必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.161.142.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.161.142.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 01:38:18 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 16.142.161.2.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.142.161.2.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.71.86.88 attack
Sep 15 06:36:41 lanister sshd[2314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.86.88  user=root
Sep 15 06:36:43 lanister sshd[2314]: Failed password for root from 167.71.86.88 port 40546 ssh2
Sep 15 06:36:41 lanister sshd[2314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.86.88  user=root
Sep 15 06:36:43 lanister sshd[2314]: Failed password for root from 167.71.86.88 port 40546 ssh2
2020-09-15 18:36:50
1.10.246.179 attackbots
2020-09-15T11:33:08.809472ks3355764 sshd[17660]: Invalid user semenzato from 1.10.246.179 port 44586
2020-09-15T11:33:11.531599ks3355764 sshd[17660]: Failed password for invalid user semenzato from 1.10.246.179 port 44586 ssh2
...
2020-09-15 19:15:05
168.121.104.115 attack
Sep 15 08:25:20 raspberrypi sshd[19747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.104.115  user=root
Sep 15 08:25:22 raspberrypi sshd[19747]: Failed password for invalid user root from 168.121.104.115 port 16327 ssh2
...
2020-09-15 19:08:29
167.172.98.89 attack
(sshd) Failed SSH login from 167.172.98.89 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 06:19:14 optimus sshd[7517]: Invalid user pandavpnuser from 167.172.98.89
Sep 15 06:19:14 optimus sshd[7517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89 
Sep 15 06:19:16 optimus sshd[7517]: Failed password for invalid user pandavpnuser from 167.172.98.89 port 55152 ssh2
Sep 15 06:36:10 optimus sshd[13368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89  user=root
Sep 15 06:36:13 optimus sshd[13368]: Failed password for root from 167.172.98.89 port 50004 ssh2
2020-09-15 18:58:53
65.49.223.231 attackbotsspam
(sshd) Failed SSH login from 65.49.223.231 (US/United States/65.49.223.231.16clouds.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 01:11:54 server sshd[31956]: Failed password for root from 65.49.223.231 port 54326 ssh2
Sep 15 01:22:33 server sshd[2527]: Failed password for root from 65.49.223.231 port 47618 ssh2
Sep 15 01:32:05 server sshd[4829]: Invalid user jim from 65.49.223.231 port 60244
Sep 15 01:32:06 server sshd[4829]: Failed password for invalid user jim from 65.49.223.231 port 60244 ssh2
Sep 15 01:40:46 server sshd[7005]: Failed password for root from 65.49.223.231 port 44632 ssh2
2020-09-15 18:48:41
222.87.0.79 attackspambots
2020-09-15T09:01:34.053905abusebot-7.cloudsearch.cf sshd[24703]: Invalid user hansel from 222.87.0.79 port 44168
2020-09-15T09:01:34.058538abusebot-7.cloudsearch.cf sshd[24703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.87.0.79
2020-09-15T09:01:34.053905abusebot-7.cloudsearch.cf sshd[24703]: Invalid user hansel from 222.87.0.79 port 44168
2020-09-15T09:01:36.416892abusebot-7.cloudsearch.cf sshd[24703]: Failed password for invalid user hansel from 222.87.0.79 port 44168 ssh2
2020-09-15T09:08:08.247590abusebot-7.cloudsearch.cf sshd[24764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.87.0.79  user=root
2020-09-15T09:08:10.360272abusebot-7.cloudsearch.cf sshd[24764]: Failed password for root from 222.87.0.79 port 50819 ssh2
2020-09-15T09:11:26.001722abusebot-7.cloudsearch.cf sshd[24771]: Invalid user whmcs from 222.87.0.79 port 43635
...
2020-09-15 18:58:04
58.250.0.73 attackspam
failed root login
2020-09-15 18:37:59
94.247.241.70 attackbots
Sep 14 19:25:12 shivevps sshd[47350]: Bad protocol version identification '\024' from 94.247.241.70 port 47065
Sep 14 19:25:26 shivevps sshd[48521]: Bad protocol version identification '\024' from 94.247.241.70 port 48073
Sep 14 19:27:27 shivevps sshd[50425]: Bad protocol version identification '\024' from 94.247.241.70 port 56449
...
2020-09-15 18:44:26
91.121.91.82 attackbotsspam
91.121.91.82 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 15 06:59:15 server2 sshd[26890]: Failed password for root from 91.121.91.82 port 36788 ssh2
Sep 15 06:59:03 server2 sshd[26551]: Failed password for root from 176.31.181.168 port 48636 ssh2
Sep 15 06:58:37 server2 sshd[26382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.118.194.4  user=root
Sep 15 06:58:39 server2 sshd[26382]: Failed password for root from 83.118.194.4 port 57022 ssh2
Sep 15 06:58:58 server2 sshd[26521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.119.121  user=root
Sep 15 06:59:00 server2 sshd[26521]: Failed password for root from 106.54.119.121 port 49982 ssh2

