必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.134.226.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.134.226.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:38:20 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
142.226.134.218.in-addr.arpa domain name pointer softbank218134226142.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.226.134.218.in-addr.arpa	name = softbank218134226142.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.169.194 attack
Apr 10 08:06:03 debian sshd[20950]: Unable to negotiate with 222.186.169.194 port 49778: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Apr 10 11:42:16 debian sshd[30602]: Unable to negotiate with 222.186.169.194 port 22902: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-04-10 23:46:46
51.161.8.70 attack
$f2bV_matches
2020-04-10 23:22:54
14.175.0.89 attackspam
20/4/10@09:34:09: FAIL: Alarm-Network address from=14.175.0.89
20/4/10@09:34:09: FAIL: Alarm-Network address from=14.175.0.89
...
2020-04-10 23:44:02
185.209.0.51 attackspambots
Fail2Ban Ban Triggered
2020-04-10 23:12:52
101.89.147.85 attackspambots
Triggered by Fail2Ban at Ares web server
2020-04-10 23:12:28
201.184.169.106 attackspambots
Apr 10 17:23:04 DAAP sshd[3378]: Invalid user condor from 201.184.169.106 port 34336
Apr 10 17:23:04 DAAP sshd[3378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106
Apr 10 17:23:04 DAAP sshd[3378]: Invalid user condor from 201.184.169.106 port 34336
Apr 10 17:23:06 DAAP sshd[3378]: Failed password for invalid user condor from 201.184.169.106 port 34336 ssh2
...
2020-04-10 23:40:45
46.38.145.4 attackbotsspam
Apr 10 17:32:24 srv01 postfix/smtpd\[8550\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 17:32:54 srv01 postfix/smtpd\[8380\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 17:33:24 srv01 postfix/smtpd\[8585\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 17:33:53 srv01 postfix/smtpd\[8380\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 10 17:34:23 srv01 postfix/smtpd\[15943\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-10 23:36:23
118.25.25.207 attack
Apr 10 13:43:17 XXX sshd[15199]: Invalid user freebsd from 118.25.25.207 port 49034
2020-04-10 23:02:56
172.245.153.173 attack
(sshd) Failed SSH login from 172.245.153.173 (US/United States/172-245-153-173-host.colocrossing.com): 5 in the last 3600 secs
2020-04-10 23:25:15
96.77.182.189 attack
Apr 10 17:08:48 s1 sshd\[18066\]: Invalid user admin from 96.77.182.189 port 39926
Apr 10 17:08:48 s1 sshd\[18066\]: Failed password for invalid user admin from 96.77.182.189 port 39926 ssh2
Apr 10 17:11:40 s1 sshd\[19526\]: Invalid user zeus from 96.77.182.189 port 49290
Apr 10 17:11:40 s1 sshd\[19526\]: Failed password for invalid user zeus from 96.77.182.189 port 49290 ssh2
Apr 10 17:12:46 s1 sshd\[19567\]: Invalid user user from 96.77.182.189 port 37308
Apr 10 17:12:46 s1 sshd\[19567\]: Failed password for invalid user user from 96.77.182.189 port 37308 ssh2
...
2020-04-10 23:24:26
92.118.160.33 attackbots
Apr 10 14:09:15 debian-2gb-nbg1-2 kernel: \[8779563.671119\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.160.33 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=TCP SPT=58934 DPT=2083 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-10 23:15:20
49.88.112.112 attackbotsspam
April 10 2020, 15:34:25 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-04-10 23:35:49
185.175.93.3 attackspam
04/10/2020-11:00:38.371780 185.175.93.3 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-10 23:31:31
66.42.43.150 attackspambots
Apr 10 13:59:42 server sshd[10498]: Failed password for invalid user apache from 66.42.43.150 port 43516 ssh2
Apr 10 14:05:34 server sshd[12180]: Failed password for invalid user kmiller from 66.42.43.150 port 42836 ssh2
Apr 10 14:09:25 server sshd[13194]: Failed password for root from 66.42.43.150 port 46246 ssh2
2020-04-10 23:06:51
103.141.46.154 attackbotsspam
SSH Brute Force
2020-04-10 23:41:10

最近上报的IP列表

171.79.243.14 194.103.8.141 78.22.106.10 127.231.160.11
99.141.52.165 46.28.60.246 34.224.228.161 193.254.255.235
34.63.196.253 148.207.208.229 55.70.112.22 77.67.120.13
166.249.32.195 174.199.191.219 31.142.221.155 198.88.36.97
35.83.187.57 45.113.244.250 64.127.215.232 39.234.85.69