必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.140.242 attack
2020-06-17T00:03:36.067695mail.standpoint.com.ua sshd[31174]: Invalid user silvio from 142.93.140.242 port 43750
2020-06-17T00:03:36.070299mail.standpoint.com.ua sshd[31174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
2020-06-17T00:03:36.067695mail.standpoint.com.ua sshd[31174]: Invalid user silvio from 142.93.140.242 port 43750
2020-06-17T00:03:37.535152mail.standpoint.com.ua sshd[31174]: Failed password for invalid user silvio from 142.93.140.242 port 43750 ssh2
2020-06-17T00:06:56.112872mail.standpoint.com.ua sshd[31629]: Invalid user teamspeak3 from 142.93.140.242 port 45070
...
2020-06-17 05:46:46
142.93.140.214 attackspambots
Jun 15 18:54:18 php1 sshd\[21780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.214  user=root
Jun 15 18:54:20 php1 sshd\[21780\]: Failed password for root from 142.93.140.214 port 35010 ssh2
Jun 15 18:57:30 php1 sshd\[21985\]: Invalid user lia from 142.93.140.214
Jun 15 18:57:30 php1 sshd\[21985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.214
Jun 15 18:57:32 php1 sshd\[21985\]: Failed password for invalid user lia from 142.93.140.214 port 36260 ssh2
2020-06-16 13:11:36
142.93.140.240 attack
142.93.140.240 - - [14/Jun/2020:14:48:50 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.140.240 - - [14/Jun/2020:14:48:52 +0200] "POST /wp-login.php HTTP/1.1" 200 6684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.140.240 - - [14/Jun/2020:14:48:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-14 22:55:32
142.93.140.242 attack
$f2bV_matches
2020-06-13 04:30:44
142.93.140.242 attack
Jun 12 08:32:17 web1 sshd[32760]: Invalid user aogola from 142.93.140.242 port 37724
Jun 12 08:32:17 web1 sshd[32760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
Jun 12 08:32:17 web1 sshd[32760]: Invalid user aogola from 142.93.140.242 port 37724
Jun 12 08:32:19 web1 sshd[32760]: Failed password for invalid user aogola from 142.93.140.242 port 37724 ssh2
Jun 12 08:37:35 web1 sshd[1569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
Jun 12 08:37:37 web1 sshd[1569]: Failed password for root from 142.93.140.242 port 51662 ssh2
Jun 12 08:39:32 web1 sshd[2032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
Jun 12 08:39:34 web1 sshd[2032]: Failed password for root from 142.93.140.242 port 59994 ssh2
Jun 12 08:41:29 web1 sshd[2548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t
...
2020-06-12 07:37:49
142.93.140.242 attackbots
May 22 04:46:57 gw1 sshd[10458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 22 04:46:59 gw1 sshd[10458]: Failed password for invalid user gtx from 142.93.140.242 port 44392 ssh2
...
2020-05-22 08:12:56
142.93.140.242 attackspam
May 15 21:33:44 ws22vmsma01 sshd[5973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 15 21:33:46 ws22vmsma01 sshd[5973]: Failed password for invalid user test from 142.93.140.242 port 32810 ssh2
...
2020-05-16 20:09:41
142.93.140.242 attackbotsspam
May 15 08:54:57 ns382633 sshd\[24679\]: Invalid user yarn from 142.93.140.242 port 54916
May 15 08:54:57 ns382633 sshd\[24679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 15 08:54:58 ns382633 sshd\[24679\]: Failed password for invalid user yarn from 142.93.140.242 port 54916 ssh2
May 15 08:59:36 ns382633 sshd\[25584\]: Invalid user hang from 142.93.140.242 port 42012
May 15 08:59:36 ns382633 sshd\[25584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
2020-05-15 18:39:12
142.93.140.242 attack
May 13 08:10:04 OPSO sshd\[9009\]: Invalid user weblogic from 142.93.140.242 port 45790
May 13 08:10:04 OPSO sshd\[9009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 13 08:10:06 OPSO sshd\[9009\]: Failed password for invalid user weblogic from 142.93.140.242 port 45790 ssh2
May 13 08:13:37 OPSO sshd\[9825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=admin
May 13 08:13:38 OPSO sshd\[9825\]: Failed password for admin from 142.93.140.242 port 53730 ssh2
2020-05-13 19:03:38
142.93.140.242 attack
May 11 09:21:42 onepixel sshd[2975521]: Invalid user student02 from 142.93.140.242 port 33052
May 11 09:21:42 onepixel sshd[2975521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 
May 11 09:21:42 onepixel sshd[2975521]: Invalid user student02 from 142.93.140.242 port 33052
May 11 09:21:44 onepixel sshd[2975521]: Failed password for invalid user student02 from 142.93.140.242 port 33052 ssh2
May 11 09:25:21 onepixel sshd[2975940]: Invalid user jeremy from 142.93.140.242 port 41636
2020-05-11 19:12:59
142.93.140.240 attackbots
Automatic report - XMLRPC Attack
2020-05-09 05:56:23
142.93.140.242 attackbotsspam
May  8 14:12:08 electroncash sshd[33246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 
May  8 14:12:08 electroncash sshd[33246]: Invalid user asd from 142.93.140.242 port 54534
May  8 14:12:10 electroncash sshd[33246]: Failed password for invalid user asd from 142.93.140.242 port 54534 ssh2
May  8 14:15:53 electroncash sshd[34290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
May  8 14:15:55 electroncash sshd[34290]: Failed password for root from 142.93.140.242 port 35814 ssh2
...
