必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.145.158 attackspambots
Invalid user gast from 142.93.145.158 port 52078
2020-05-13 17:10:51
142.93.145.158 attackbotsspam
May  5 11:16:29 Ubuntu-1404-trusty-64-minimal sshd\[15694\]: Invalid user eden from 142.93.145.158
May  5 11:16:29 Ubuntu-1404-trusty-64-minimal sshd\[15694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158
May  5 11:16:30 Ubuntu-1404-trusty-64-minimal sshd\[15694\]: Failed password for invalid user eden from 142.93.145.158 port 56536 ssh2
May  5 11:20:55 Ubuntu-1404-trusty-64-minimal sshd\[20199\]: Invalid user etp from 142.93.145.158
May  5 11:20:55 Ubuntu-1404-trusty-64-minimal sshd\[20199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158
2020-05-05 17:40:21
142.93.145.158 attack
2020-05-01T14:34:19.751045abusebot-6.cloudsearch.cf sshd[12967]: Invalid user ftpuser from 142.93.145.158 port 54782
2020-05-01T14:34:19.761574abusebot-6.cloudsearch.cf sshd[12967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158
2020-05-01T14:34:19.751045abusebot-6.cloudsearch.cf sshd[12967]: Invalid user ftpuser from 142.93.145.158 port 54782
2020-05-01T14:34:21.817064abusebot-6.cloudsearch.cf sshd[12967]: Failed password for invalid user ftpuser from 142.93.145.158 port 54782 ssh2
2020-05-01T14:39:40.214805abusebot-6.cloudsearch.cf sshd[13319]: Invalid user richard from 142.93.145.158 port 49274
2020-05-01T14:39:40.220840abusebot-6.cloudsearch.cf sshd[13319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158
2020-05-01T14:39:40.214805abusebot-6.cloudsearch.cf sshd[13319]: Invalid user richard from 142.93.145.158 port 49274
2020-05-01T14:39:42.677626abusebot-6.cloudsearch.cf ss
...
2020-05-01 23:14:25
142.93.145.158 attackspam
Apr 24 13:58:07 xeon sshd[33804]: Failed password for invalid user riakcs from 142.93.145.158 port 46658 ssh2
2020-04-24 20:55:22
142.93.145.158 attackspambots
leo_www
2020-04-23 02:35:13
142.93.145.158 attack
Apr 21 22:51:31 pve1 sshd[10812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158 
Apr 21 22:51:32 pve1 sshd[10812]: Failed password for invalid user ftpuser from 142.93.145.158 port 40250 ssh2
...
2020-04-22 05:19:29
142.93.145.158 attack
Invalid user admin from 142.93.145.158 port 51404
2020-04-21 22:01:23
142.93.145.158 attackbotsspam
16352/tcp
[2020-04-20]1pkt
2020-04-20 16:43:08
142.93.145.158 attackspambots
2020-04-19T22:13:18.573494vps751288.ovh.net sshd\[32109\]: Invalid user git from 142.93.145.158 port 41944
2020-04-19T22:13:18.580716vps751288.ovh.net sshd\[32109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158
2020-04-19T22:13:20.911177vps751288.ovh.net sshd\[32109\]: Failed password for invalid user git from 142.93.145.158 port 41944 ssh2
2020-04-19T22:18:01.883252vps751288.ovh.net sshd\[32165\]: Invalid user git from 142.93.145.158 port 53648
2020-04-19T22:18:01.892221vps751288.ovh.net sshd\[32165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.145.158
2020-04-20 04:37:12
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.145.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.145.12.			IN	A

