必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.27.164.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.27.164.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:18:13 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
142.164.27.161.in-addr.arpa domain name pointer host-161-27-164-142.net.psmidc.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.164.27.161.in-addr.arpa	name = host-161-27-164-142.net.psmidc.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.48.211.160 attack
Spam Timestamp : 06-Aug-19 11:22 _ BlockList Provider  combined abuse _ (657)
2019-08-07 04:46:46
86.49.81.10 attackbots
ZyXEL P660HN ADSL Router viewlog.asp command injection attempt
2019-08-07 04:27:25
84.39.178.242 attackbots
Automatic report - Port Scan Attack
2019-08-07 04:48:29
118.70.215.62 attack
Aug  6 14:50:57 localhost sshd\[13395\]: Invalid user kshaheen from 118.70.215.62 port 53404
Aug  6 14:50:57 localhost sshd\[13395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.215.62
Aug  6 14:50:59 localhost sshd\[13395\]: Failed password for invalid user kshaheen from 118.70.215.62 port 53404 ssh2
2019-08-07 04:28:15
159.65.39.83 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-08-07 04:18:29
14.186.117.98 attackspambots
Apr 18 11:27:46 motanud sshd\[30926\]: Invalid user sshvpn from 14.186.117.98 port 36986
Apr 18 11:27:46 motanud sshd\[30926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.117.98
Apr 18 11:27:48 motanud sshd\[30926\]: Failed password for invalid user sshvpn from 14.186.117.98 port 36986 ssh2
2019-08-07 04:16:42
92.118.37.74 attackbotsspam
Aug  6 20:14:02 mail kernel: [204068.809682] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=46519 PROTO=TCP SPT=46525 DPT=47008 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug  6 20:17:48 mail kernel: [204295.401102] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3920 PROTO=TCP SPT=46525 DPT=46721 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug  6 20:18:52 mail kernel: [204359.423536] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=60123 PROTO=TCP SPT=46525 DPT=58708 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug  6 20:19:55 mail kernel: [204421.848954] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=24771 PROTO=TCP SPT=46525 DPT=48715 WINDOW=1024 RES=0x00 SYN URGP=
2019-08-07 04:43:59
69.94.140.109 attack
Non-stop spam.
2019-08-07 04:47:40
179.33.137.117 attackspam
Aug  6 17:36:28 thevastnessof sshd[10861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117
...
2019-08-07 04:51:10
113.14.236.25 attackspambots
Aug  6 12:44:50 xxxxxxx0 sshd[1289]: Invalid user admin from 113.14.236.25 port 36065
Aug  6 12:44:50 xxxxxxx0 sshd[1289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.14.236.25
Aug  6 12:44:52 xxxxxxx0 sshd[1289]: Failed password for invalid user admin from 113.14.236.25 port 36065 ssh2
Aug  6 12:44:54 xxxxxxx0 sshd[1289]: Failed password for invalid user admin from 113.14.236.25 port 36065 ssh2
Aug  6 12:44:57 xxxxxxx0 sshd[1289]: Failed password for invalid user admin from 113.14.236.25 port 36065 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.14.236.25
2019-08-07 04:21:28
118.25.153.73 attackspam
Aug  6 19:42:28 srv-4 sshd\[10003\]: Invalid user er from 118.25.153.73
Aug  6 19:42:28 srv-4 sshd\[10003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.153.73
Aug  6 19:42:30 srv-4 sshd\[10003\]: Failed password for invalid user er from 118.25.153.73 port 42352 ssh2
...
2019-08-07 04:50:25
148.251.70.179 attack
Automatic report - Banned IP Access
2019-08-07 05:07:20
117.85.158.229 attack
Aug  6 11:12:26   DDOS Attack: SRC=117.85.158.229 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=51  DF PROTO=TCP SPT=26547 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-07 04:15:09
52.82.91.92 attackbots
Aug  6 12:27:19 l01 sshd[966070]: Invalid user cs-go from 52.82.91.92
Aug  6 12:27:19 l01 sshd[966070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-82-91-92.cn-northwest-1.compute.amazonaws.com.cn 
Aug  6 12:27:20 l01 sshd[966070]: Failed password for invalid user cs-go from 52.82.91.92 port 49384 ssh2
Aug  6 12:35:34 l01 sshd[967648]: Invalid user pumch from 52.82.91.92
Aug  6 12:35:34 l01 sshd[967648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-82-91-92.cn-northwest-1.compute.amazonaws.com.cn 
Aug  6 12:35:36 l01 sshd[967648]: Failed password for invalid user pumch from 52.82.91.92 port 52976 ssh2
Aug  6 12:38:08 l01 sshd[968196]: Did not receive identification string from 52.82.91.92
Aug  6 12:43:48 l01 sshd[969251]: Invalid user mak from 52.82.91.92
Aug  6 12:43:48 l01 sshd[969251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r........
-------------------------------
2019-08-07 04:38:10
121.157.207.225 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-07 04:27:59

最近上报的IP列表

21.223.103.230 226.114.120.164 146.188.154.155 92.227.252.116
15.22.69.153 12.253.24.151 72.203.190.185 186.226.11.95
149.231.30.105 206.89.200.48 12.241.73.22 155.132.2.218
28.63.66.233 133.171.119.180 225.98.124.215 8.99.100.52
226.242.167.181 217.79.113.84 120.13.11.65 187.21.31.54