必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.204.221 attackspam
Automatic report - Banned IP Access
2020-07-27 23:32:54
142.93.204.9 attackspambots
Port scan: Attack repeated for 24 hours
2020-07-24 17:32:43
142.93.204.221 attack
142.93.204.221 - - [11/Jul/2020:09:40:03 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [11/Jul/2020:09:40:15 +0100] "POST /wp-login.php HTTP/1.1" 200 1890 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [11/Jul/2020:09:40:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1926 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-11 17:00:30
142.93.204.221 attackbots
Automatic report - WordPress Brute Force
2020-07-10 18:11:55
142.93.204.221 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-07-06 17:31:16
142.93.204.221 attack
142.93.204.221 - - [26/Jun/2020:10:15:14 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Jun/2020:10:15:15 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Jun/2020:10:15:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-26 17:33:37
142.93.204.221 attack
WordPress (CMS) attack attempts.
Date: 2020 Jun 01. 05:25:38
Source IP: 142.93.204.221

Portion of the log(s):
142.93.204.221 - [01/Jun/2020:05:25:20 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - [01/Jun/2020:05:25:25 +0200] "POST /wp-login.php HTTP/1.1" 200 2411 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - [01/Jun/2020:05:25:31 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - [01/Jun/2020:05:25:32 +0200] "POST /wp-login.php HTTP/1.1" 200 2414 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - [01/Jun/2020:05:25:32 +0200] "POST /xmlrpc.php HTTP/1.1" 404 118 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-01 13:07:34
142.93.204.221 attackbots
Automatic report - XMLRPC Attack
2020-05-26 10:05:16
142.93.204.221 attackspambots
xmlrpc attack
2020-05-23 23:23:08
142.93.204.221 attackbotsspam
wp-login.php
2020-05-20 03:58:29
142.93.204.221 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-04-18 20:56:56
142.93.204.89 attackspam
Apr  3 14:41:45 XXX sshd[39784]: Invalid user ubnt from 142.93.204.89 port 42676
2020-04-03 22:35:37
142.93.204.89 attackspam
SSH Server BruteForce Attack
2020-04-03 14:40:28
142.93.204.221 attack
142.93.204.221 - - [26/Mar/2020:22:19:52 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Mar/2020:22:19:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2297 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Mar/2020:22:19:53 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Mar/2020:22:19:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Mar/2020:22:19:58 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.204.221 - - [26/Mar/2020:22:19:58 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-27 06:12:58
142.93.204.221 attackspam
Unauthorized connection attempt detected, IP banned.
2020-03-25 08:40:53
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.204.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.204.5.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:23:44 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 5.204.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.204.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.210 attack
Jul 28 00:36:23 ny01 sshd[25811]: Failed password for root from 218.92.0.210 port 36957 ssh2
Jul 28 00:43:39 ny01 sshd[26658]: Failed password for root from 218.92.0.210 port 20725 ssh2
Jul 28 00:43:41 ny01 sshd[26658]: Failed password for root from 218.92.0.210 port 20725 ssh2
2020-07-28 12:53:10
51.254.36.178 attackbots
Jul 28 00:08:51 ny01 sshd[21925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.36.178
Jul 28 00:08:52 ny01 sshd[21925]: Failed password for invalid user zhongzheng from 51.254.36.178 port 59942 ssh2
Jul 28 00:12:38 ny01 sshd[22822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.36.178
2020-07-28 12:27:06
201.75.53.29 attack
2020-07-28T05:54:36.566245v22018076590370373 sshd[23439]: Invalid user nexus from 201.75.53.29 port 47565
2020-07-28T05:54:36.574716v22018076590370373 sshd[23439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.75.53.29
2020-07-28T05:54:36.566245v22018076590370373 sshd[23439]: Invalid user nexus from 201.75.53.29 port 47565
2020-07-28T05:54:38.917953v22018076590370373 sshd[23439]: Failed password for invalid user nexus from 201.75.53.29 port 47565 ssh2
2020-07-28T05:57:36.181981v22018076590370373 sshd[8606]: Invalid user wangpei from 201.75.53.29 port 37171
...
