必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.136.131 attackspambots
142.93.136.131 - - [27/Jul/2020:10:57:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.136.131 - - [27/Jul/2020:10:57:47 +0100] "POST /wp-login.php HTTP/1.1" 200 1706 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.136.131 - - [27/Jul/2020:10:57:47 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-27 18:38:32
142.93.136.27 attackspambots
Mar 25 22:44:45 debian-2gb-nbg1-2 kernel: \[7431763.967862\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.136.27 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=15929 PROTO=TCP SPT=61953 DPT=8080 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 05:51:59
142.93.136.119 attackbotsspam
SSH Bruteforce attempt
2019-11-08 17:27:07
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.136.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.136.94.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 94.136.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.136.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.94.136.90 attackbotsspam
Nov 21 07:01:27 legacy sshd[19609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
Nov 21 07:01:29 legacy sshd[19609]: Failed password for invalid user jurman from 218.94.136.90 port 4887 ssh2
Nov 21 07:05:32 legacy sshd[19733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
...
2019-11-21 14:08:46
207.154.218.16 attackspambots
Invalid user fross from 207.154.218.16 port 46524
2019-11-21 14:05:18
106.14.202.80 attackbots
scan z
2019-11-21 13:44:20
51.255.174.146 attackspambots
2019-11-21T05:27:26.864352abusebot-6.cloudsearch.cf sshd\[31543\]: Invalid user admin from 51.255.174.146 port 46132
2019-11-21 13:43:01
178.62.118.53 attackspam
F2B jail: sshd. Time: 2019-11-21 06:27:07, Reported by: VKReport
2019-11-21 13:33:32
193.112.74.137 attack
[Aegis] @ 2019-11-21 05:55:08  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-11-21 13:52:01
41.204.191.53 attack
2019-11-21T06:53:28.634088scmdmz1 sshd\[13785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.204.191.53  user=root
2019-11-21T06:53:30.943177scmdmz1 sshd\[13785\]: Failed password for root from 41.204.191.53 port 54626 ssh2
2019-11-21T06:57:23.241172scmdmz1 sshd\[14143\]: Invalid user dalda from 41.204.191.53 port 60918
...
2019-11-21 14:07:28
103.255.216.166 attackbotsspam
SSH bruteforce
2019-11-21 13:50:51
192.99.15.141 attackspam
Automatic report - XMLRPC Attack
2019-11-21 13:40:00
5.26.250.185 attackspam
2019-11-21T05:28:52.456526abusebot-4.cloudsearch.cf sshd\[31193\]: Invalid user ltcusk from 5.26.250.185 port 49134
2019-11-21 13:48:17
45.88.79.106 attackspambots
Nov 21 05:53:21 web8 sshd\[3170\]: Invalid user terranella from 45.88.79.106
Nov 21 05:53:21 web8 sshd\[3170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.79.106
Nov 21 05:53:23 web8 sshd\[3170\]: Failed password for invalid user terranella from 45.88.79.106 port 60586 ssh2
Nov 21 05:57:04 web8 sshd\[4985\]: Invalid user host from 45.88.79.106
Nov 21 05:57:04 web8 sshd\[4985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.79.106
2019-11-21 13:59:38
223.71.167.154 attack
$f2bV_matches
2019-11-21 13:40:52
185.39.10.54 attackbots
(PERMBLOCK) 185.39.10.54 (CH/Switzerland/-) has had more than 4 temp blocks in the last 86400 secs
2019-11-21 14:08:04
221.202.168.254 attack
Nov2105:54:18server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[anonymous]Nov2105:54:23server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:54:42server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:54:49server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:54:56server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:55:01server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:55:06server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:55:12server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:55:19server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2105:55:26server4pure-ftpd:\(\?@221.202.168.254\)[WARNING]Authenticationfailedforuser[yex-swiss]
2019-11-21 13:51:16
77.103.0.227 attackspam
Nov 21 05:55:33 MK-Soft-Root2 sshd[27099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.103.0.227 
Nov 21 05:55:35 MK-Soft-Root2 sshd[27099]: Failed password for invalid user gmunoz from 77.103.0.227 port 49732 ssh2
...
2019-11-21 13:46:49

最近上报的IP列表

142.93.135.255 142.93.137.118 142.93.137.172 142.93.137.191
142.93.137.192 142.93.137.230 142.93.134.71 142.93.134.90
142.93.137.161 142.93.137.44 142.93.137.88 142.93.138.149
142.93.138.217 118.96.98.31 142.93.138.76 142.93.138.151
142.93.139.224 142.93.139.202 142.93.139.125 142.93.138.78