;; AUTHORITY SECTION:
.			171	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:12:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 12.145.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.145.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.4.239.146 attack
Oct 15 07:44:24 web1 postfix/smtpd[26894]: warning: unknown[218.4.239.146]: SASL LOGIN authentication failed: authentication failure
...
2019-10-15 22:00:10
49.234.207.171 attackbotsspam
Oct 15 04:12:12 sachi sshd\[26806\]: Invalid user cody from 49.234.207.171
Oct 15 04:12:12 sachi sshd\[26806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.207.171
Oct 15 04:12:14 sachi sshd\[26806\]: Failed password for invalid user cody from 49.234.207.171 port 53798 ssh2
Oct 15 04:17:59 sachi sshd\[27271\]: Invalid user waterboy123 from 49.234.207.171
Oct 15 04:17:59 sachi sshd\[27271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.207.171
2019-10-15 22:21:04
119.10.114.92 attackbotsspam
IMAP brute force
...
2019-10-15 22:01:05
222.180.162.8 attackspam
Oct 15 19:26:30 areeb-Workstation sshd[12087]: Failed password for root from 222.180.162.8 port 48906 ssh2
...
2019-10-15 22:31:59
54.178.182.46 attackbots
Forbidden directory scan :: 2019/10/15 22:43:37 [error] 1095#1095: *165905 access forbidden by rule, client: 54.178.182.46, server: [censored_2], request: "HEAD /2011.sql HTTP/1.1", host: "[censored_2]"
2019-10-15 22:29:29
185.90.118.100 attackbots
10/15/2019-09:10:10.591211 185.90.118.100 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-15 22:22:25
46.101.103.207 attack
2019-10-15T14:24:08.129260abusebot-7.cloudsearch.cf sshd\[30672\]: Invalid user kjayroe from 46.101.103.207 port 58204
2019-10-15 22:26:06
180.106.81.168 attack
2019-10-15T20:35:57.576270enmeeting.mahidol.ac.th sshd\[25223\]: User root from 180.106.81.168 not allowed because not listed in AllowUsers
2019-10-15T20:35:57.697802enmeeting.mahidol.ac.th sshd\[25223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.106.81.168  user=root
2019-10-15T20:35:59.497914enmeeting.mahidol.ac.th sshd\[25223\]: Failed password for invalid user root from 180.106.81.168 port 33002 ssh2
...
2019-10-15 22:41:54
159.65.230.189 attackbotsspam
Oct 15 13:43:47 XXXXXX sshd[50367]: Invalid user admin from 159.65.230.189 port 56326
2019-10-15 22:22:50
42.51.156.6 attack
Oct 15 15:50:59 icinga sshd[16019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.156.6
Oct 15 15:51:01 icinga sshd[16019]: Failed password for invalid user vasi from 42.51.156.6 port 56629 ssh2
...
2019-10-15 22:36:29
81.247.64.98 attack
2019-10-15T12:59:08.296696abusebot-5.cloudsearch.cf sshd\[5888\]: Invalid user bjorn from 81.247.64.98 port 52867
2019-10-15 22:13:59
114.94.125.163 attackspam
k+ssh-bruteforce
2019-10-15 22:35:35
104.238.110.156 attackspambots
2019-10-15T13:56:01.899824abusebot.cloudsearch.cf sshd\[7490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-104-238-110-156.ip.secureserver.net  user=root
2019-10-15 22:15:20
79.137.73.253 attackspam
Oct 15 15:45:53 jane sshd[805]: Failed password for root from 79.137.73.253 port 42870 ssh2
...
2019-10-15 22:03:51
180.96.28.87 attackbotsspam
Oct 15 10:20:17 plusreed sshd[5943]: Invalid user 123 from 180.96.28.87
...
2019-10-15 22:27:39

最近上报的IP列表

66.94.119.6 113.161.67.83 117.82.33.134 49.232.30.12
122.161.194.186 178.59.183.36 131.0.164.78 163.125.212.127
77.228.150.215 124.88.34.73 202.142.73.60 185.147.213.247
99.47.147.166 125.118.228.220 122.233.35.241 46.161.196.27
1.82.195.163 181.52.125.100 117.240.163.19 195.189.218.131