必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.140.42.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.140.42.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:00:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 150.42.140.143.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 143.140.42.150.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.150.189 attack
5x Failed Password
2019-11-09 16:19:28
168.0.124.26 attack
Port Scan 1433
2019-11-09 15:58:47
67.213.69.94 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-09 16:02:32
199.204.250.206 attackspam
xmlrpc attack
2019-11-09 15:40:26
83.110.200.239 attackbotsspam
Caught in portsentry honeypot
2019-11-09 16:13:22
45.55.41.98 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 16:03:24
200.54.255.253 attackbots
Nov  9 07:23:35 serwer sshd\[13418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.255.253  user=root
Nov  9 07:23:36 serwer sshd\[13418\]: Failed password for root from 200.54.255.253 port 45934 ssh2
Nov  9 07:28:02 serwer sshd\[13853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.255.253  user=admin
...
2019-11-09 16:02:46
5.135.179.178 attack
Nov  9 08:55:55 localhost sshd\[16798\]: Invalid user changeme from 5.135.179.178 port 29554
Nov  9 08:55:56 localhost sshd\[16798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.179.178
Nov  9 08:55:58 localhost sshd\[16798\]: Failed password for invalid user changeme from 5.135.179.178 port 29554 ssh2
2019-11-09 16:05:30
218.71.93.103 attackspam
Automatic report - Port Scan Attack
2019-11-09 16:09:22
49.206.167.243 attackbots
Nov  9 07:22:48 mxgate1 postfix/postscreen[27578]: CONNECT from [49.206.167.243]:10360 to [176.31.12.44]:25
Nov  9 07:22:48 mxgate1 postfix/dnsblog[27582]: addr 49.206.167.243 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  9 07:22:54 mxgate1 postfix/postscreen[27578]: DNSBL rank 2 for [49.206.167.243]:10360
Nov x@x
Nov  9 07:22:56 mxgate1 postfix/postscreen[27578]: HANGUP after 1.3 from [49.206.167.243]:10360 in tests after SMTP handshake
Nov  9 07:22:56 mxgate1 postfix/postscreen[27578]: DISCONNECT [49.206.167.243]:10360


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.206.167.243
2019-11-09 15:43:38
209.59.104.193 attack
Nov  9 08:34:54 vps647732 sshd[16228]: Failed password for root from 209.59.104.193 port 51712 ssh2
...
2019-11-09 15:40:39
107.161.91.53 attackspam
2019-11-09T07:17:08.275724hub.schaetter.us sshd\[7965\]: Invalid user edna from 107.161.91.53 port 55708
2019-11-09T07:17:08.285086hub.schaetter.us sshd\[7965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.anitech.xyz
2019-11-09T07:17:10.537222hub.schaetter.us sshd\[7965\]: Failed password for invalid user edna from 107.161.91.53 port 55708 ssh2
2019-11-09T07:20:49.400249hub.schaetter.us sshd\[7993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.anitech.xyz  user=root
2019-11-09T07:20:51.657721hub.schaetter.us sshd\[7993\]: Failed password for root from 107.161.91.53 port 39134 ssh2
...
2019-11-09 16:18:30
103.68.70.100 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-09 15:41:29
106.253.232.36 attackbotsspam
Automatic report - Port Scan Attack
2019-11-09 15:49:45
115.31.167.28 attackspambots
1433/tcp 445/tcp...
[2019-10-08/11-09]8pkt,2pt.(tcp)
2019-11-09 16:07:51

最近上报的IP列表

39.214.33.80 40.103.143.48 148.207.61.28 138.48.86.107
162.190.193.6 182.118.138.236 38.251.85.113 65.187.122.154
5.96.183.192 203.93.37.201 208.143.100.164 191.255.173.205
194.212.91.117 129.212.241.117 201.145.99.52 149.19.74.121
233.128.158.122 226.191.163.225 199.122.54.226 49.245.11.183