 04:01:14
222.180.162.8 attackbotsspam
Nov 19 20:33:17  sshd[3265]: Failed password for invalid user postgres from 222.180.162.8 port 58833 ssh2
2019-11-20 04:16:54
200.111.137.132 attackbots
Invalid user broadcast from 200.111.137.132 port 47868
2019-11-20 03:52:53
186.12.172.52 attackbotsspam
Invalid user admin from 186.12.172.52 port 41270
2019-11-20 04:27:32
222.120.192.114 attack
Nov 19 19:42:16 sso sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.120.192.114
Nov 19 19:42:18 sso sshd[18477]: Failed password for invalid user admin2 from 222.120.192.114 port 45948 ssh2
...
2019-11-20 04:18:07
182.61.187.39 attackbots
Automatic report - Banned IP Access
2019-11-20 03:56:23
222.127.97.91 attack
Invalid user manavendra from 222.127.97.91 port 33325
2019-11-20 04:17:10
31.179.144.190 attack
Nov 19 20:28:15 server sshd\[18766\]: Invalid user yoyo from 31.179.144.190
Nov 19 20:28:15 server sshd\[18766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.144.190 
Nov 19 20:28:17 server sshd\[18766\]: Failed password for invalid user yoyo from 31.179.144.190 port 55534 ssh2
Nov 19 20:37:57 server sshd\[21196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.144.190  user=root
Nov 19 20:37:59 server sshd\[21196\]: Failed password for root from 31.179.144.190 port 59934 ssh2
...
2019-11-20 04:15:21
82.164.129.25 attack
Invalid user admin from 82.164.129.25 port 33249
2019-11-20 04:11:11
187.190.236.88 attack
Invalid user ibbotson from 187.190.236.88 port 55724
2019-11-20 04:25:03
5.196.226.217 attackbotsspam
fraudulent SSH attempt
2019-11-20 04:15:39
118.217.216.100 attack
Invalid user h from 118.217.216.100 port 39296
2019-11-20 04:04:01
156.200.215.121 attackbotsspam
Invalid user admin from 156.200.215.121 port 47049
2019-11-20 03:59:49

最近上报的IP列表

165.22.29.227 142.93.164.45 167.71.54.153 167.172.185.140
164.90.223.224 142.93.161.140 104.248.241.34 47.101.218.50
164.92.240.117 193.34.212.9 180.153.236.182 189.242.99.138
189.242.99.250 149.87.183.79 23.95.96.140 192.253.248.151
35.195.246.41 20.163.110.166 20.48.106.246 98.83.57.80