必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santa Clara

省份(region): California

国家(country): United States

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): DigitalOcean, LLC

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbotsspam
Jan  8 12:37:58 pi sshd[7064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245 
Jan  8 12:37:59 pi sshd[7064]: Failed password for invalid user ralph from 142.93.26.245 port 34040 ssh2
2020-03-14 02:20:53
attackbotsspam
Feb 27 15:36:59 haigwepa sshd[30988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245 
Feb 27 15:37:01 haigwepa sshd[30988]: Failed password for invalid user ubuntu from 142.93.26.245 port 48228 ssh2
...
2020-02-28 03:48:20
attackbotsspam
Unauthorized connection attempt detected from IP address 142.93.26.245 to port 2220 [J]
2020-02-02 03:30:46
attackspambots
Jan 21 18:19:31 vps691689 sshd[8703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Jan 21 18:19:33 vps691689 sshd[8703]: Failed password for invalid user babu from 142.93.26.245 port 58540 ssh2
Jan 21 18:22:13 vps691689 sshd[8792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
...
2020-01-22 01:31:40
attackspambots
Jan  9 22:23:49 SilenceServices sshd[13735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Jan  9 22:23:51 SilenceServices sshd[13735]: Failed password for invalid user men from 142.93.26.245 port 44824 ssh2
Jan  9 22:25:55 SilenceServices sshd[15398]: Failed password for mysql from 142.93.26.245 port 38082 ssh2
2020-01-10 06:21:36
attackspambots
Dec 21 02:59:51 hanapaa sshd\[4411\]: Invalid user xk from 142.93.26.245
Dec 21 02:59:51 hanapaa sshd\[4411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Dec 21 02:59:52 hanapaa sshd\[4411\]: Failed password for invalid user xk from 142.93.26.245 port 60394 ssh2
Dec 21 03:05:56 hanapaa sshd\[4980\]: Invalid user ident from 142.93.26.245
Dec 21 03:05:56 hanapaa sshd\[4980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-12-21 21:08:46
attackspambots
Dec 17 16:50:33 vps691689 sshd[7956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Dec 17 16:50:36 vps691689 sshd[7956]: Failed password for invalid user liesel from 142.93.26.245 port 55640 ssh2
...
2019-12-18 03:53:06
attack
Dec 17 07:21:18 web8 sshd\[30136\]: Invalid user ftp from 142.93.26.245
Dec 17 07:21:18 web8 sshd\[30136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Dec 17 07:21:19 web8 sshd\[30136\]: Failed password for invalid user ftp from 142.93.26.245 port 39360 ssh2
Dec 17 07:26:38 web8 sshd\[363\]: Invalid user janith from 142.93.26.245
Dec 17 07:26:38 web8 sshd\[363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-12-17 15:38:00
attackspambots
Dec  4 15:49:06 webhost01 sshd[27047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Dec  4 15:49:08 webhost01 sshd[27047]: Failed password for invalid user com from 142.93.26.245 port 38382 ssh2
...
2019-12-04 18:34:03
attack
Nov 27 11:59:51 vibhu-HP-Z238-Microtower-Workstation sshd\[15874\]: Invalid user bergfried from 142.93.26.245
Nov 27 11:59:51 vibhu-HP-Z238-Microtower-Workstation sshd\[15874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Nov 27 11:59:53 vibhu-HP-Z238-Microtower-Workstation sshd\[15874\]: Failed password for invalid user bergfried from 142.93.26.245 port 37346 ssh2
Nov 27 12:06:06 vibhu-HP-Z238-Microtower-Workstation sshd\[16135\]: Invalid user ssh from 142.93.26.245
