必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.117.203 attackbots
$f2bV_matches
2020-05-17 06:39:28
142.93.117.17 attackspambots
Dec 19 16:32:49 plusreed sshd[10910]: Invalid user nfs from 142.93.117.17
...
2019-12-20 05:36:19
142.93.117.17 attack
$f2bV_matches
2019-12-17 23:22:37
142.93.117.249 attackbots
2019-08-19 03:25:53,459 fail2ban.actions        [878]: NOTICE  [sshd] Ban 142.93.117.249
2019-08-19 06:33:21,777 fail2ban.actions        [878]: NOTICE  [sshd] Ban 142.93.117.249
2019-08-19 09:39:17,491 fail2ban.actions        [878]: NOTICE  [sshd] Ban 142.93.117.249
...
2019-10-03 13:53:36
142.93.117.249 attackspam
Sep 22 11:13:27 lnxmysql61 sshd[13188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Sep 22 11:13:27 lnxmysql61 sshd[13188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-09-22 17:29:56
142.93.117.249 attack
Sep 20 14:41:31 plusreed sshd[23195]: Invalid user admin from 142.93.117.249
...
2019-09-21 02:47:06
142.93.117.249 attack
Sep 11 10:15:51 pornomens sshd\[9738\]: Invalid user dev from 142.93.117.249 port 53062
Sep 11 10:15:51 pornomens sshd\[9738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Sep 11 10:15:52 pornomens sshd\[9738\]: Failed password for invalid user dev from 142.93.117.249 port 53062 ssh2
...
2019-09-11 16:25:34
142.93.117.249 attackbotsspam
Sep  4 06:33:31 hb sshd\[1482\]: Invalid user zs from 142.93.117.249
Sep  4 06:33:31 hb sshd\[1482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Sep  4 06:33:33 hb sshd\[1482\]: Failed password for invalid user zs from 142.93.117.249 port 50572 ssh2
Sep  4 06:37:30 hb sshd\[1968\]: Invalid user liao from 142.93.117.249
Sep  4 06:37:30 hb sshd\[1968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-09-04 15:11:40
142.93.117.249 attackbotsspam
Sep  3 07:05:11 mail sshd\[14201\]: Invalid user vboxuser from 142.93.117.249
Sep  3 07:05:11 mail sshd\[14201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
...
2019-09-04 00:15:19
142.93.117.249 attackbots
Sep  3 02:42:26 cp sshd[16034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
2019-09-03 08:49:56
142.93.117.249 attackspambots
2019-09-01T03:34:49.920774abusebot-2.cloudsearch.cf sshd\[17932\]: Invalid user whmcs from 142.93.117.249 port 58686
2019-09-01 12:01:01
142.93.117.249 attack
2019-08-20T15:24:08.908725abusebot-8.cloudsearch.cf sshd\[20844\]: Invalid user dovecot from 142.93.117.249 port 36858
2019-08-20 23:30:59
142.93.117.249 attack
2019-08-15T04:40:37.179265abusebot-8.cloudsearch.cf sshd\[13252\]: Invalid user applmgr from 142.93.117.249 port 48400
2019-08-15 13:07:56
142.93.117.249 attackspam
Jul 29 19:46:06 MK-Soft-VM7 sshd\[13634\]: Invalid user ubuntu from 142.93.117.249 port 34052
Jul 29 19:46:06 MK-Soft-VM7 sshd\[13634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249
Jul 29 19:46:08 MK-Soft-VM7 sshd\[13634\]: Failed password for invalid user ubuntu from 142.93.117.249 port 34052 ssh2
...
2019-07-30 04:12:05
142.93.117.249 attackbotsspam
Jul 28 16:54:03 mail sshd\[27974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
Jul 28 16:54:05 mail sshd\[27974\]: Failed password for root from 142.93.117.249 port 60658 ssh2
Jul 28 16:58:15 mail sshd\[28539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
Jul 28 16:58:17 mail sshd\[28539\]: Failed password for root from 142.93.117.249 port 53832 ssh2
Jul 28 17:02:31 mail sshd\[29659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.117.249  user=root
2019-07-29 04:50:02
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.117.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.117.149.			IN	A

