必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.172.45 attackspam
142.93.172.45 - - [12/Sep/2020:12:44:23 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [12/Sep/2020:12:44:24 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [12/Sep/2020:12:44:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-13 03:47:21
142.93.172.45 attackbots
142.93.172.45 - - [12/Sep/2020:12:44:23 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [12/Sep/2020:12:44:24 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [12/Sep/2020:12:44:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-12 19:56:13
142.93.172.45 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-30 05:01:11
142.93.172.45 attackbotsspam
142.93.172.45 - - [22/Aug/2020:23:33:17 +0200] "GET /wp-login.php HTTP/1.1" 200 1748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [22/Aug/2020:23:33:20 +0200] "POST /wp-login.php HTTP/1.1" 200 1880 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [22/Aug/2020:23:33:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [22/Aug/2020:23:33:22 +0200] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [22/Aug/2020:23:33:24 +0200] "GET /wp-login.php HTTP/1.1" 200 1748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [22/Aug/2020:23:33:25 +0200] "POST /wp-login.php HTTP/1.1" 200 1855 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-08-23 06:25:45
142.93.172.45 attackspam
142.93.172.45 - - [14/Aug/2020:11:37:25 +0200] "GET /wp-login.php HTTP/1.1" 200 9032 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [14/Aug/2020:11:37:27 +0200] "POST /wp-login.php HTTP/1.1" 200 9283 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [14/Aug/2020:11:37:28 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-14 18:14:09
142.93.172.45 attackspam
142.93.172.45 - - [03/Aug/2020:14:36:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [03/Aug/2020:14:36:34 +0100] "POST /wp-login.php HTTP/1.1" 200 1706 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [03/Aug/2020:14:36:34 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-03 23:27:31
142.93.172.45 attackspambots
142.93.172.45 - - [26/Jul/2020:22:04:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [26/Jul/2020:22:04:06 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [26/Jul/2020:22:04:06 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-27 05:06:44
142.93.172.45 attackbots
142.93.172.45 - - \[17/Jul/2020:20:14:53 +0200\] "POST /wp-login.php HTTP/1.0" 200 5924 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - \[17/Jul/2020:20:14:54 +0200\] "POST /wp-login.php HTTP/1.0" 200 5902 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - \[17/Jul/2020:20:14:54 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-18 02:17:16
142.93.172.45 attackspam
142.93.172.45 - - [14/Jul/2020:15:40:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2423 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [14/Jul/2020:15:40:02 +0100] "POST /wp-login.php HTTP/1.1" 200 2371 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.172.45 - - [14/Jul/2020:15:40:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2344 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-14 23:15:44
142.93.172.45 attackbotsspam
Automatic report - WordPress Brute Force
2020-07-04 08:06:31
142.93.172.64 attack
ssh brute force
2020-06-01 16:56:52
142.93.172.64 attackspam
May 31 10:08:06 ns382633 sshd\[4544\]: Invalid user guest from 142.93.172.64 port 33332
May 31 10:08:06 ns382633 sshd\[4544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64
May 31 10:08:07 ns382633 sshd\[4544\]: Failed password for invalid user guest from 142.93.172.64 port 33332 ssh2
May 31 10:23:32 ns382633 sshd\[7418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64  user=root
May 31 10:23:34 ns382633 sshd\[7418\]: Failed password for root from 142.93.172.64 port 42254 ssh2
2020-05-31 17:36:59
142.93.172.45 attack
Wordpress_xmlrpc_attack
2020-05-25 04:46:46
142.93.172.64 attackspam
May 15 19:45:09 localhost sshd[82146]: Invalid user Test from 142.93.172.64 port 38950
May 15 19:45:09 localhost sshd[82146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64
May 15 19:45:09 localhost sshd[82146]: Invalid user Test from 142.93.172.64 port 38950
May 15 19:45:11 localhost sshd[82146]: Failed password for invalid user Test from 142.93.172.64 port 38950 ssh2
May 15 19:51:38 localhost sshd[83059]: Invalid user easter from 142.93.172.64 port 44968
...
2020-05-16 03:59:57
142.93.172.67 attackbots
May 11 13:06:12 server1 sshd\[28582\]: Invalid user test from 142.93.172.67
May 11 13:06:12 server1 sshd\[28582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.67 
May 11 13:06:14 server1 sshd\[28582\]: Failed password for invalid user test from 142.93.172.67 port 40080 ssh2
May 11 13:09:37 server1 sshd\[29746\]: Invalid user prom from 142.93.172.67
May 11 13:09:37 server1 sshd\[29746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.67 
...
2020-05-12 03:25:07
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.172.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.172.161.			IN	A

;; AUTHORITY SECTION:
.			481	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:57 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 161.172.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.172.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.255.211.242 attackbots
Unauthorized connection attempt from IP address 36.255.211.242 on Port 445(SMB)
2020-03-05 04:15:26
85.105.57.34 attackbotsspam
Honeypot attack, port: 445, PTR: 85.105.57.34.static.ttnet.com.tr.
2020-03-05 03:58:43
218.92.0.186 attack
$f2bV_matches
2020-03-05 04:09:37
208.80.194.29 attackspam
Automated report (2020-03-04T17:03:01+00:00). Faked user agent detected.
2020-03-05 04:03:53
151.80.61.103 attack
$f2bV_matches
2020-03-05 04:10:32
159.203.36.18 attack
WordPress login Brute force / Web App Attack on client site.
2020-03-05 04:05:47
136.232.6.194 attackspambots
Unauthorized connection attempt from IP address 136.232.6.194 on Port 445(SMB)
2020-03-05 03:57:37
117.131.60.53 attack
suspicious action Wed, 04 Mar 2020 10:33:11 -0300
2020-03-05 03:50:10
177.103.216.46 attack
Unauthorized connection attempt from IP address 177.103.216.46 on Port 445(SMB)
2020-03-05 03:49:17
218.92.36.66 attackspambots
$f2bV_matches
2020-03-05 04:04:33
216.130.253.58 attackspam
Unauthorized connection attempt from IP address 216.130.253.58 on Port 445(SMB)
2020-03-05 03:55:07
218.95.182.76 attack
$f2bV_matches
2020-03-05 03:58:28
179.52.76.121 attack
Honeypot attack, port: 445, PTR: 121.76.52.179.d.dyn.claro.net.do.
2020-03-05 03:57:06
68.183.102.246 attackspambots
$f2bV_matches
2020-03-05 04:02:16
159.192.106.246 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-05 03:51:30

最近上报的IP列表

142.93.173.244 142.93.173.220 142.93.172.24 142.93.173.138
142.93.174.112 142.93.173.34 142.93.174.154 142.93.174.131
142.93.174.199 142.93.174.188 118.97.103.26 142.93.174.191
142.93.174.20 142.93.175.80 142.93.174.226 142.93.174.95
142.93.176.138 142.93.175.233 142.93.175.30 142.93.176.167