IP Addresses Blocked:
2020-09-15 19:01:47
207.180.248.102 attackbotsspam
Sep 15 03:10:32 abendstille sshd\[2182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.248.102  user=root
Sep 15 03:10:34 abendstille sshd\[2182\]: Failed password for root from 207.180.248.102 port 39912 ssh2
Sep 15 03:14:27 abendstille sshd\[5795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.248.102  user=root
Sep 15 03:14:29 abendstille sshd\[5795\]: Failed password for root from 207.180.248.102 port 52758 ssh2
Sep 15 03:18:25 abendstille sshd\[9792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.248.102  user=root
...
2020-09-15 19:14:03
220.78.28.68 attackspam
Brute%20Force%20SSH
2020-09-15 18:55:11
159.89.197.1 attackspambots
Sep 15 13:04:25 srv-ubuntu-dev3 sshd[107906]: Invalid user test from 159.89.197.1
Sep 15 13:04:25 srv-ubuntu-dev3 sshd[107906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.197.1
Sep 15 13:04:25 srv-ubuntu-dev3 sshd[107906]: Invalid user test from 159.89.197.1
Sep 15 13:04:27 srv-ubuntu-dev3 sshd[107906]: Failed password for invalid user test from 159.89.197.1 port 37548 ssh2
Sep 15 13:07:15 srv-ubuntu-dev3 sshd[108268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.197.1  user=root
Sep 15 13:07:17 srv-ubuntu-dev3 sshd[108268]: Failed password for root from 159.89.197.1 port 49320 ssh2
Sep 15 13:10:05 srv-ubuntu-dev3 sshd[108591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.197.1  user=root
Sep 15 13:10:06 srv-ubuntu-dev3 sshd[108591]: Failed password for root from 159.89.197.1 port 32862 ssh2
Sep 15 13:12:59 srv-ubuntu-dev3 sshd[108939]:
...
2020-09-15 19:19:50
185.74.4.17 attackbots
Sep 15 10:25:54 [-] sshd[15280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.17 
Sep 15 10:25:55 [-] sshd[15280]: Failed password for invalid user office from 185.74.4.17 port 43827 ssh2
Sep 15 10:31:16 [-] sshd[15344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.17
2020-09-15 18:46:41
117.216.129.0 attackbotsspam
Unauthorised access (Sep 14) SRC=117.216.129.0 LEN=40 TTL=47 ID=273 TCP DPT=23 WINDOW=56233 SYN
2020-09-15 18:53:30
189.90.14.101 attackbots
$f2bV_matches
2020-09-15 19:00:27

最近上报的IP列表

202.202.236.243 228.60.81.225 210.144.83.124 107.122.27.245
212.25.148.6 52.143.155.226 28.186.26.199 230.116.68.189
19.91.96.196 41.162.233.165 193.222.198.72 20.41.4.247
18.83.33.157 114.125.250.38 38.181.100.107 31.145.12.179
38.30.100.241 69.112.58.52 37.107.251.133 170.64.232.177