Nov 27 12:06:06 vibhu-HP-Z238-Microtower-Workstation sshd\[16135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
...
2019-11-27 15:00:37
attack
$f2bV_matches
2019-11-26 21:54:57
attack
Nov 21 05:21:50 php1 sshd\[9216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245  user=root
Nov 21 05:21:52 php1 sshd\[9216\]: Failed password for root from 142.93.26.245 port 44656 ssh2
Nov 21 05:25:39 php1 sshd\[9547\]: Invalid user ulva from 142.93.26.245
Nov 21 05:25:39 php1 sshd\[9547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Nov 21 05:25:42 php1 sshd\[9547\]: Failed password for invalid user ulva from 142.93.26.245 port 51938 ssh2
2019-11-21 23:32:00
attack
Nov 18 19:02:27 sd-53420 sshd\[32516\]: User root from 142.93.26.245 not allowed because none of user's groups are listed in AllowGroups
Nov 18 19:02:27 sd-53420 sshd\[32516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245  user=root
Nov 18 19:02:28 sd-53420 sshd\[32516\]: Failed password for invalid user root from 142.93.26.245 port 40218 ssh2
Nov 18 19:07:48 sd-53420 sshd\[1625\]: Invalid user nisiwaki from 142.93.26.245
Nov 18 19:07:48 sd-53420 sshd\[1625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
...
2019-11-19 02:18:20
attackspam
Nov  7 05:35:22 game-panel sshd[31691]: Failed password for root from 142.93.26.245 port 51532 ssh2
Nov  7 05:41:09 game-panel sshd[31936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Nov  7 05:41:10 game-panel sshd[31936]: Failed password for invalid user gast from 142.93.26.245 port 60658 ssh2
2019-11-07 13:57:11
attackspam
Nov  6 13:59:09 tdfoods sshd\[28733\]: Invalid user kmz from 142.93.26.245
Nov  6 13:59:09 tdfoods sshd\[28733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Nov  6 13:59:11 tdfoods sshd\[28733\]: Failed password for invalid user kmz from 142.93.26.245 port 33064 ssh2
Nov  6 14:04:52 tdfoods sshd\[29178\]: Invalid user headteacher from 142.93.26.245
Nov  6 14:04:52 tdfoods sshd\[29178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-11-07 08:37:58
attackbots
Nov  1 06:06:56 mail sshd\[5301\]: Invalid user User from 142.93.26.245
Nov  1 06:06:56 mail sshd\[5301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
...
2019-11-01 19:09:59
attackspam
Oct 22 13:16:44 cp sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-10-22 19:41:56
attack
Oct 13 07:36:51 pkdns2 sshd\[4806\]: Invalid user Play@123 from 142.93.26.245Oct 13 07:36:54 pkdns2 sshd\[4806\]: Failed password for invalid user Play@123 from 142.93.26.245 port 55258 ssh2Oct 13 07:41:02 pkdns2 sshd\[5019\]: Invalid user 123Man from 142.93.26.245Oct 13 07:41:04 pkdns2 sshd\[5019\]: Failed password for invalid user 123Man from 142.93.26.245 port 37958 ssh2Oct 13 07:45:24 pkdns2 sshd\[5195\]: Invalid user Bemvinda123 from 142.93.26.245Oct 13 07:45:25 pkdns2 sshd\[5195\]: Failed password for invalid user Bemvinda123 from 142.93.26.245 port 48890 ssh2
...
2019-10-13 14:21:06
attackbotsspam
Oct  6 15:09:41 *** sshd[29752]: User root from 142.93.26.245 not allowed because not listed in AllowUsers
2019-10-07 01:35:07
attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-10-03 18:26:24
attackbotsspam
Oct  2 08:45:32 localhost sshd\[14071\]: Invalid user user4 from 142.93.26.245 port 35798
Oct  2 08:45:32 localhost sshd\[14071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Oct  2 08:45:34 localhost sshd\[14071\]: Failed password for invalid user user4 from 142.93.26.245 port 35798 ssh2
