必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.213.42.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.213.42.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:10:56 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.42.213.143.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 143.213.42.142.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.237.53.252 attackspam
Aug 19 19:11:16 web8 sshd\[30714\]: Invalid user dell from 212.237.53.252
Aug 19 19:11:16 web8 sshd\[30714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.252
Aug 19 19:11:18 web8 sshd\[30714\]: Failed password for invalid user dell from 212.237.53.252 port 39618 ssh2
Aug 19 19:15:25 web8 sshd\[311\]: Invalid user mallorie from 212.237.53.252
Aug 19 19:15:25 web8 sshd\[311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.252
2019-08-20 03:18:19
104.236.31.227 attack
Aug 19 19:40:53 hcbbdb sshd\[9807\]: Invalid user brazil from 104.236.31.227
Aug 19 19:40:53 hcbbdb sshd\[9807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.31.227
Aug 19 19:40:55 hcbbdb sshd\[9807\]: Failed password for invalid user brazil from 104.236.31.227 port 36050 ssh2
Aug 19 19:46:17 hcbbdb sshd\[10398\]: Invalid user linux from 104.236.31.227
Aug 19 19:46:17 hcbbdb sshd\[10398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.31.227
2019-08-20 03:51:54
142.234.39.37 attack
08/19/2019-15:35:03.719184 142.234.39.37 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-20 03:36:03
45.76.222.255 attack
Aug 19 21:22:26 lnxweb61 sshd[25220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.222.255
Aug 19 21:22:26 lnxweb61 sshd[25220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.222.255
2019-08-20 03:43:20
36.91.24.27 attack
Apr 17 04:27:05 vtv3 sshd\[2588\]: Invalid user vyatta from 36.91.24.27 port 34810
Apr 17 04:27:05 vtv3 sshd\[2588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
Apr 17 04:27:07 vtv3 sshd\[2588\]: Failed password for invalid user vyatta from 36.91.24.27 port 34810 ssh2
Apr 17 04:35:02 vtv3 sshd\[6171\]: Invalid user carla from 36.91.24.27 port 56208
Apr 17 04:35:02 vtv3 sshd\[6171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
Apr 20 09:01:07 vtv3 sshd\[25953\]: Invalid user newuser from 36.91.24.27 port 54920
Apr 20 09:01:07 vtv3 sshd\[25953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
Apr 20 09:01:09 vtv3 sshd\[25953\]: Failed password for invalid user newuser from 36.91.24.27 port 54920 ssh2
Apr 20 09:08:56 vtv3 sshd\[29458\]: Invalid user dangerous from 36.91.24.27 port 48016
Apr 20 09:08:56 vtv3 sshd\[29458\]: pam_unix\(sshd:aut
2019-08-20 03:38:32
80.211.235.234 attack
Aug 19 21:22:43 localhost sshd\[24087\]: Invalid user chuck from 80.211.235.234 port 47609
Aug 19 21:22:43 localhost sshd\[24087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.235.234
Aug 19 21:22:45 localhost sshd\[24087\]: Failed password for invalid user chuck from 80.211.235.234 port 47609 ssh2
2019-08-20 03:28:38
42.247.22.66 attackspambots
Aug 19 20:59:03 plex sshd[16340]: Invalid user csgoserver from 42.247.22.66 port 53799
2019-08-20 03:19:38
80.82.70.239 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-20 03:23:35
200.89.159.112 attack
2019-08-19T19:15:41.169574abusebot-8.cloudsearch.cf sshd\[14052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112-159-89-200.fibertel.com.ar  user=root
2019-08-20 03:25:42
165.22.251.245 attack
Aug 19 21:36:11 cvbmail sshd\[4898\]: Invalid user phion from 165.22.251.245
Aug 19 21:36:11 cvbmail sshd\[4898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.245
Aug 19 21:36:13 cvbmail sshd\[4898\]: Failed password for invalid user phion from 165.22.251.245 port 44140 ssh2
2019-08-20 03:42:29
218.92.0.200 attack
2019-08-19T19:21:18.814615abusebot-6.cloudsearch.cf sshd\[2404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
2019-08-20 03:32:07
124.107.246.250 attackbotsspam
Aug 19 18:54:10 hb sshd\[28744\]: Invalid user Abcd1234 from 124.107.246.250
Aug 19 18:54:10 hb sshd\[28744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.107.246.250
Aug 19 18:54:13 hb sshd\[28744\]: Failed password for invalid user Abcd1234 from 124.107.246.250 port 13162 ssh2
Aug 19 18:59:07 hb sshd\[29174\]: Invalid user fns from 124.107.246.250
Aug 19 18:59:07 hb sshd\[29174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.107.246.250
2019-08-20 03:11:46
185.34.216.211 attack
Aug 19 21:42:04 legacy sshd[10492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.34.216.211
Aug 19 21:42:06 legacy sshd[10492]: Failed password for invalid user home from 185.34.216.211 port 54246 ssh2
Aug 19 21:46:16 legacy sshd[10586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.34.216.211
...
2019-08-20 03:57:49
124.156.181.66 attackspambots
Aug 19 20:54:19 legacy sshd[8940]: Failed password for root from 124.156.181.66 port 52568 ssh2
Aug 19 20:59:01 legacy sshd[9105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.181.66
Aug 19 20:59:02 legacy sshd[9105]: Failed password for invalid user test from 124.156.181.66 port 42530 ssh2
...
2019-08-20 03:14:50
121.239.53.98 attack
$f2bV_matches
2019-08-20 03:12:04

最近上报的IP列表

117.198.226.169 249.202.237.59 128.62.140.144 205.126.245.231
155.199.164.42 113.81.194.80 51.155.177.122 64.61.78.72
121.47.23.27 152.13.198.52 2.40.158.31 191.228.123.15
109.236.51.80 97.101.79.10 178.78.71.139 227.165.74.48
123.20.229.93 44.195.214.18 141.24.206.30 96.188.76.215