必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.242.243.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.242.243.143.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:09:32 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 143.243.242.160.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.243.242.160.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.38.144.179 attackbotsspam
2019-10-30T18:23:38.080376mail01 postfix/smtpd[17560]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T18:24:24.023828mail01 postfix/smtpd[2601]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T18:24:25.024040mail01 postfix/smtpd[2602]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31 01:33:26
103.82.235.10 attack
"POST /FCKeditor/editor/filemanager/connectors/asp/connector.asp?Command=FileUpload&Type=File&CurrentFolder=%2F HTTP/1.1" 404
"POST /admin_aspcms/_system/AspCms_SiteSetting.asp HTTP/1.1" 404
"POST /plus/90sec.php HTTP/1.1" 404
"POST /utility/convert/index.php?a=config&source=d7.2_x2.0 HTTP/1.1" 404
"POST /utility/convert/data/config.inc.php HTTP/1.1" 404
"POST /uploads/dede/sys_verifies.php?action=down HTTP/1.1" 404
"POST /index.php/api/Uploadify/preview HTTP/1.1" 404
"POST /fdgq.php HTTP/1.1" 404
"POST /xbodk.php HTTP/1.1" 404
"POST /ysyqq.php HTTP/1.1" 404
2019-10-31 01:26:07
200.69.236.112 attackbots
2019-10-30T17:05:48.789940shield sshd\[27818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112  user=root
2019-10-30T17:05:50.343663shield sshd\[27818\]: Failed password for root from 200.69.236.112 port 55180 ssh2
2019-10-30T17:10:52.870529shield sshd\[28697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112  user=root
2019-10-30T17:10:54.158217shield sshd\[28697\]: Failed password for root from 200.69.236.112 port 46997 ssh2
2019-10-30T17:15:43.570968shield sshd\[29431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.112  user=root
2019-10-31 01:23:17
118.126.88.207 attackbotsspam
WordPress attack, tries to access /?xxnew2018_url2=x&xxnew2018_url1=x
2019-10-31 01:06:44
165.227.66.215 attack
2019-10-29T11:56:25.361776ts3.arvenenaske.de sshd[15545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.215  user=r.r
2019-10-29T11:56:27.324538ts3.arvenenaske.de sshd[15545]: Failed password for r.r from 165.227.66.215 port 35816 ssh2
2019-10-29T12:00:13.003981ts3.arvenenaske.de sshd[15643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.215  user=r.r
2019-10-29T12:00:15.127627ts3.arvenenaske.de sshd[15643]: Failed password for r.r from 165.227.66.215 port 49244 ssh2
2019-10-29T12:04:04.989934ts3.arvenenaske.de sshd[15653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.215  user=r.r
2019-10-29T12:04:06.962021ts3.arvenenaske.de sshd[15653]: Failed password for r.r from 165.227.66.215 port 34436 ssh2
2019-10-29T12:08:03.370431ts3.arvenenaske.de sshd[15658]: Invalid user marcos from 165.227.66.215 port 47872
2019-10-2........
------------------------------
2019-10-31 01:15:20
213.6.89.18 attackspam
port scan and connect, tcp 23 (telnet)
2019-10-31 00:59:47
85.75.88.168 attackspam
Automatic report - XMLRPC Attack
2019-10-31 01:24:10
50.35.30.243 attack
SSHAttack
2019-10-31 01:44:02
118.244.196.123 attackbots
Oct 30 15:50:33 sd-53420 sshd\[1305\]: Invalid user abbadi from 118.244.196.123
Oct 30 15:50:33 sd-53420 sshd\[1305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.196.123
Oct 30 15:50:35 sd-53420 sshd\[1305\]: Failed password for invalid user abbadi from 118.244.196.123 port 33510 ssh2
Oct 30 15:56:13 sd-53420 sshd\[1710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.196.123  user=root
Oct 30 15:56:15 sd-53420 sshd\[1710\]: Failed password for root from 118.244.196.123 port 34238 ssh2
...
2019-10-31 01:41:49
45.136.110.47 attackbots
Oct 30 15:32:53 h2177944 kernel: \[5321715.802565\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.47 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=37512 PROTO=TCP SPT=48368 DPT=7709 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 30 15:33:12 h2177944 kernel: \[5321734.927479\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.47 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=5322 PROTO=TCP SPT=48368 DPT=7137 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 30 15:42:51 h2177944 kernel: \[5322313.931056\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.47 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=41193 PROTO=TCP SPT=48368 DPT=8117 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 30 15:54:39 h2177944 kernel: \[5323021.898462\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.47 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=11402 PROTO=TCP SPT=48368 DPT=7225 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 30 16:16:15 h2177944 kernel: \[5324317.687129\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.47 DST=85.214.117.9
2019-10-31 01:00:55
182.61.181.138 attackbots
Oct 30 12:48:21 anodpoucpklekan sshd[73551]: Invalid user bugraerguven from 182.61.181.138 port 37220
...
2019-10-31 01:32:18
151.248.114.68 attackbots
Oct 29 14:42:46 mx01 sshd[19492]: Invalid user ftp_user from 151.248.114.68
Oct 29 14:42:46 mx01 sshd[19492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151-248-114-68.cloudvps.regruhosting.ru 
Oct 29 14:42:48 mx01 sshd[19492]: Failed password for invalid user ftp_user from 151.248.114.68 port 54832 ssh2
Oct 29 14:42:48 mx01 sshd[19492]: Received disconnect from 151.248.114.68: 11: Bye Bye [preauth]
Oct 29 14:47:59 mx01 sshd[20163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151-248-114-68.cloudvps.regruhosting.ru  user=r.r
Oct 29 14:48:01 mx01 sshd[20163]: Failed password for r.r from 151.248.114.68 port 44672 ssh2
Oct 29 14:48:01 mx01 sshd[20163]: Received disconnect from 151.248.114.68: 11: Bye Bye [preauth]
Oct 29 14:51:58 mx01 sshd[20511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151-248-114-68.cloudvps.regruhosting.ru  user=r.r
O........
-------------------------------
2019-10-31 01:22:50
159.89.160.91 attackspambots
Invalid user vs from 159.89.160.91 port 34982
2019-10-31 01:45:13
106.13.56.72 attackspambots
Oct 30 16:58:47 localhost sshd\[18679\]: Invalid user administrator from 106.13.56.72 port 39842
Oct 30 16:58:47 localhost sshd\[18679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.72
Oct 30 16:58:49 localhost sshd\[18679\]: Failed password for invalid user administrator from 106.13.56.72 port 39842 ssh2
Oct 30 17:03:32 localhost sshd\[18793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.72  user=root
Oct 30 17:03:34 localhost sshd\[18793\]: Failed password for root from 106.13.56.72 port 46992 ssh2
...
2019-10-31 01:14:08
113.125.41.217 attack
Automatic report - Banned IP Access
2019-10-31 01:19:57

最近上报的IP列表

87.71.119.224 62.253.57.57 82.166.133.145 232.129.123.226
22.183.103.251 32.207.218.190 78.125.145.201 126.247.182.30
72.21.153.145 207.63.122.253 165.218.136.249 154.80.255.180
62.224.178.129 209.32.205.133 190.166.165.158 122.40.63.14
94.94.225.92 228.57.136.1 130.246.26.20 148.46.28.151