2019-10-02 15:05:32
attackspambots
Sep 22 18:45:38 sachi sshd\[28249\]: Invalid user cyrille from 142.93.26.245
Sep 22 18:45:38 sachi sshd\[28249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Sep 22 18:45:40 sachi sshd\[28249\]: Failed password for invalid user cyrille from 142.93.26.245 port 37486 ssh2
Sep 22 18:50:08 sachi sshd\[28643\]: Invalid user cy from 142.93.26.245
Sep 22 18:50:08 sachi sshd\[28643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-09-23 12:56:50
attack
Sep 21 11:43:54 server sshd\[21861\]: Invalid user wn from 142.93.26.245 port 35680
Sep 21 11:43:54 server sshd\[21861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Sep 21 11:43:56 server sshd\[21861\]: Failed password for invalid user wn from 142.93.26.245 port 35680 ssh2
Sep 21 11:48:20 server sshd\[3903\]: Invalid user hypass from 142.93.26.245 port 47944
Sep 21 11:48:20 server sshd\[3903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-09-21 19:05:09
attackspam
2019-08-31T11:30:40.163155enmeeting.mahidol.ac.th sshd\[28674\]: Invalid user xiaojie from 142.93.26.245 port 44526
2019-08-31T11:30:40.182123enmeeting.mahidol.ac.th sshd\[28674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-08-31T11:30:42.492514enmeeting.mahidol.ac.th sshd\[28674\]: Failed password for invalid user xiaojie from 142.93.26.245 port 44526 ssh2
...
2019-08-31 12:42:03
attack
Aug 27 17:31:28 OPSO sshd\[24882\]: Invalid user persil from 142.93.26.245 port 32934
Aug 27 17:31:28 OPSO sshd\[24882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Aug 27 17:31:30 OPSO sshd\[24882\]: Failed password for invalid user persil from 142.93.26.245 port 32934 ssh2
Aug 27 17:35:56 OPSO sshd\[25644\]: Invalid user shoutcast from 142.93.26.245 port 49708
Aug 27 17:35:56 OPSO sshd\[25644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-08-28 02:09:41
attackbots
Invalid user oracle from 142.93.26.245 port 60486
2019-08-23 17:10:51
attack
Aug 22 08:47:09 MK-Soft-VM3 sshd\[5413\]: Invalid user ts3 from 142.93.26.245 port 56160
Aug 22 08:47:09 MK-Soft-VM3 sshd\[5413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Aug 22 08:47:11 MK-Soft-VM3 sshd\[5413\]: Failed password for invalid user ts3 from 142.93.26.245 port 56160 ssh2
...
2019-08-22 17:42:13
attackbotsspam
Aug 20 00:39:47 vps200512 sshd\[26709\]: Invalid user testbox from 142.93.26.245
Aug 20 00:39:47 vps200512 sshd\[26709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Aug 20 00:39:49 vps200512 sshd\[26709\]: Failed password for invalid user testbox from 142.93.26.245 port 38752 ssh2
Aug 20 00:43:59 vps200512 sshd\[26833\]: Invalid user tony from 142.93.26.245
Aug 20 00:43:59 vps200512 sshd\[26833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-08-20 12:49:53
attackspambots
Aug 14 19:40:41 v22019058497090703 sshd[29816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Aug 14 19:40:43 v22019058497090703 sshd[29816]: Failed password for invalid user topgui from 142.93.26.245 port 51262 ssh2
Aug 14 19:45:02 v22019058497090703 sshd[30105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
...
2019-08-15 02:27:36
attackbots
Aug  6 03:37:50 xeon sshd[59453]: Failed password for invalid user support from 142.93.26.245 port 39834 ssh2
2019-08-06 16:44:01
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.26.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58994
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.26.245.			IN	A

