必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Algeria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.105.147.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.105.147.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:23:53 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.147.105.41.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.147.105.41.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.81.226.147 attackbots
2020-05-06T20:46:44.267933rocketchat.forhosting.nl sshd[30318]: Invalid user ever from 172.81.226.147 port 51688
2020-05-06T20:46:46.548357rocketchat.forhosting.nl sshd[30318]: Failed password for invalid user ever from 172.81.226.147 port 51688 ssh2
2020-05-06T21:21:47.794208rocketchat.forhosting.nl sshd[31192]: Invalid user joseph from 172.81.226.147 port 36450
...
2020-05-07 03:50:12
106.245.228.122 attackspam
May  4 17:26:30 onepixel sshd[949782]: Failed password for root from 106.245.228.122 port 50226 ssh2
May  4 17:32:07 onepixel sshd[962903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.228.122 
May  4 17:32:09 onepixel sshd[962903]: Failed password for invalid user hanshow from 106.245.228.122 port 24533 ssh2
...
2020-05-07 04:04:30
117.173.67.119 attack
May  6 13:06:35 firewall sshd[2689]: Invalid user 3 from 117.173.67.119
May  6 13:06:37 firewall sshd[2689]: Failed password for invalid user 3 from 117.173.67.119 port 3364 ssh2
May  6 13:08:29 firewall sshd[2749]: Invalid user davis from 117.173.67.119
...
2020-05-07 04:04:12
212.237.38.79 attack
2020-05-06T14:23:26.577517shield sshd\[31776\]: Invalid user apagar from 212.237.38.79 port 46824
2020-05-06T14:23:26.582084shield sshd\[31776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.38.79
2020-05-06T14:23:28.067632shield sshd\[31776\]: Failed password for invalid user apagar from 212.237.38.79 port 46824 ssh2
2020-05-06T14:27:59.829531shield sshd\[547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.38.79  user=root
2020-05-06T14:28:02.127910shield sshd\[547\]: Failed password for root from 212.237.38.79 port 56374 ssh2
2020-05-07 04:10:41
222.223.103.185 attackspambots
May  6 20:26:40 vps sshd[419477]: Invalid user yvonne from 222.223.103.185 port 6906
May  6 20:26:40 vps sshd[419477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.223.103.185
May  6 20:26:43 vps sshd[419477]: Failed password for invalid user yvonne from 222.223.103.185 port 6906 ssh2
May  6 20:30:37 vps sshd[440107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.223.103.185  user=root
May  6 20:30:39 vps sshd[440107]: Failed password for root from 222.223.103.185 port 33275 ssh2
...
2020-05-07 04:08:42
118.25.44.66 attackspambots
May  6 11:41:09 ws26vmsma01 sshd[105358]: Failed password for root from 118.25.44.66 port 35872 ssh2
...
2020-05-07 04:14:09
183.134.65.214 attack
May  6 15:21:51 server sshd[5578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.65.214
May  6 15:21:53 server sshd[5578]: Failed password for invalid user alex from 183.134.65.214 port 51166 ssh2
May  6 15:26:16 server sshd[5923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.65.214
...
2020-05-07 04:09:53
124.251.132.4 attack
May 6 22:23:28 *host* sshd\[2842\]: Invalid user bob from 124.251.132.4 port 18665
2020-05-07 04:33:37
192.236.161.26 attackspam
Phishing
2020-05-07 04:20:46
46.38.144.179 attackspam
May  6 22:04:30 vmanager6029 postfix/smtpd\[30167\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  6 22:05:06 vmanager6029 postfix/smtpd\[30176\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-07 04:06:13
222.239.28.178 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-05-07 03:53:33
108.84.180.195 attackbots
May  6 21:43:48 electroncash sshd[1894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.84.180.195 
May  6 21:43:48 electroncash sshd[1894]: Invalid user caldera from 108.84.180.195 port 60670
May  6 21:43:50 electroncash sshd[1894]: Failed password for invalid user caldera from 108.84.180.195 port 60670 ssh2
May  6 21:47:26 electroncash sshd[2865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.84.180.195  user=root
May  6 21:47:27 electroncash sshd[2865]: Failed password for root from 108.84.180.195 port 43680 ssh2
...
2020-05-07 03:58:26
163.44.150.247 attack
May  6 19:18:14 lukav-desktop sshd\[17815\]: Invalid user zookeeper from 163.44.150.247
May  6 19:18:14 lukav-desktop sshd\[17815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
May  6 19:18:16 lukav-desktop sshd\[17815\]: Failed password for invalid user zookeeper from 163.44.150.247 port 58356 ssh2
May  6 19:20:40 lukav-desktop sshd\[19194\]: Invalid user has from 163.44.150.247
May  6 19:20:40 lukav-desktop sshd\[19194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
2020-05-07 04:21:19
14.18.62.124 attackbotsspam
May  6 22:27:39 lukav-desktop sshd\[14531\]: Invalid user rob from 14.18.62.124
May  6 22:27:39 lukav-desktop sshd\[14531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.62.124
May  6 22:27:41 lukav-desktop sshd\[14531\]: Failed password for invalid user rob from 14.18.62.124 port 40946 ssh2
May  6 22:30:26 lukav-desktop sshd\[15951\]: Invalid user yyf from 14.18.62.124
May  6 22:30:26 lukav-desktop sshd\[15951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.62.124
2020-05-07 04:08:16
162.243.42.225 attack
2020-05-06T07:57:28.647587mail.thespaminator.com sshd[24446]: Invalid user guest from 162.243.42.225 port 56274
2020-05-06T07:57:30.830080mail.thespaminator.com sshd[24446]: Failed password for invalid user guest from 162.243.42.225 port 56274 ssh2
...
2020-05-07 04:14:26

最近上报的IP列表

41.190.206.158 193.208.127.151 248.23.95.113 104.230.57.195
196.58.95.212 208.145.218.220 53.214.54.76 152.246.13.133
39.78.232.219 208.61.148.182 186.56.21.10 4.142.219.42
74.138.129.142 220.88.232.210 239.107.84.181 192.193.113.241
81.116.184.22 246.15.133.121 220.4.153.208 143.116.6.189