必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
192.168.31.240 proxy
三江源兰州牛肉面
2025-12-08 17:34:25
192.168.31.240 proxy
三江源兰州牛肉面
2025-12-08 17:34:11
192.168.31.240 proxy
三江源兰州牛肉面
2025-12-08 17:34:00
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.168.31.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.168.31.142.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 03:44:18 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.31.168.192.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.31.168.192.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.74.248.218 attackbots
Dec 27 09:02:19 server sshd\[32433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218  user=dovecot
Dec 27 09:02:21 server sshd\[32433\]: Failed password for dovecot from 124.74.248.218 port 46095 ssh2
Dec 27 09:08:19 server sshd\[1044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218  user=sshd
Dec 27 09:08:21 server sshd\[1044\]: Failed password for sshd from 124.74.248.218 port 64059 ssh2
Dec 27 09:12:30 server sshd\[1918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218  user=apache
...
2019-12-27 14:26:46
132.232.93.48 attackbotsspam
Dec 26 20:26:35 web9 sshd\[17217\]: Invalid user go from 132.232.93.48
Dec 26 20:26:35 web9 sshd\[17217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.93.48
Dec 26 20:26:36 web9 sshd\[17217\]: Failed password for invalid user go from 132.232.93.48 port 52945 ssh2
Dec 26 20:30:05 web9 sshd\[17767\]: Invalid user sole from 132.232.93.48
Dec 26 20:30:05 web9 sshd\[17767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.93.48
2019-12-27 15:00:45
112.85.42.181 attackspam
$f2bV_matches
2019-12-27 15:04:02
186.67.248.5 attackspambots
Dec 27 06:24:51 web8 sshd\[17403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.5  user=root
Dec 27 06:24:53 web8 sshd\[17403\]: Failed password for root from 186.67.248.5 port 57389 ssh2
Dec 27 06:30:34 web8 sshd\[20265\]: Invalid user frazer from 186.67.248.5
Dec 27 06:30:34 web8 sshd\[20265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.5
Dec 27 06:30:36 web8 sshd\[20265\]: Failed password for invalid user frazer from 186.67.248.5 port 56527 ssh2
2019-12-27 14:49:42
218.92.0.135 attackspam
Dec 27 03:30:28 firewall sshd[29164]: Failed password for root from 218.92.0.135 port 23439 ssh2
Dec 27 03:30:28 firewall sshd[29164]: error: maximum authentication attempts exceeded for root from 218.92.0.135 port 23439 ssh2 [preauth]
Dec 27 03:30:28 firewall sshd[29164]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-27 14:46:58
61.50.149.68 attackbots
CN China - Failures: 5 smtpauth
2019-12-27 15:07:55
200.146.232.97 attackspam
Dec 27 06:24:42 pi sshd\[17035\]: Invalid user delois from 200.146.232.97 port 56371
Dec 27 06:24:42 pi sshd\[17035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
Dec 27 06:24:43 pi sshd\[17035\]: Failed password for invalid user delois from 200.146.232.97 port 56371 ssh2
Dec 27 06:30:08 pi sshd\[17230\]: Invalid user passwd222 from 200.146.232.97 port 41882
Dec 27 06:30:08 pi sshd\[17230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
...
2019-12-27 14:57:59
67.214.93.202 attackbots
SSH invalid-user multiple login try
2019-12-27 15:11:56
37.145.177.163 attackspam
Unauthorized connection attempt from IP address 37.145.177.163 on Port 445(SMB)
2019-12-27 15:12:57
45.93.20.156 attack
firewall-block, port(s): 27973/tcp
2019-12-27 15:09:30
14.190.134.206 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-12-2019 04:55:09.
2019-12-27 14:29:17
151.80.61.103 attackspam
Dec 27 13:27:10 itv-usvr-02 sshd[23435]: Invalid user rx from 151.80.61.103 port 37674
Dec 27 13:27:10 itv-usvr-02 sshd[23435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.61.103
Dec 27 13:27:10 itv-usvr-02 sshd[23435]: Invalid user rx from 151.80.61.103 port 37674
Dec 27 13:27:12 itv-usvr-02 sshd[23435]: Failed password for invalid user rx from 151.80.61.103 port 37674 ssh2
Dec 27 13:29:58 itv-usvr-02 sshd[23455]: Invalid user server from 151.80.61.103 port 42238
2019-12-27 15:16:28
104.103.101.75 attackbotsspam
firewall-block, port(s): 52285/tcp, 53632/tcp, 56274/tcp, 56275/tcp, 56281/tcp, 56286/tcp, 57117/tcp, 57804/tcp, 58013/tcp, 58504/tcp, 58505/tcp, 58508/tcp, 58817/tcp, 58839/tcp, 59229/tcp, 61255/tcp, 61256/tcp, 61259/tcp, 61263/tcp, 61275/tcp, 62454/tcp, 62472/tcp, 62477/tcp, 62482/tcp, 62483/tcp, 62484/tcp, 62485/tcp, 62486/tcp, 62753/tcp, 62819/tcp, 63105/tcp, 63387/tcp, 63900/tcp, 63995/tcp, 63996/tcp
2019-12-27 15:12:28
106.12.176.17 attackspambots
Dec 27 07:20:52 xeon sshd[57259]: Failed password for invalid user vonno from 106.12.176.17 port 51510 ssh2
2019-12-27 15:11:29
124.118.129.5 attack
Automatic report - SSH Brute-Force Attack
2019-12-27 14:52:00

最近上报的IP列表

225.199.172.133 217.116.55.251 231.65.172.86 254.64.1.130
44.24.22.65 40.142.247.23 249.220.202.85 64.75.101.181
48.126.64.212 198.159.47.186 240.149.71.170 26.175.125.162
82.159.207.199 156.88.45.38 148.224.60.211 174.62.183.234
240.199.21.238 97.7.156.138 103.17.36.127 195.70.221.162