必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.140.242 attack
2020-06-17T00:03:36.067695mail.standpoint.com.ua sshd[31174]: Invalid user silvio from 142.93.140.242 port 43750
2020-06-17T00:03:36.070299mail.standpoint.com.ua sshd[31174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
2020-06-17T00:03:36.067695mail.standpoint.com.ua sshd[31174]: Invalid user silvio from 142.93.140.242 port 43750
2020-06-17T00:03:37.535152mail.standpoint.com.ua sshd[31174]: Failed password for invalid user silvio from 142.93.140.242 port 43750 ssh2
2020-06-17T00:06:56.112872mail.standpoint.com.ua sshd[31629]: Invalid user teamspeak3 from 142.93.140.242 port 45070
...
2020-06-17 05:46:46
142.93.140.214 attackspambots
Jun 15 18:54:18 php1 sshd\[21780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.214  user=root
Jun 15 18:54:20 php1 sshd\[21780\]: Failed password for root from 142.93.140.214 port 35010 ssh2
Jun 15 18:57:30 php1 sshd\[21985\]: Invalid user lia from 142.93.140.214
Jun 15 18:57:30 php1 sshd\[21985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.214
Jun 15 18:57:32 php1 sshd\[21985\]: Failed password for invalid user lia from 142.93.140.214 port 36260 ssh2
2020-06-16 13:11:36
142.93.140.240 attack
142.93.140.240 - - [14/Jun/2020:14:48:50 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.140.240 - - [14/Jun/2020:14:48:52 +0200] "POST /wp-login.php HTTP/1.1" 200 6684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.140.240 - - [14/Jun/2020:14:48:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-14 22:55:32
142.93.140.242 attack
$f2bV_matches
2020-06-13 04:30:44
142.93.140.242 attack
Jun 12 08:32:17 web1 sshd[32760]: Invalid user aogola from 142.93.140.242 port 37724
Jun 12 08:32:17 web1 sshd[32760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
Jun 12 08:32:17 web1 sshd[32760]: Invalid user aogola from 142.93.140.242 port 37724
Jun 12 08:32:19 web1 sshd[32760]: Failed password for invalid user aogola from 142.93.140.242 port 37724 ssh2
Jun 12 08:37:35 web1 sshd[1569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
Jun 12 08:37:37 web1 sshd[1569]: Failed password for root from 142.93.140.242 port 51662 ssh2
Jun 12 08:39:32 web1 sshd[2032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
Jun 12 08:39:34 web1 sshd[2032]: Failed password for root from 142.93.140.242 port 59994 ssh2
Jun 12 08:41:29 web1 sshd[2548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t
...
2020-06-12 07:37:49
142.93.140.242 attackbots
May 22 04:46:57 gw1 sshd[10458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 22 04:46:59 gw1 sshd[10458]: Failed password for invalid user gtx from 142.93.140.242 port 44392 ssh2
...
2020-05-22 08:12:56
142.93.140.242 attackspam
May 15 21:33:44 ws22vmsma01 sshd[5973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 15 21:33:46 ws22vmsma01 sshd[5973]: Failed password for invalid user test from 142.93.140.242 port 32810 ssh2
...