2020-05-08 20:26:23
142.93.140.240 attackbots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-05-04 01:48:07
142.93.140.242 attackspam
Apr 29 13:57:10 ns382633 sshd\[19948\]: Invalid user regina from 142.93.140.242 port 37402
Apr 29 13:57:10 ns382633 sshd\[19948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
Apr 29 13:57:12 ns382633 sshd\[19948\]: Failed password for invalid user regina from 142.93.140.242 port 37402 ssh2
Apr 29 14:07:45 ns382633 sshd\[21935\]: Invalid user email from 142.93.140.242 port 54264
Apr 29 14:07:45 ns382633 sshd\[21935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
2020-04-29 22:18:07
142.93.140.242 attack
no
2020-04-24 21:51:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.140.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9408
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.140.162.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:17 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 162.140.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.140.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.77.237 attackspambots
Dec 21 04:49:29 tdfoods sshd\[20498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237  user=root
Dec 21 04:49:31 tdfoods sshd\[20498\]: Failed password for root from 139.59.77.237 port 60356 ssh2
Dec 21 04:56:25 tdfoods sshd\[21138\]: Invalid user ampere from 139.59.77.237
Dec 21 04:56:25 tdfoods sshd\[21138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237
Dec 21 04:56:27 tdfoods sshd\[21138\]: Failed password for invalid user ampere from 139.59.77.237 port 35595 ssh2
2019-12-21 23:14:07
60.113.85.41 attack
Dec 21 09:56:33 plusreed sshd[25450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.113.85.41  user=root
Dec 21 09:56:35 plusreed sshd[25450]: Failed password for root from 60.113.85.41 port 41490 ssh2
...
2019-12-21 23:04:09
114.79.155.43 attackbotsspam
Unauthorized connection attempt detected from IP address 114.79.155.43 to port 445
2019-12-21 22:41:57
180.182.47.132 attack
Invalid user kz from 180.182.47.132 port 37695
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
Failed password for invalid user kz from 180.182.47.132 port 37695 ssh2
Invalid user trial from 180.182.47.132 port 41631
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
2019-12-21 22:53:57
103.52.16.98 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-21 22:49:35
45.183.95.255 attackspam
1576940184 - 12/21/2019 15:56:24 Host: 45.183.95.255/45.183.95.255 Port: 445 TCP Blocked
2019-12-21 23:19:05
118.160.102.33 attack
Honeypot attack, port: 23, PTR: 118-160-102-33.dynamic-ip.hinet.net.
2019-12-21 22:37:42
75.162.137.58 attack
20 attempts against mh-misbehave-ban on comet.magehost.pro
2019-12-21 23:04:43
178.20.231.119 attackbotsspam
$f2bV_matches
2019-12-21 23:16:17
120.28.109.188 attackbots
Dec 21 04:48:44 hpm sshd\[27077\]: Invalid user testftp from 120.28.109.188
Dec 21 04:48:44 hpm sshd\[27077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.109.188
Dec 21 04:48:47 hpm sshd\[27077\]: Failed password for invalid user testftp from 120.28.109.188 port 57960 ssh2
Dec 21 04:56:22 hpm sshd\[27852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.109.188  user=root
Dec 21 04:56:24 hpm sshd\[27852\]: Failed password for root from 120.28.109.188 port 33498 ssh2
2019-12-21 23:18:16
218.4.163.146 attack
2019-12-21T08:12:51.877281shield sshd\[21103\]: Invalid user muniammal from 218.4.163.146 port 38827
2019-12-21T08:12:51.881661shield sshd\[21103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.163.146
2019-12-21T08:12:53.405643shield sshd\[21103\]: Failed password for invalid user muniammal from 218.4.163.146 port 38827 ssh2
2019-12-21T08:19:01.669929shield sshd\[23475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.163.146  user=root
2019-12-21T08:19:03.655613shield sshd\[23475\]: Failed password for root from 218.4.163.146 port 34657 ssh2
2019-12-21 22:53:37
110.4.189.228 attackspam
Dec 21 14:36:45 nextcloud sshd\[27553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.4.189.228  user=root
Dec 21 14:36:47 nextcloud sshd\[27553\]: Failed password for root from 110.4.189.228 port 37386 ssh2
Dec 21 14:47:31 nextcloud sshd\[12104\]: Invalid user guest from 110.4.189.228
Dec 21 14:47:31 nextcloud sshd\[12104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.4.189.228
...
2019-12-21 22:32:01
211.157.2.92 attack
Invalid user postgres from 211.157.2.92 port 5380
2019-12-21 22:43:08
179.43.132.132 attackspambots
Looking for resource vulnerabilities
2019-12-21 23:17:21
222.163.150.147 attack
Honeypot attack, port: 23, PTR: 147.150.163.222.adsl-pool.jlccptt.net.cn.
2019-12-21 22:54:52

最近上报的IP列表

142.93.14.246 142.93.139.91 142.93.140.19 118.96.98.35
142.93.140.205 142.93.140.232 142.93.140.234 142.93.140.6
142.93.140.30 142.93.141.112 142.93.140.53 142.93.140.80
142.93.140.244 118.96.99.147 118.96.99.36 118.96.99.41
118.96.99.62 142.93.164.150 142.93.162.47 142.93.163.63