必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.64.141.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.64.141.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:48:30 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
137.141.64.42.in-addr.arpa domain name pointer 42-64-141-137.emome-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.141.64.42.in-addr.arpa	name = 42-64-141-137.emome-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.117.244.76 attackbotsspam
[portscan] Port scan
2019-10-03 15:17:09
150.242.213.189 attackspambots
2019-10-03T06:16:55.917823shield sshd\[7021\]: Invalid user user1 from 150.242.213.189 port 59772
2019-10-03T06:16:55.922022shield sshd\[7021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
2019-10-03T06:16:57.841711shield sshd\[7021\]: Failed password for invalid user user1 from 150.242.213.189 port 59772 ssh2
2019-10-03T06:21:03.306973shield sshd\[7655\]: Invalid user jeffrey from 150.242.213.189 port 37466
2019-10-03T06:21:03.311246shield sshd\[7655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
2019-10-03 15:05:05
104.248.44.227 attack
Oct  3 09:18:07 core sshd[9004]: Invalid user theresa123 from 104.248.44.227 port 37204
Oct  3 09:18:08 core sshd[9004]: Failed password for invalid user theresa123 from 104.248.44.227 port 37204 ssh2
...
2019-10-03 15:30:01
139.59.6.148 attackbots
2019-08-14 17:54:46,902 fail2ban.actions        [791]: NOTICE  [sshd] Ban 139.59.6.148
2019-08-14 21:00:28,339 fail2ban.actions        [791]: NOTICE  [sshd] Ban 139.59.6.148
2019-08-15 00:07:07,618 fail2ban.actions        [791]: NOTICE  [sshd] Ban 139.59.6.148
...
2019-10-03 15:44:51
35.198.236.110 attack
fail2ban honeypot
2019-10-03 15:28:02
199.195.249.6 attackbotsspam
Oct  3 08:57:54 saschabauer sshd[12431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.249.6
Oct  3 08:57:55 saschabauer sshd[12431]: Failed password for invalid user ronda from 199.195.249.6 port 46134 ssh2
2019-10-03 15:04:01
106.13.52.234 attack
Oct  1 00:45:49 eola sshd[25568]: Invalid user rf from 106.13.52.234 port 43924
Oct  1 00:45:49 eola sshd[25568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 
Oct  1 00:45:52 eola sshd[25568]: Failed password for invalid user rf from 106.13.52.234 port 43924 ssh2
Oct  1 00:45:52 eola sshd[25568]: Received disconnect from 106.13.52.234 port 43924:11: Bye Bye [preauth]
Oct  1 00:45:52 eola sshd[25568]: Disconnected from 106.13.52.234 port 43924 [preauth]
Oct  1 01:02:12 eola sshd[25883]: Invalid user mapruser from 106.13.52.234 port 34046
Oct  1 01:02:12 eola sshd[25883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 
Oct  1 01:02:14 eola sshd[25883]: Failed password for invalid user mapruser from 106.13.52.234 port 34046 ssh2
Oct  1 01:02:15 eola sshd[25883]: Received disconnect from 106.13.52.234 port 34046:11: Bye Bye [preauth]
Oct  1 01:02:15 eola sshd[258........
-------------------------------
2019-10-03 15:05:31
222.186.15.110 attackspambots
Oct  3 08:53:36 mail sshd\[26980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Oct  3 08:53:38 mail sshd\[26980\]: Failed password for root from 222.186.15.110 port 38973 ssh2
Oct  3 08:53:40 mail sshd\[26980\]: Failed password for root from 222.186.15.110 port 38973 ssh2
Oct  3 08:53:42 mail sshd\[26980\]: Failed password for root from 222.186.15.110 port 38973 ssh2
Oct  3 09:00:18 mail sshd\[27992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
2019-10-03 15:08:39
139.99.37.130 attack
2019-08-23 17:03:29,038 fail2ban.actions        [878]: NOTICE  [sshd] Ban 139.99.37.130
2019-08-23 20:14:57,802 fail2ban.actions        [878]: NOTICE  [sshd] Ban 139.99.37.130
2019-08-23 23:24:35,283 fail2ban.actions        [878]: NOTICE  [sshd] Ban 139.99.37.130
...
2019-10-03 15:12:32
173.201.196.10 attackspam
Automatic report - XMLRPC Attack
2019-10-03 15:09:03
49.88.112.78 attackbotsspam
Unauthorized access to SSH at 3/Oct/2019:07:43:54 +0000.
Received:  (SSH-2.0-PUTTY)
2019-10-03 15:48:34
203.186.57.191 attackbotsspam
Oct  3 08:53:55 MK-Soft-VM4 sshd[2687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.186.57.191 
Oct  3 08:53:58 MK-Soft-VM4 sshd[2687]: Failed password for invalid user juan from 203.186.57.191 port 43400 ssh2
...
2019-10-03 15:06:19
65.151.157.14 attack
Oct  3 09:03:28 jane sshd[20531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.157.14 
Oct  3 09:03:31 jane sshd[20531]: Failed password for invalid user mahagon from 65.151.157.14 port 54054 ssh2
...
2019-10-03 15:25:09
176.254.243.226 attack
176.254.243.226 - - [03/Oct/2019:05:56:48 +0200] "GET /wp-login.php HTTP/1.1" 302 573
...
2019-10-03 15:26:11
62.234.144.135 attackspam
Lines containing failures of 62.234.144.135
Oct  2 06:18:34 shared12 sshd[30193]: Invalid user lw from 62.234.144.135 port 38032
Oct  2 06:18:34 shared12 sshd[30193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.144.135
Oct  2 06:18:36 shared12 sshd[30193]: Failed password for invalid user lw from 62.234.144.135 port 38032 ssh2
Oct  2 06:18:36 shared12 sshd[30193]: Received disconnect from 62.234.144.135 port 38032:11: Bye Bye [preauth]
Oct  2 06:18:36 shared12 sshd[30193]: Disconnected from invalid user lw 62.234.144.135 port 38032 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=62.234.144.135
2019-10-03 15:03:41

最近上报的IP列表

9.92.73.49 5.204.156.113 211.156.42.116 140.250.156.210
58.222.154.28 177.181.254.25 238.254.77.134 85.33.255.71
6.153.128.33 66.90.81.135 53.14.240.38 129.242.169.113
33.177.96.176 188.115.250.206 13.247.219.194 19.0.53.234
49.132.100.169 160.149.112.106 205.83.20.104 126.84.119.194