2020-05-16 20:09:41
142.93.140.242 attackbotsspam
May 15 08:54:57 ns382633 sshd\[24679\]: Invalid user yarn from 142.93.140.242 port 54916
May 15 08:54:57 ns382633 sshd\[24679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 15 08:54:58 ns382633 sshd\[24679\]: Failed password for invalid user yarn from 142.93.140.242 port 54916 ssh2
May 15 08:59:36 ns382633 sshd\[25584\]: Invalid user hang from 142.93.140.242 port 42012
May 15 08:59:36 ns382633 sshd\[25584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
2020-05-15 18:39:12
142.93.140.242 attack
May 13 08:10:04 OPSO sshd\[9009\]: Invalid user weblogic from 142.93.140.242 port 45790
May 13 08:10:04 OPSO sshd\[9009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
May 13 08:10:06 OPSO sshd\[9009\]: Failed password for invalid user weblogic from 142.93.140.242 port 45790 ssh2
May 13 08:13:37 OPSO sshd\[9825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=admin
May 13 08:13:38 OPSO sshd\[9825\]: Failed password for admin from 142.93.140.242 port 53730 ssh2
2020-05-13 19:03:38
142.93.140.242 attack
May 11 09:21:42 onepixel sshd[2975521]: Invalid user student02 from 142.93.140.242 port 33052
May 11 09:21:42 onepixel sshd[2975521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 
May 11 09:21:42 onepixel sshd[2975521]: Invalid user student02 from 142.93.140.242 port 33052
May 11 09:21:44 onepixel sshd[2975521]: Failed password for invalid user student02 from 142.93.140.242 port 33052 ssh2
May 11 09:25:21 onepixel sshd[2975940]: Invalid user jeremy from 142.93.140.242 port 41636
2020-05-11 19:12:59
142.93.140.240 attackbots
Automatic report - XMLRPC Attack
2020-05-09 05:56:23
142.93.140.242 attackbotsspam
May  8 14:12:08 electroncash sshd[33246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 
May  8 14:12:08 electroncash sshd[33246]: Invalid user asd from 142.93.140.242 port 54534
May  8 14:12:10 electroncash sshd[33246]: Failed password for invalid user asd from 142.93.140.242 port 54534 ssh2
May  8 14:15:53 electroncash sshd[34290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242  user=root
May  8 14:15:55 electroncash sshd[34290]: Failed password for root from 142.93.140.242 port 35814 ssh2
...
2020-05-08 20:26:23
142.93.140.240 attackbots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-05-04 01:48:07
142.93.140.242 attackspam
Apr 29 13:57:10 ns382633 sshd\[19948\]: Invalid user regina from 142.93.140.242 port 37402
Apr 29 13:57:10 ns382633 sshd\[19948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
Apr 29 13:57:12 ns382633 sshd\[19948\]: Failed password for invalid user regina from 142.93.140.242 port 37402 ssh2
Apr 29 14:07:45 ns382633 sshd\[21935\]: Invalid user email from 142.93.140.242 port 54264
Apr 29 14:07:45 ns382633 sshd\[21935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242
2020-04-29 22:18:07
142.93.140.242 attack
no
2020-04-24 21:51:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.140.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.140.205.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:18 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
205.140.93.142.in-addr.arpa domain name pointer drsae.org.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.140.93.142.in-addr.arpa	name = drsae.org.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.89.118.35 attack
u16021495.ct.sendgrid.net
2020-06-16 04:10:34
35.225.34.45 attack
SSH brute force
2020-06-16 04:09:54
45.143.223.189 attackbots
Jun 15 15:36:00 web01.agentur-b-2.de postfix/smtpd[675149]: warning: unknown[45.143.223.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 15 15:36:00 web01.agentur-b-2.de postfix/smtpd[675149]: lost connection after AUTH from unknown[45.143.223.189]
Jun 15 15:36:15 web01.agentur-b-2.de postfix/smtpd[675150]: warning: unknown[45.143.223.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 15 15:36:15 web01.agentur-b-2.de postfix/smtpd[675150]: lost connection after AUTH from unknown[45.143.223.189]
Jun 15 15:36:25 web01.agentur-b-2.de postfix/smtpd[671297]: warning: unknown[45.143.223.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 15 15:36:25 web01.agentur-b-2.de postfix/smtpd[671297]: lost connection after AUTH from unknown[45.143.223.189]
2020-06-16 04:03:11
175.145.232.73 attackspambots
SSH Login attempts.