;; AUTHORITY SECTION:
.			3032	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061301 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 14 03:09:31 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 245.26.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 245.26.93.142.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.111.0.245 attackbotsspam
Nov 28 05:51:01 mail sshd[2668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.111.0.245 
Nov 28 05:51:03 mail sshd[2668]: Failed password for invalid user xxxxxxx from 112.111.0.245 port 63973 ssh2
Nov 28 05:54:57 mail sshd[4111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.111.0.245
2019-11-28 13:59:41
148.72.23.181 attackspambots
148.72.23.181 - - \[28/Nov/2019:04:56:44 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
148.72.23.181 - - \[28/Nov/2019:04:56:45 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-28 14:13:19
190.196.41.112 attackspam
Port 22 Scan, PTR: PTR record not found
2019-11-28 13:43:09
182.61.54.213 attackspambots
Nov 28 06:36:13 ns37 sshd[12881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213
Nov 28 06:36:13 ns37 sshd[12881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213
2019-11-28 13:36:22
176.94.251.88 attack
RDP Brute Force attempt, PTR: None
2019-11-28 14:08:30
183.80.212.169 attackspam
Unauthorised access (Nov 28) SRC=183.80.212.169 LEN=52 TTL=109 ID=23112 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=183.80.212.169 LEN=52 TTL=109 ID=20301 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=183.80.212.169 LEN=52 TTL=109 ID=1057 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-28 13:57:41
37.122.208.69 attack
spam FO
2019-11-28 14:03:05
223.11.158.211 attack
3389BruteforceFW23
2019-11-28 13:33:57
222.186.175.181 attack
Nov 28 06:54:22 mail sshd\[21500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
Nov 28 06:54:24 mail sshd\[21500\]: Failed password for root from 222.186.175.181 port 26749 ssh2
Nov 28 06:54:41 mail sshd\[21502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
...
2019-11-28 13:54:50
52.38.214.62 attackbotsspam
B: Abusive content scan (301)
2019-11-28 13:54:20
49.232.4.101 attackbotsspam
Nov 28 06:11:07 srv01 sshd[29063]: Invalid user nevie from 49.232.4.101 port 35696
Nov 28 06:11:07 srv01 sshd[29063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.4.101
Nov 28 06:11:07 srv01 sshd[29063]: Invalid user nevie from 49.232.4.101 port 35696
Nov 28 06:11:09 srv01 sshd[29063]: Failed password for invalid user nevie from 49.232.4.101 port 35696 ssh2
Nov 28 06:15:47 srv01 sshd[29323]: Invalid user Teuvo from 49.232.4.101 port 36730
...
2019-11-28 13:51:50
49.235.35.12 attackbots
Nov 28 06:27:57 localhost sshd\[17877\]: Invalid user stagiaire from 49.235.35.12
Nov 28 06:27:57 localhost sshd\[17877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.35.12
Nov 28 06:27:59 localhost sshd\[17877\]: Failed password for invalid user stagiaire from 49.235.35.12 port 45686 ssh2
Nov 28 06:32:22 localhost sshd\[18063\]: Invalid user test from 49.235.35.12
Nov 28 06:32:22 localhost sshd\[18063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.35.12
...
2019-11-28 13:33:04
81.133.189.239 attackspam
ssh failed login
2019-11-28 13:52:10
68.183.160.63 attackbots
2019-11-28T05:36:14.674086shield sshd\[26234\]: Invalid user frubencd from 68.183.160.63 port 60362
2019-11-28T05:36:14.678461shield sshd\[26234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-28T05:36:16.878293shield sshd\[26234\]: Failed password for invalid user frubencd from 68.183.160.63 port 60362 ssh2
2019-11-28T05:41:44.956200shield sshd\[26515\]: Invalid user cgleonr from 68.183.160.63 port 48002
2019-11-28T05:41:44.961241shield sshd\[26515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-28 13:42:20
159.203.32.174 attackspam
Nov 28 05:56:56 cvbnet sshd[9546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.32.174 
Nov 28 05:56:58 cvbnet sshd[9546]: Failed password for invalid user webserver from 159.203.32.174 port 32900 ssh2
...
2019-11-28 14:06:56

最近上报的IP列表

33.13.196.200 103.2.183.49 116.67.24.232 170.0.236.182
57.239.155.163 144.251.21.34 194.142.30.85 171.253.109.16
65.213.187.8 53.105.57.8 156.90.238.131 183.187.247.88
34.66.3.55 218.6.133.141 145.32.216.178 43.227.167.17
46.87.58.85 84.177.243.11 129.98.32.81 175.76.230.42