2020-07-28 12:23:03
139.59.83.203 attack
139.59.83.203 - - [28/Jul/2020:04:56:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.83.203 - - [28/Jul/2020:04:56:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.83.203 - - [28/Jul/2020:04:56:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1947 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-28 12:56:14
218.92.0.215 attack
Jul 28 04:55:58 marvibiene sshd[60859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215  user=root
Jul 28 04:56:00 marvibiene sshd[60859]: Failed password for root from 218.92.0.215 port 41876 ssh2
Jul 28 04:56:02 marvibiene sshd[60859]: Failed password for root from 218.92.0.215 port 41876 ssh2
Jul 28 04:55:58 marvibiene sshd[60859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215  user=root
Jul 28 04:56:00 marvibiene sshd[60859]: Failed password for root from 218.92.0.215 port 41876 ssh2
Jul 28 04:56:02 marvibiene sshd[60859]: Failed password for root from 218.92.0.215 port 41876 ssh2
2020-07-28 12:57:04
166.111.68.25 attack
Jul 28 00:23:20 ny01 sshd[23930]: Failed password for root from 166.111.68.25 port 41396 ssh2
Jul 28 00:25:21 ny01 sshd[24540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.68.25
Jul 28 00:25:23 ny01 sshd[24540]: Failed password for invalid user shhan from 166.111.68.25 port 42294 ssh2
2020-07-28 12:30:36
111.229.101.155 attackspam
Jul 28 05:58:33 OPSO sshd\[10231\]: Invalid user lzhou from 111.229.101.155 port 45078
Jul 28 05:58:33 OPSO sshd\[10231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.101.155
Jul 28 05:58:35 OPSO sshd\[10231\]: Failed password for invalid user lzhou from 111.229.101.155 port 45078 ssh2
Jul 28 06:08:00 OPSO sshd\[12236\]: Invalid user xuqian from 111.229.101.155 port 56620
Jul 28 06:08:00 OPSO sshd\[12236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.101.155
2020-07-28 12:23:31
115.134.128.90 attack
2020-07-28T07:35:14.935107mail.standpoint.com.ua sshd[1796]: Invalid user chs from 115.134.128.90 port 48012
2020-07-28T07:35:14.937703mail.standpoint.com.ua sshd[1796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.128.90
2020-07-28T07:35:14.935107mail.standpoint.com.ua sshd[1796]: Invalid user chs from 115.134.128.90 port 48012
2020-07-28T07:35:16.642746mail.standpoint.com.ua sshd[1796]: Failed password for invalid user chs from 115.134.128.90 port 48012 ssh2
2020-07-28T07:39:49.738214mail.standpoint.com.ua sshd[2413]: Invalid user user15 from 115.134.128.90 port 59640
...
2020-07-28 12:48:04
43.228.222.114 attackbots
Dovecot Invalid User Login Attempt.
2020-07-28 12:24:34
148.70.236.74 attackbotsspam
Jul 28 06:57:50 [host] sshd[16132]: Invalid user r
Jul 28 06:57:50 [host] sshd[16132]: pam_unix(sshd:
Jul 28 06:57:52 [host] sshd[16132]: Failed passwor
2020-07-28 13:00:14
51.210.113.108 attackspam
Port probing on unauthorized port 8089
2020-07-28 12:41:00
121.52.154.36 attackspam
2020-07-28T07:12:40.671360lavrinenko.info sshd[6539]: Invalid user xcui from 121.52.154.36 port 52974
2020-07-28T07:12:40.683090lavrinenko.info sshd[6539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36
2020-07-28T07:12:40.671360lavrinenko.info sshd[6539]: Invalid user xcui from 121.52.154.36 port 52974
2020-07-28T07:12:42.171849lavrinenko.info sshd[6539]: Failed password for invalid user xcui from 121.52.154.36 port 52974 ssh2
2020-07-28T07:17:35.789373lavrinenko.info sshd[6685]: Invalid user certisvideo from 121.52.154.36 port 35124
...
2020-07-28 12:22:47
203.245.29.148 attackbots
Jul 28 06:32:46 ip106 sshd[6845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.245.29.148 
Jul 28 06:32:48 ip106 sshd[6845]: Failed password for invalid user shuaimou from 203.245.29.148 port 48052 ssh2
...
2020-07-28 12:58:21
94.139.171.234 attack
Jul 28 05:52:59 minden010 sshd[26513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.171.234
Jul 28 05:53:01 minden010 sshd[26513]: Failed password for invalid user dsn from 94.139.171.234 port 44602 ssh2
Jul 28 05:57:33 minden010 sshd[28035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.171.234
...
2020-07-28 12:25:36
87.201.55.202 attackbotsspam
Fail2Ban Ban Triggered
2020-07-28 12:42:07

最近上报的IP列表

142.93.203.195 142.93.205.62 142.93.206.68 142.93.207.129
142.93.205.93 142.93.208.228 142.93.208.47 142.93.21.240
142.93.210.223 142.93.211.205 142.93.212.146 142.93.212.184
142.93.212.157 142.93.211.104 142.93.212.20 142.93.213.143
142.93.212.32 142.93.213.245 142.93.211.107 142.93.213.251