必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Alkmaar

省份(region): North Holland

国家(country): Netherlands

运营商(isp): KPN

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.141.50.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.141.50.142.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010502 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 10:30:49 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
142.50.141.193.in-addr.arpa domain name pointer static.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.50.141.193.in-addr.arpa	name = static.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.92 attackspambots
Mar 23 04:58:40 debian-2gb-nbg1-2 kernel: \[7195011.269698\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.92 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=37 ID=52333 PROTO=TCP SPT=51046 DPT=502 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-23 12:38:16
106.13.41.42 attackspambots
Mar 23 05:16:54 haigwepa sshd[17377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.42 
Mar 23 05:16:56 haigwepa sshd[17377]: Failed password for invalid user ishana from 106.13.41.42 port 42704 ssh2
...
2020-03-23 12:18:12
91.89.250.213 attackspambots
Mar 23 00:24:22 NPSTNNYC01T sshd[23818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.250.213
Mar 23 00:24:24 NPSTNNYC01T sshd[23818]: Failed password for invalid user dev from 91.89.250.213 port 41850 ssh2
Mar 23 00:29:42 NPSTNNYC01T sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.250.213
...
2020-03-23 12:37:53
117.50.96.239 attackspam
Mar 23 09:29:01 areeb-Workstation sshd[25059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.96.239 
Mar 23 09:29:03 areeb-Workstation sshd[25059]: Failed password for invalid user php from 117.50.96.239 port 50216 ssh2
...
2020-03-23 12:21:50
148.77.14.106 attackbots
Mar 23 02:34:02 rama sshd[156540]: Invalid user q2server from 148.77.14.106
Mar 23 02:34:05 rama sshd[156540]: Failed password for invalid user q2server from 148.77.14.106 port 46777 ssh2
Mar 23 02:34:05 rama sshd[156540]: Received disconnect from 148.77.14.106: 11: Bye Bye [preauth]
Mar 23 02:54:32 rama sshd[162524]: Invalid user ftpuser from 148.77.14.106
Mar 23 02:54:34 rama sshd[162524]: Failed password for invalid user ftpuser from 148.77.14.106 port 50772 ssh2
Mar 23 02:54:34 rama sshd[162524]: Received disconnect from 148.77.14.106: 11: Bye Bye [preauth]
Mar 23 02:59:02 rama sshd[163772]: Invalid user compose from 148.77.14.106
Mar 23 02:59:04 rama sshd[163772]: Failed password for invalid user compose from 148.77.14.106 port 53747 ssh2
Mar 23 02:59:04 rama sshd[163772]: Received disconnect from 148.77.14.106: 11: Bye Bye [preauth]
Mar 23 03:03:24 rama sshd[165046]: Invalid user manager from 148.77.14.106
Mar 23 03:03:26 rama sshd[165046]: Failed password for inv........
-------------------------------
2020-03-23 12:17:52
222.186.42.7 attackbots
Mar 23 05:39:39 dcd-gentoo sshd[11935]: User root from 222.186.42.7 not allowed because none of user's groups are listed in AllowGroups
Mar 23 05:39:43 dcd-gentoo sshd[11935]: error: PAM: Authentication failure for illegal user root from 222.186.42.7
Mar 23 05:39:39 dcd-gentoo sshd[11935]: User root from 222.186.42.7 not allowed because none of user's groups are listed in AllowGroups
Mar 23 05:39:43 dcd-gentoo sshd[11935]: error: PAM: Authentication failure for illegal user root from 222.186.42.7
Mar 23 05:39:39 dcd-gentoo sshd[11935]: User root from 222.186.42.7 not allowed because none of user's groups are listed in AllowGroups
Mar 23 05:39:43 dcd-gentoo sshd[11935]: error: PAM: Authentication failure for illegal user root from 222.186.42.7
Mar 23 05:39:43 dcd-gentoo sshd[11935]: Failed keyboard-interactive/pam for invalid user root from 222.186.42.7 port 41671 ssh2
...
2020-03-23 12:46:40
23.236.232.163 attackbotsspam
Automatic report - XMLRPC Attack
2020-03-23 12:34:58
178.62.248.61 attackbotsspam
2020-03-22T21:59:06.555230linuxbox-skyline sshd[92915]: Invalid user bt from 178.62.248.61 port 42048
...
2020-03-23 12:18:54
123.207.153.52 attack
Mar 23 04:16:24 mail sshd[2897]: Invalid user yakusa from 123.207.153.52
Mar 23 04:16:24 mail sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52
Mar 23 04:16:24 mail sshd[2897]: Invalid user yakusa from 123.207.153.52
Mar 23 04:16:27 mail sshd[2897]: Failed password for invalid user yakusa from 123.207.153.52 port 37040 ssh2
Mar 23 04:58:24 mail sshd[8271]: Invalid user idkadm from 123.207.153.52
...
2020-03-23 12:50:58
185.171.24.43 attackspam
Brute force attempt
2020-03-23 12:33:19
159.89.163.226 attackbots
Mar 23 05:27:42 meumeu sshd[29270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.163.226 
Mar 23 05:27:44 meumeu sshd[29270]: Failed password for invalid user tho from 159.89.163.226 port 38662 ssh2
Mar 23 05:31:58 meumeu sshd[29796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.163.226 
...
2020-03-23 12:44:29
139.198.190.182 attackspambots
Mar 23 05:20:17 localhost sshd\[19575\]: Invalid user maeko from 139.198.190.182 port 37023
Mar 23 05:20:17 localhost sshd\[19575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.190.182
Mar 23 05:20:19 localhost sshd\[19575\]: Failed password for invalid user maeko from 139.198.190.182 port 37023 ssh2
2020-03-23 12:25:24
144.217.214.13 attack
Brute-force attempt banned
2020-03-23 12:40:08
138.197.98.251 attackbots
Mar 23 04:58:12 sso sshd[19073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.98.251
Mar 23 04:58:14 sso sshd[19073]: Failed password for invalid user grandma from 138.197.98.251 port 45436 ssh2
...
2020-03-23 13:00:49
185.151.242.186 attackspam
Port Scanning Detected
2020-03-23 12:23:04

最近上报的IP列表

230.88.46.151 61.170.229.71 54.37.148.20 122.29.196.130
178.211.45.214 31.86.238.113 82.141.129.110 39.66.150.143
40.60.252.212 243.9.55.78 135.107.37.111 161.84.107.217
143.136.37.138 27.192.31.145 240.234.89.236 109.250.100.210
238.155.166.194 60.250.239.188 198.250.178.96 1.174.78.1