;; AUTHORITY SECTION:
.			318	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:42:30 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.117.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.117.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.235.106.221 attack
Invalid user nsroot from 49.235.106.221 port 54858
2020-03-22 07:20:30
114.67.74.91 attack
Total attacks: 2
2020-03-22 07:09:12
194.61.27.240 attack
Multiport scan 95 ports : 2626 3000(x2) 3320 3339 3366 3377(x2) 3388 3391 3393(x2) 3395 3396 3397 3398(x2) 3399 3500(x2) 4000(x2) 4001 4243 4246 4444 4500(x3) 5000 5001 5005 5100 5151(x2) 5500(x3) 5589 5811 6000 6009 6389(x2) 6500(x3) 6547(x2) 7000 7001 7200 7350 7500(x2) 7733 8000(x2) 8001 8090 8098 8500(x3) 8888 8899 8933(x3) 9000(x2) 9001(x3) 9049 9099(x2) 9500 9887 9900(x2) 9933(x3) 9965 9988 9990 9999 10000(x2) 10010 10074 11389 13388(x2) 13389 20000(x2) 23390 30000 32010 33389(x2) 33390(x2) 33399 33890 33895 33898 33899 33900 33910 33916 40000(x2) 43390(x2) 44444(x2) 50000(x2) 50105 53390 53391 53393 53399 60000 60100 61000(x2) 63390(x2) 63391 63392
2020-03-22 07:46:05
201.231.39.153 attack
Mar 22 01:08:51 www2 sshd\[43023\]: Invalid user joeflores from 201.231.39.153Mar 22 01:08:54 www2 sshd\[43023\]: Failed password for invalid user joeflores from 201.231.39.153 port 44863 ssh2Mar 22 01:12:33 www2 sshd\[43554\]: Invalid user chris from 201.231.39.153
...
2020-03-22 07:50:31
114.67.68.30 attackbotsspam
Invalid user marva from 114.67.68.30 port 58744
2020-03-22 07:21:01
194.182.74.103 attackspambots
Mar 22 03:59:13 gw1 sshd[1177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.74.103
Mar 22 03:59:16 gw1 sshd[1177]: Failed password for invalid user vaibhav from 194.182.74.103 port 59302 ssh2
...
2020-03-22 07:08:47
50.127.71.5 attack
$f2bV_matches
2020-03-22 07:36:49
196.37.111.217 attackspam
Invalid user np from 196.37.111.217 port 35824
2020-03-22 07:19:46
157.245.179.203 attack
Invalid user vagrant from 157.245.179.203 port 45596
2020-03-22 07:17:18
200.122.249.203 attackbotsspam
Mar 22 06:32:18 webhost01 sshd[4956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.122.249.203
Mar 22 06:32:21 webhost01 sshd[4956]: Failed password for invalid user onion from 200.122.249.203 port 53600 ssh2
...
2020-03-22 07:33:23
51.38.113.45 attackbotsspam
Invalid user caidanwei from 51.38.113.45 port 51258
2020-03-22 07:20:17
111.229.219.226 attackspambots
Invalid user robert from 111.229.219.226 port 47926
2020-03-22 07:24:32
50.116.101.52 attackbotsspam
Invalid user upload from 50.116.101.52 port 35296
2020-03-22 07:10:59
148.70.159.181 attack
Mar 21 23:26:46 raspberrypi sshd\[1585\]: Invalid user user from 148.70.159.181Mar 21 23:26:49 raspberrypi sshd\[1585\]: Failed password for invalid user user from 148.70.159.181 port 36174 ssh2Mar 21 23:39:40 raspberrypi sshd\[9086\]: Invalid user wo from 148.70.159.181
...
2020-03-22 07:43:35
222.186.30.57 attackbotsspam
Mar 22 00:23:45 * sshd[30157]: Failed password for root from 222.186.30.57 port 21220 ssh2
2020-03-22 07:48:59

最近上报的IP列表

142.93.116.36 118.96.95.228 142.93.117.111 142.93.117.152
142.93.117.195 142.93.117.209 142.93.117.211 142.93.117.196
142.93.117.192 142.93.117.22 142.93.117.41 142.93.117.62
142.93.118.202 142.93.118.31 142.93.118.86 142.93.119.209
142.93.119.250 142.93.119.230 142.93.12.133 118.96.95.77