必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.153.182.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.153.182.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:16:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
42.182.153.144.in-addr.arpa domain name pointer nothing.attdns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.182.153.144.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.242.151.117 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-07 14:22:21
197.3.7.157 attackspam
SSH brute force
2019-08-07 13:14:13
149.56.142.220 attack
Aug  7 06:53:03 herz-der-gamer sshd[2728]: Invalid user wuhao from 149.56.142.220 port 43816
Aug  7 06:53:03 herz-der-gamer sshd[2728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.142.220
Aug  7 06:53:03 herz-der-gamer sshd[2728]: Invalid user wuhao from 149.56.142.220 port 43816
Aug  7 06:53:05 herz-der-gamer sshd[2728]: Failed password for invalid user wuhao from 149.56.142.220 port 43816 ssh2
...
2019-08-07 13:49:31
36.85.49.173 attackspambots
(user.class.php:1128) x@x
(user.class.php:1128) x@x
(user.class.php:1128) x@x
(user.class.php:1128) x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=36.85.49.173
2019-08-07 13:42:39
177.130.139.46 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-07 14:20:16
58.47.177.160 attackspambots
SSH Brute-Forcing (ownc)
2019-08-07 14:04:01
192.99.77.3 attackspambots
False survey spam! - avoid this rubbish sent from shelly@oursergoodhe.info
2019-08-07 13:52:14
115.138.187.29 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-07 13:11:24
113.164.244.98 attackspambots
Aug  7 06:43:15 debian sshd\[312\]: Invalid user kathe from 113.164.244.98 port 38472
Aug  7 06:43:15 debian sshd\[312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.164.244.98
...
2019-08-07 14:14:57
111.250.155.124 attackbotsspam
Telnetd brute force attack detected by fail2ban
2019-08-07 14:05:35
136.32.90.234 attack
Lines containing failures of 136.32.90.234
Aug  6 23:23:32 myhost sshd[14682]: Bad protocol version identification '' from 136.32.90.234 port 52416
Aug  6 23:23:41 myhost sshd[14683]: Invalid user openhabian from 136.32.90.234 port 52538
Aug  6 23:23:41 myhost sshd[14683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.32.90.234
Aug  6 23:23:44 myhost sshd[14683]: Failed password for invalid user openhabian from 136.32.90.234 port 52538 ssh2
Aug  6 23:23:44 myhost sshd[14683]: Connection closed by invalid user openhabian 136.32.90.234 port 52538 [preauth]
Aug  6 23:23:54 myhost sshd[14685]: Invalid user support from 136.32.90.234 port 53815
Aug  6 23:23:54 myhost sshd[14685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.32.90.234


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=136.32.90.234
2019-08-07 13:54:48
188.166.115.226 attackspam
Aug  6 21:50:05 debian sshd\[27287\]: Invalid user martin from 188.166.115.226 port 35130
Aug  6 21:50:05 debian sshd\[27287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.115.226
Aug  6 21:50:07 debian sshd\[27287\]: Failed password for invalid user martin from 188.166.115.226 port 35130 ssh2
...
2019-08-07 14:23:37
166.62.45.39 attackspam
Automatic report - Banned IP Access
2019-08-07 13:55:50
132.232.1.62 attackspambots
2019-08-07T05:06:06.064746centos sshd\[29196\]: Invalid user gb from 132.232.1.62 port 42192
2019-08-07T05:06:06.070724centos sshd\[29196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.62
2019-08-07T05:06:08.309528centos sshd\[29196\]: Failed password for invalid user gb from 132.232.1.62 port 42192 ssh2
2019-08-07 13:10:48
36.34.54.16 attackbotsspam
Unauthorised access (Aug  7) SRC=36.34.54.16 LEN=40 TTL=48 ID=15692 TCP DPT=8080 WINDOW=33509 SYN
2019-08-07 13:43:40

最近上报的IP列表

63.88.145.136 221.195.121.177 156.23.3.23 51.89.43.196
51.55.1.61 181.242.254.182 237.8.182.107 160.31.237.38
79.212.65.76 168.242.201.210 9.160.66.0 52.27.202.103
200.115.177.221 100.207.131.0 75.120.222.155 239.120.148.72
123.10.191.89 74.33.28.93 134.46.92.115 108.80.173.112