必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.142.19.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.142.19.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:55:23 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 160.19.142.254.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.19.142.254.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
52.66.187.171 attack
52.66.187.171 - - [15/Jul/2019:14:35:47 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.66.187.171 - - [15/Jul/2019:14:35:47 +0200] "POST /wp-login.php HTTP/1.1" 200 1651 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.66.187.171 - - [15/Jul/2019:14:35:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.66.187.171 - - [15/Jul/2019:14:35:48 +0200] "POST /wp-login.php HTTP/1.1" 200 1629 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.66.187.171 - - [15/Jul/2019:14:35:49 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.66.187.171 - - [15/Jul/2019:14:35:49 +0200] "POST /wp-login.php HTTP/1.1" 200 1626 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-15 21:48:48
185.87.187.187 attack
pfaffenroth-photographie.de 185.87.187.187 \[15/Jul/2019:08:21:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 8449 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pfaffenroth-photographie.de 185.87.187.187 \[15/Jul/2019:08:21:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 8449 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-15 20:56:59
94.74.146.249 attackbots
Jul 15 08:18:40 rigel postfix/smtpd[31820]: connect from unknown[94.74.146.249]
Jul 15 08:18:43 rigel postfix/smtpd[31820]: warning: unknown[94.74.146.249]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 15 08:18:44 rigel postfix/smtpd[31820]: warning: unknown[94.74.146.249]: SASL PLAIN authentication failed: authentication failure
Jul 15 08:18:45 rigel postfix/smtpd[31820]: warning: unknown[94.74.146.249]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.74.146.249
2019-07-15 21:14:21
37.120.135.221 attack
\[2019-07-15 05:15:14\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1396' - Wrong password
\[2019-07-15 05:15:14\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-15T05:15:14.879-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4324",SessionID="0x7f06f80214c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.120.135.221/51694",Challenge="156c99a6",ReceivedChallenge="156c99a6",ReceivedHash="bebe0474b2f62211773e245cb2c97b79"
\[2019-07-15 05:17:08\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1361' - Wrong password
\[2019-07-15 05:17:08\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-15T05:17:08.890-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9589",SessionID="0x7f06f803c558",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.1
2019-07-15 21:39:16
203.122.21.26 attackspam
Jul 15 11:24:44 server01 sshd\[2576\]: Invalid user es from 203.122.21.26
Jul 15 11:24:44 server01 sshd\[2576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.122.21.26
Jul 15 11:24:46 server01 sshd\[2576\]: Failed password for invalid user es from 203.122.21.26 port 48042 ssh2
...
2019-07-15 21:15:11
42.243.154.6 attack
Jul 15 02:29:54 mailman dovecot: imap-login: Disconnected (auth failed, 1 attempts): user=, method=PLAIN, rip=42.243.154.6, lip=[munged], TLS
2019-07-15 21:12:36
178.128.97.182 attack
2019-07-15T10:23:53.786187abusebot-2.cloudsearch.cf sshd\[28037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sg1.blackoaknetworks.net  user=root
2019-07-15 21:29:00
115.159.237.89 attackbotsspam
Jul 15 07:22:04 ip-172-31-1-72 sshd\[14699\]: Invalid user adminuser from 115.159.237.89
Jul 15 07:22:04 ip-172-31-1-72 sshd\[14699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.89
Jul 15 07:22:05 ip-172-31-1-72 sshd\[14699\]: Failed password for invalid user adminuser from 115.159.237.89 port 60414 ssh2
Jul 15 07:25:32 ip-172-31-1-72 sshd\[14752\]: Invalid user shan from 115.159.237.89
Jul 15 07:25:32 ip-172-31-1-72 sshd\[14752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.89
2019-07-15 21:39:39
170.0.128.10 attack
Invalid user teamspeak3 from 170.0.128.10 port 38227
2019-07-15 21:57:05
213.181.193.58 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07151032)
2019-07-15 21:21:06
107.172.139.214 attack
Unauthorized access detected from banned ip
2019-07-15 21:23:45
218.94.19.122 attack
Jul 15 10:17:33 eventyay sshd[16009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.19.122
Jul 15 10:17:35 eventyay sshd[16009]: Failed password for invalid user cc from 218.94.19.122 port 53042 ssh2
Jul 15 10:21:53 eventyay sshd[17081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.19.122
...
2019-07-15 21:34:58
185.58.53.66 attackbotsspam
Jul 15 12:09:47 unicornsoft sshd\[24608\]: Invalid user htt from 185.58.53.66
Jul 15 12:09:47 unicornsoft sshd\[24608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.58.53.66
Jul 15 12:09:49 unicornsoft sshd\[24608\]: Failed password for invalid user htt from 185.58.53.66 port 50714 ssh2
2019-07-15 21:06:13
111.125.67.125 attackspam
Automatic report - Port Scan Attack
2019-07-15 21:46:06
87.242.73.251 attackbots
timhelmke.de 87.242.73.251 \[15/Jul/2019:08:20:07 +0200\] "POST /wp-login.php HTTP/1.1" 200 5593 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
timhelmke.de 87.242.73.251 \[15/Jul/2019:08:20:07 +0200\] "POST /wp-login.php HTTP/1.1" 200 5582 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-15 21:35:37

最近上报的IP列表

245.61.187.76 6.202.29.139 53.75.75.172 138.153.89.214
107.81.73.70 19.193.61.163 213.61.22.22 166.54.164.169
18.41.220.84 4.1.34.47 73.72.103.27 42.247.242.84
221.148.158.5 151.23.131.44 20.81.101.238 100.34.49.75
219.113.247.114 165.114.193.13 153.169.202.13 168.52.194.102