必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.146.144.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.146.144.127.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:19:34 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
127.144.146.42.in-addr.arpa domain name pointer 42-146-144-127.rev.home.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
127.144.146.42.in-addr.arpa	name = 42-146-144-127.rev.home.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.6.204.11 attackspambots
Dec  6 17:49:52 * sshd[13419]: Failed password for root from 171.6.204.11 port 61104 ssh2
2019-12-07 01:20:56
165.22.148.76 attackbotsspam
2019-12-06T17:06:06.068017abusebot.cloudsearch.cf sshd\[11804\]: Invalid user kierramona from 165.22.148.76 port 52688
2019-12-07 01:19:17
202.126.208.122 attack
Dec  6 16:30:14 lnxweb62 sshd[18691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.126.208.122
Dec  6 16:30:16 lnxweb62 sshd[18691]: Failed password for invalid user named from 202.126.208.122 port 50455 ssh2
Dec  6 16:37:29 lnxweb62 sshd[22771]: Failed password for root from 202.126.208.122 port 55517 ssh2
2019-12-07 01:13:52
140.249.22.238 attackspambots
2019-12-06T17:02:22.928805abusebot-2.cloudsearch.cf sshd\[7559\]: Invalid user alford from 140.249.22.238 port 54340
2019-12-07 01:31:59
106.13.45.131 attackspam
Dec  6 18:13:16 vps691689 sshd[17537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.131
Dec  6 18:13:18 vps691689 sshd[17537]: Failed password for invalid user fieldsup from 106.13.45.131 port 53590 ssh2
...
2019-12-07 01:25:02
51.158.110.70 attackspambots
Dec  6 06:09:59 wbs sshd\[17731\]: Invalid user ftp from 51.158.110.70
Dec  6 06:09:59 wbs sshd\[17731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.110.70
Dec  6 06:10:02 wbs sshd\[17731\]: Failed password for invalid user ftp from 51.158.110.70 port 55828 ssh2
Dec  6 06:15:47 wbs sshd\[18312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.110.70  user=backup
Dec  6 06:15:49 wbs sshd\[18312\]: Failed password for backup from 51.158.110.70 port 46588 ssh2
2019-12-07 01:47:11
204.48.19.178 attackbots
Dec  6 17:50:48 MK-Soft-VM3 sshd[26530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178 
Dec  6 17:50:50 MK-Soft-VM3 sshd[26530]: Failed password for invalid user lisa from 204.48.19.178 port 53678 ssh2
...
2019-12-07 01:17:18
122.228.89.95 attackbotsspam
2019-12-06T17:28:08.690034abusebot-7.cloudsearch.cf sshd\[4065\]: Invalid user user from 122.228.89.95 port 12025
2019-12-07 01:28:16
207.154.239.128 attack
Dec  6 17:57:43 legacy sshd[23951]: Failed password for root from 207.154.239.128 port 48556 ssh2
Dec  6 18:03:51 legacy sshd[24253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128
Dec  6 18:03:52 legacy sshd[24253]: Failed password for invalid user henriette from 207.154.239.128 port 58134 ssh2
...
2019-12-07 01:17:59
106.52.106.61 attack
Dec  6 17:42:25 icinga sshd[24523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61 
Dec  6 17:42:27 icinga sshd[24523]: Failed password for invalid user cristina from 106.52.106.61 port 58532 ssh2
Dec  6 17:56:24 icinga sshd[40272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61 
...
2019-12-07 01:08:39
49.234.24.108 attack
20 attempts against mh-ssh on cloud.magehost.pro
2019-12-07 01:26:57
171.244.43.52 attackbotsspam
Dec  6 07:02:12 sachi sshd\[29553\]: Invalid user menaker from 171.244.43.52
Dec  6 07:02:12 sachi sshd\[29553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.52
Dec  6 07:02:15 sachi sshd\[29553\]: Failed password for invalid user menaker from 171.244.43.52 port 36564 ssh2
Dec  6 07:10:35 sachi sshd\[30385\]: Invalid user ltsp from 171.244.43.52
Dec  6 07:10:35 sachi sshd\[30385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.52
2019-12-07 01:31:12
121.159.135.131 attackbotsspam
Dec  6 14:49:00 thevastnessof sshd[23675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.159.135.131
...
2019-12-07 01:32:17
177.69.221.75 attack
Dec  6 07:06:58 sachi sshd\[29931\]: Invalid user uniacke from 177.69.221.75
Dec  6 07:06:59 sachi sshd\[29931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.221.75
Dec  6 07:07:01 sachi sshd\[29931\]: Failed password for invalid user uniacke from 177.69.221.75 port 55860 ssh2
Dec  6 07:14:14 sachi sshd\[30693\]: Invalid user echols from 177.69.221.75
Dec  6 07:14:14 sachi sshd\[30693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.221.75
2019-12-07 01:40:01
159.203.36.154 attackbots
Dec  6 17:47:06 MK-Soft-VM7 sshd[19867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.36.154 
Dec  6 17:47:08 MK-Soft-VM7 sshd[19867]: Failed password for invalid user Passw0rd from 159.203.36.154 port 51777 ssh2
...
2019-12-07 01:23:41

最近上报的IP列表

132.222.151.42 239.161.12.93 200.4.103.176 241.35.193.121
215.222.148.155 204.208.120.43 83.73.202.63 148.216.163.238
201.12.114.101 199.66.48.177 136.244.95.241 137.56.253.38
87.156.208.102 137.40.253.131 119.222.190.172 134.70.5.228
50.182.20.88 60.20.149.142 30.175.43.137 210.7.3.28