必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.142.104.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.142.104.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:32:43 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
142.104.142.213.in-addr.arpa domain name pointer 213142104142.public.telering.at.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.104.142.213.in-addr.arpa	name = 213142104142.public.telering.at.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.65.159.3 attack
2019-06-30T03:40:31.289221abusebot-4.cloudsearch.cf sshd\[23274\]: Invalid user redis from 159.65.159.3 port 32846
2019-06-30 16:15:23
168.228.151.120 attack
SMTP-sasl brute force
...
2019-06-30 16:18:16
59.120.21.64 attackspambots
445/tcp
[2019-06-30]1pkt
2019-06-30 16:08:59
14.238.12.90 attackbotsspam
445/tcp
[2019-06-30]1pkt
2019-06-30 15:54:09
113.167.105.136 attackbotsspam
60001/tcp
[2019-06-30]1pkt
2019-06-30 15:30:01
82.58.101.232 attackbots
Jun 30 05:36:49 mxgate1 postfix/postscreen[28355]: CONNECT from [82.58.101.232]:61608 to [176.31.12.44]:25
Jun 30 05:36:49 mxgate1 postfix/dnsblog[28356]: addr 82.58.101.232 listed by domain zen.spamhaus.org as 127.0.0.10
Jun 30 05:36:49 mxgate1 postfix/dnsblog[28356]: addr 82.58.101.232 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 30 05:36:49 mxgate1 postfix/dnsblog[28357]: addr 82.58.101.232 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 30 05:36:49 mxgate1 postfix/dnsblog[28360]: addr 82.58.101.232 listed by domain bl.spamcop.net as 127.0.0.2
Jun 30 05:36:49 mxgate1 postfix/dnsblog[28358]: addr 82.58.101.232 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 30 05:36:55 mxgate1 postfix/postscreen[28355]: DNSBL rank 5 for [82.58.101.232]:61608
Jun x@x
Jun 30 05:36:55 mxgate1 postfix/postscreen[28355]: HANGUP after 0.25 from [82.58.101.232]:61608 in tests after SMTP handshake
Jun 30 05:36:55 mxgate1 postfix/postscreen[28355]: DISCONNECT [82.58.101.232]:6........
-------------------------------
2019-06-30 15:33:42
88.249.245.46 attackspambots
81/tcp
[2019-06-30]1pkt
2019-06-30 15:39:29
151.80.101.102 attack
Jun 30 03:18:38 vps200512 sshd\[30795\]: Invalid user admin from 151.80.101.102
Jun 30 03:18:38 vps200512 sshd\[30795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.101.102
Jun 30 03:18:41 vps200512 sshd\[30795\]: Failed password for invalid user admin from 151.80.101.102 port 53695 ssh2
Jun 30 03:18:43 vps200512 sshd\[30795\]: Failed password for invalid user admin from 151.80.101.102 port 53695 ssh2
Jun 30 03:18:45 vps200512 sshd\[30795\]: Failed password for invalid user admin from 151.80.101.102 port 53695 ssh2
2019-06-30 16:07:59
218.164.18.253 attackspambots
37215/tcp
[2019-06-30]1pkt
2019-06-30 16:06:22
122.143.163.48 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 15:46:15
36.90.169.198 attack
445/tcp
[2019-06-30]1pkt
2019-06-30 15:56:53
46.252.247.206 attackbots
Jun 30 07:06:39 mail sshd[25421]: Invalid user student from 46.252.247.206
Jun 30 07:06:39 mail sshd[25421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.252.247.206
Jun 30 07:06:39 mail sshd[25421]: Invalid user student from 46.252.247.206
Jun 30 07:06:41 mail sshd[25421]: Failed password for invalid user student from 46.252.247.206 port 33062 ssh2
Jun 30 07:08:28 mail sshd[28319]: Invalid user ftp from 46.252.247.206
...
2019-06-30 15:35:34
168.181.65.200 attackspam
libpam_shield report: forced login attempt
2019-06-30 15:40:35
187.94.111.89 attackbotsspam
libpam_shield report: forced login attempt
2019-06-30 16:02:56
182.72.199.106 attack
Jun 30 08:36:26 srv-4 sshd\[10898\]: Invalid user saned from 182.72.199.106
Jun 30 08:36:26 srv-4 sshd\[10898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.199.106
Jun 30 08:36:28 srv-4 sshd\[10898\]: Failed password for invalid user saned from 182.72.199.106 port 56705 ssh2
...
2019-06-30 15:41:11

最近上报的IP列表

67.62.109.42 180.225.167.45 222.46.6.98 244.164.16.11
176.229.199.122 194.227.32.249 9.234.197.100 181.153.0.67
191.91.105.53 203.134.137.1 63.193.145.198 237.44.45.111
58.22.179.19 59.170.39.87 119.140.198.137 61.21.92.160
137.67.139.97 230.77.87.164 21.92.55.148 45.224.219.88