必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): North Bergen

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
142.93.249.118 attack
Oct  6 15:45:52 Tower sshd[36555]: Connection from 142.93.249.118 port 44680 on 192.168.10.220 port 22 rdomain ""
Oct  6 15:45:55 Tower sshd[36555]: Failed password for root from 142.93.249.118 port 44680 ssh2
Oct  6 15:45:55 Tower sshd[36555]: Received disconnect from 142.93.249.118 port 44680:11: Bye Bye [preauth]
Oct  6 15:45:55 Tower sshd[36555]: Disconnected from authenticating user root 142.93.249.118 port 44680 [preauth]
2020-10-07 04:30:28
142.93.249.118 attackbotsspam
Oct  5 13:23:11 our-server-hostname sshd[32265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:23:13 our-server-hostname sshd[32265]: Failed password for r.r from 142.93.249.118 port 42104 ssh2
Oct  5 13:36:50 our-server-hostname sshd[1601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:36:52 our-server-hostname sshd[1601]: Failed password for r.r from 142.93.249.118 port 41912 ssh2
Oct  5 13:41:08 our-server-hostname sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:41:10 our-server-hostname sshd[2260]: Failed password for r.r from 142.93.249.118 port 49428 ssh2
Oct  5 13:45:12 our-server-hostname sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:45:1........
-------------------------------
2020-10-06 20:34:11
142.93.249.118 attackspam
Oct  5 13:23:11 our-server-hostname sshd[32265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:23:13 our-server-hostname sshd[32265]: Failed password for r.r from 142.93.249.118 port 42104 ssh2
Oct  5 13:36:50 our-server-hostname sshd[1601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:36:52 our-server-hostname sshd[1601]: Failed password for r.r from 142.93.249.118 port 41912 ssh2
Oct  5 13:41:08 our-server-hostname sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:41:10 our-server-hostname sshd[2260]: Failed password for r.r from 142.93.249.118 port 49428 ssh2
Oct  5 13:45:12 our-server-hostname sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.249.118  user=r.r
Oct  5 13:45:1........
-------------------------------
2020-10-06 12:15:43
142.93.249.29 attackbots
142.93.249.29 - - [25/May/2020:22:17:45 +0200] "GET /wp-login.php HTTP/1.1" 200 5865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.249.29 - - [25/May/2020:22:17:47 +0200] "POST /wp-login.php HTTP/1.1" 200 6116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.249.29 - - [25/May/2020:22:17:49 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-26 07:01:04
142.93.249.29 attack
xmlrpc attack
2020-05-13 20:40:53
142.93.249.29 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-02 23:46:12
142.93.249.29 attackbots
Automatic report - XMLRPC Attack
2020-05-02 12:40:51
142.93.249.69 attackspambots
" "
2019-12-14 02:52:56
142.93.249.69 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-13 07:49:53
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       142.93.0.0 - 142.93.255.255
CIDR:           142.93.0.0/16
NetName:        DIGITALOCEAN-142-93-0-0
NetHandle:      NET-142-93-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2018-07-12
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/142.93.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.249.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54102
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.93.249.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 23 21:01:24 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 216.249.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.249.93.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.227.134.82 attackbots
12/19/2019-23:33:24.006865 192.227.134.82 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-20 09:06:00
66.45.250.171 attackbotsspam
TCP Port Scanning
2019-12-20 08:47:08
111.204.9.193 attackbotsspam
Unauthorized connection attempt detected from IP address 111.204.9.193 to port 1433
2019-12-20 13:05:01
223.220.159.78 attackspam
Dec 20 01:21:51 lnxmysql61 sshd[19348]: Failed password for root from 223.220.159.78 port 37823 ssh2
Dec 20 01:21:51 lnxmysql61 sshd[19348]: Failed password for root from 223.220.159.78 port 37823 ssh2
2019-12-20 08:43:47
38.89.142.183 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-20 08:48:51
110.49.71.248 attack
Invalid user bonnibelle from 110.49.71.248 port 33466
2019-12-20 08:55:39
46.38.144.179 attack
Dec 20 01:32:00 ns3367391 postfix/smtpd[30136]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: authentication failure
Dec 20 01:35:14 ns3367391 postfix/smtpd[30136]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: authentication failure
...
2019-12-20 08:36:33
149.202.59.85 attackbotsspam
k+ssh-bruteforce
2019-12-20 08:31:23
217.182.95.16 attack
Apr 15 01:14:46 vtv3 sshd[21249]: Invalid user taniac from 217.182.95.16 port 48982
Apr 15 01:14:46 vtv3 sshd[21249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.95.16
Dec 19 21:41:06 vtv3 sshd[28284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.95.16 
Dec 19 21:41:08 vtv3 sshd[28284]: Failed password for invalid user deininger from 217.182.95.16 port 48676 ssh2
Dec 19 21:46:08 vtv3 sshd[30728]: Failed password for root from 217.182.95.16 port 53261 ssh2
Dec 19 22:00:54 vtv3 sshd[5233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.95.16 
Dec 19 22:00:56 vtv3 sshd[5233]: Failed password for invalid user syman from 217.182.95.16 port 37892 ssh2
Dec 19 22:06:21 vtv3 sshd[7797]: Failed password for root from 217.182.95.16 port 42516 ssh2
Dec 19 22:17:05 vtv3 sshd[12571]: Failed password for root from 217.182.95.16 port 51394 ssh2
Dec 19 22:22:27 vtv3 sshd[15003
2019-12-20 08:39:21
128.14.133.58 attackspambots
Unauthorized connection attempt detected from IP address 128.14.133.58 to port 443
2019-12-20 09:05:11
62.210.185.4 attackspam
[munged]::443 62.210.185.4 - - [20/Dec/2019:05:56:53 +0100] "POST /[munged]: HTTP/1.1" 200 7824 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-20 13:02:58
5.88.161.197 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-20 08:35:10
190.238.83.123 attackspambots
" "
2019-12-20 08:55:01
34.73.254.71 attack
Dec 19 14:37:25 wbs sshd\[20361\]: Invalid user dood from 34.73.254.71
Dec 19 14:37:25 wbs sshd\[20361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.254.73.34.bc.googleusercontent.com
Dec 19 14:37:27 wbs sshd\[20361\]: Failed password for invalid user dood from 34.73.254.71 port 55126 ssh2
Dec 19 14:42:56 wbs sshd\[21002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.254.73.34.bc.googleusercontent.com  user=root
Dec 19 14:42:57 wbs sshd\[21002\]: Failed password for root from 34.73.254.71 port 60390 ssh2
2019-12-20 08:43:15
109.173.40.60 attackspam
Dec 20 01:49:03 vps691689 sshd[14165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.173.40.60
Dec 20 01:49:05 vps691689 sshd[14165]: Failed password for invalid user sx from 109.173.40.60 port 39488 ssh2
...
2019-12-20 08:58:57

最近上报的IP列表

220.195.106.175 111.57.88.52 127.120.36.12 199.45.155.81
115.45.40.107 167.88.164.159 159.223.168.77 185.247.137.49
143.198.122.12 146.190.121.77 138.68.45.44 192.241.159.109
159.65.217.21 216.180.246.165 204.48.23.79 159.65.223.227
157.245.240.222 27.46.125.162 165.227.90.199 1.12.229.45