必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.194.18.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.194.18.142.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:57:59 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.18.194.211.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.18.194.211.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.220.242.90 attackspambots
Failed password for invalid user admin from 171.220.242.90 port 43934 ssh2
2020-07-25 12:57:42
193.29.13.89 attack
[mysql-auth] MySQL auth attack
2020-07-25 12:59:15
165.227.5.41 attackbotsspam
Automatic report generated by Wazuh
2020-07-25 13:11:40
222.186.175.169 attackbotsspam
Jul 25 07:38:40 ift sshd\[25629\]: Failed password for root from 222.186.175.169 port 6198 ssh2Jul 25 07:38:44 ift sshd\[25629\]: Failed password for root from 222.186.175.169 port 6198 ssh2Jul 25 07:38:48 ift sshd\[25629\]: Failed password for root from 222.186.175.169 port 6198 ssh2Jul 25 07:39:04 ift sshd\[25734\]: Failed password for root from 222.186.175.169 port 6426 ssh2Jul 25 07:39:17 ift sshd\[25734\]: Failed password for root from 222.186.175.169 port 6426 ssh2
...
2020-07-25 12:49:05
117.215.129.29 attackbots
2020-07-25T04:57:14.707348shield sshd\[4309\]: Invalid user robert from 117.215.129.29 port 51166
2020-07-25T04:57:14.719917shield sshd\[4309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.215.129.29
2020-07-25T04:57:16.657487shield sshd\[4309\]: Failed password for invalid user robert from 117.215.129.29 port 51166 ssh2
2020-07-25T05:01:50.437137shield sshd\[4917\]: Invalid user pruebas from 117.215.129.29 port 35600
2020-07-25T05:01:50.449020shield sshd\[4917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.215.129.29
2020-07-25 13:12:04
65.49.210.231 attackspambots
Jul 25 00:44:50 ws12vmsma01 sshd[21564]: Invalid user steam from 65.49.210.231
Jul 25 00:44:52 ws12vmsma01 sshd[21564]: Failed password for invalid user steam from 65.49.210.231 port 38650 ssh2
Jul 25 00:54:02 ws12vmsma01 sshd[22872]: Invalid user lynn from 65.49.210.231
...
2020-07-25 12:44:11
14.143.187.242 attack
Jul 25 04:20:53 game-panel sshd[8898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.187.242
Jul 25 04:20:55 game-panel sshd[8898]: Failed password for invalid user admin from 14.143.187.242 port 21054 ssh2
Jul 25 04:25:53 game-panel sshd[9089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.187.242
2020-07-25 12:43:46
111.72.194.105 attackspambots
Jul 25 06:49:42 srv01 postfix/smtpd\[7689\]: warning: unknown\[111.72.194.105\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 06:53:11 srv01 postfix/smtpd\[7689\]: warning: unknown\[111.72.194.105\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 06:53:23 srv01 postfix/smtpd\[7689\]: warning: unknown\[111.72.194.105\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 06:53:39 srv01 postfix/smtpd\[7689\]: warning: unknown\[111.72.194.105\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 06:54:01 srv01 postfix/smtpd\[7689\]: warning: unknown\[111.72.194.105\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-25 13:09:15
106.12.205.137 attack
Jul 25 06:06:35 rocket sshd[5082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.137
Jul 25 06:06:37 rocket sshd[5082]: Failed password for invalid user contactus from 106.12.205.137 port 37842 ssh2
...
2020-07-25 13:14:40
103.200.23.81 attackspam
$f2bV_matches
2020-07-25 12:53:54
14.243.201.17 attackspam
Unauthorised access (Jul 25) SRC=14.243.201.17 LEN=52 TTL=113 ID=1151 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-25 12:35:03
192.42.116.26 attack
Jul 25 05:55:18 mout sshd[15504]: Failed password for sshd from 192.42.116.26 port 37890 ssh2
Jul 25 05:55:19 mout sshd[15504]: Failed password for sshd from 192.42.116.26 port 37890 ssh2
Jul 25 05:55:21 mout sshd[15504]: Failed password for sshd from 192.42.116.26 port 37890 ssh2
2020-07-25 12:51:29
139.59.93.93 attackbotsspam
Jul 24 21:54:22 dignus sshd[31311]: Failed password for invalid user teste from 139.59.93.93 port 60492 ssh2
Jul 24 21:58:48 dignus sshd[31784]: Invalid user cd from 139.59.93.93 port 43258
Jul 24 21:58:48 dignus sshd[31784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.93.93
Jul 24 21:58:49 dignus sshd[31784]: Failed password for invalid user cd from 139.59.93.93 port 43258 ssh2
Jul 24 22:03:23 dignus sshd[32332]: Invalid user rachel from 139.59.93.93 port 54258
...
2020-07-25 13:08:33
185.67.82.114 attackspambots
Jul 25 05:55:27 mout sshd[15521]: Failed password for sshd from 185.67.82.114 port 58624 ssh2
Jul 25 05:55:30 mout sshd[15521]: Failed password for sshd from 185.67.82.114 port 58624 ssh2
Jul 25 05:55:32 mout sshd[15521]: Failed password for sshd from 185.67.82.114 port 58624 ssh2
2020-07-25 12:39:17
119.235.19.66 attack
Invalid user xyz from 119.235.19.66 port 49735
2020-07-25 13:02:29

最近上报的IP列表

221.227.59.10 58.97.225.186 200.236.124.221 175.107.10.22
187.232.227.67 151.235.189.72 2.136.143.77 218.238.146.135
116.96.30.74 36.69.15.250 177.10.147.187 120.86.255.231
213.108.1.64 36.13.3.80 5.238.198.172 119.40.93.201
103.1.104.16 154.57.3.32 112.94.96.62 193.160.141.107