2020-06-16 04:16:21
51.89.148.69 attackbotsspam
Jun 15 21:04:14 vps333114 sshd[13121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-89-148.eu
Jun 15 21:04:16 vps333114 sshd[13121]: Failed password for invalid user ups from 51.89.148.69 port 49122 ssh2
...
2020-06-16 04:15:53
222.186.175.154 attackbots
Jun 15 23:16:02 ift sshd\[31547\]: Failed password for root from 222.186.175.154 port 53652 ssh2Jun 15 23:16:05 ift sshd\[31547\]: Failed password for root from 222.186.175.154 port 53652 ssh2Jun 15 23:16:09 ift sshd\[31547\]: Failed password for root from 222.186.175.154 port 53652 ssh2Jun 15 23:16:12 ift sshd\[31547\]: Failed password for root from 222.186.175.154 port 53652 ssh2Jun 15 23:16:15 ift sshd\[31547\]: Failed password for root from 222.186.175.154 port 53652 ssh2
...
2020-06-16 04:21:23
218.25.130.220 attackspambots
Jun 15 20:29:05 ns382633 sshd\[28645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.25.130.220  user=root
Jun 15 20:29:06 ns382633 sshd\[28645\]: Failed password for root from 218.25.130.220 port 24519 ssh2
Jun 15 20:38:36 ns382633 sshd\[30593\]: Invalid user oracle from 218.25.130.220 port 8135
Jun 15 20:38:36 ns382633 sshd\[30593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.25.130.220
Jun 15 20:38:38 ns382633 sshd\[30593\]: Failed password for invalid user oracle from 218.25.130.220 port 8135 ssh2
2020-06-16 04:18:04
218.56.11.236 attackbots
2020-06-15T12:24:57.731840shield sshd\[22969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.11.236  user=root
2020-06-15T12:24:59.883689shield sshd\[22969\]: Failed password for root from 218.56.11.236 port 42264 ssh2
2020-06-15T12:27:43.490679shield sshd\[23488\]: Invalid user testtest from 218.56.11.236 port 35288
2020-06-15T12:27:43.494288shield sshd\[23488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.11.236
2020-06-15T12:27:45.435271shield sshd\[23488\]: Failed password for invalid user testtest from 218.56.11.236 port 35288 ssh2
2020-06-16 04:36:24
111.229.61.82 attackspambots
$f2bV_matches
2020-06-16 04:21:04
59.13.125.142 attackbots
Jun 15 16:48:07 mout sshd[27809]: Invalid user gpadmin from 59.13.125.142 port 45604
Jun 15 16:48:08 mout sshd[27809]: Failed password for invalid user gpadmin from 59.13.125.142 port 45604 ssh2
Jun 15 16:48:09 mout sshd[27809]: Disconnected from invalid user gpadmin 59.13.125.142 port 45604 [preauth]
2020-06-16 04:26:27
88.250.105.164 attackspam
Port probing on unauthorized port 23
2020-06-16 04:07:19
179.216.177.121 attackbots
invalid login attempt (evan)
2020-06-16 04:29:52
189.112.12.107 attackbots
Jun 15 14:55:25 vps647732 sshd[15153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
Jun 15 14:55:28 vps647732 sshd[15153]: Failed password for invalid user postgres from 189.112.12.107 port 5921 ssh2
...
2020-06-16 04:39:38
186.153.212.236 attack
Unauthorized connection attempt detected from IP address 186.153.212.236 to port 23
2020-06-16 04:28:40
43.225.151.252 attackspam
SSH Login attempts.
2020-06-16 04:24:47

最近上报的IP列表

118.96.98.35 142.93.140.232 142.93.140.234 142.93.140.6
142.93.140.30 142.93.141.112 142.93.140.53 142.93.140.80
142.93.140.244 118.96.99.147 118.96.99.36 118.96.99.41
118.96.99.62 142.93.164.150 142.93.162.47 142.93.163.63
142.93.163.205 142.93.163.194 142.93.163.12 142.93.163.98