必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.93.142.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44945
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.93.142.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:21:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 104.142.93.64.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 64.93.142.104.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
152.136.95.118 attackspam
Dec  3 17:40:32 ns382633 sshd\[1399\]: Invalid user server from 152.136.95.118 port 47510
Dec  3 17:40:32 ns382633 sshd\[1399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
Dec  3 17:40:34 ns382633 sshd\[1399\]: Failed password for invalid user server from 152.136.95.118 port 47510 ssh2
Dec  3 17:48:55 ns382633 sshd\[2690\]: Invalid user sugachyu from 152.136.95.118 port 34306
Dec  3 17:48:55 ns382633 sshd\[2690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
2019-12-04 03:32:44
116.236.14.218 attack
Dec  3 19:12:02 OPSO sshd\[5422\]: Invalid user tone from 116.236.14.218 port 39012
Dec  3 19:12:02 OPSO sshd\[5422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.14.218
Dec  3 19:12:03 OPSO sshd\[5422\]: Failed password for invalid user tone from 116.236.14.218 port 39012 ssh2
Dec  3 19:18:15 OPSO sshd\[7065\]: Invalid user lazarus from 116.236.14.218 port 44456
Dec  3 19:18:15 OPSO sshd\[7065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.14.218
2019-12-04 03:54:18
177.87.145.150 attack
Automatic report - Port Scan Attack
2019-12-04 03:51:59
145.239.94.191 attackspambots
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2019-12-04 03:42:42
186.215.40.101 attack
Automatic report - Port Scan Attack
2019-12-04 03:23:06
198.245.53.163 attack
2019-12-03T19:24:21.392538abusebot-3.cloudsearch.cf sshd\[9091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.ip-198-245-53.net  user=root
2019-12-04 03:31:28
195.154.38.177 attackbotsspam
Dec  3 05:47:09 php1 sshd\[7195\]: Invalid user admin from 195.154.38.177
Dec  3 05:47:09 php1 sshd\[7195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177
Dec  3 05:47:11 php1 sshd\[7195\]: Failed password for invalid user admin from 195.154.38.177 port 46332 ssh2
Dec  3 05:53:27 php1 sshd\[8004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177  user=root
Dec  3 05:53:29 php1 sshd\[8004\]: Failed password for root from 195.154.38.177 port 56388 ssh2
2019-12-04 03:27:10
81.130.187.49 attackspambots
Fail2Ban Ban Triggered
2019-12-04 03:44:46
132.232.113.102 attack
SSH bruteforce
2019-12-04 03:38:31
62.217.225.178 attackspambots
RDP Brute-Force (Grieskirchen RZ2)
2019-12-04 03:25:02
159.203.182.127 attackbotsspam
2019-12-03T19:40:22.638081struts4.enskede.local sshd\[24710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.127  user=root
2019-12-03T19:40:25.353617struts4.enskede.local sshd\[24710\]: Failed password for root from 159.203.182.127 port 48656 ssh2
2019-12-03T19:48:13.532837struts4.enskede.local sshd\[24746\]: Invalid user jaimeluis from 159.203.182.127 port 53985
2019-12-03T19:48:13.540343struts4.enskede.local sshd\[24746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.127
2019-12-03T19:48:16.247975struts4.enskede.local sshd\[24746\]: Failed password for invalid user jaimeluis from 159.203.182.127 port 53985 ssh2
...
2019-12-04 03:23:18
217.199.175.231 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-12-04 03:35:19
158.69.204.172 attackspambots
Dec  3 16:29:11 cvbnet sshd[4474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.204.172 
Dec  3 16:29:13 cvbnet sshd[4474]: Failed password for invalid user garfias from 158.69.204.172 port 55680 ssh2
...
2019-12-04 03:41:17
139.59.37.209 attackspambots
Dec  3 19:38:39 server sshd\[27887\]: Invalid user xl from 139.59.37.209
Dec  3 19:38:39 server sshd\[27887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.37.209 
Dec  3 19:38:41 server sshd\[27887\]: Failed password for invalid user xl from 139.59.37.209 port 35506 ssh2
Dec  3 19:53:51 server sshd\[32424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.37.209  user=root
Dec  3 19:53:53 server sshd\[32424\]: Failed password for root from 139.59.37.209 port 37766 ssh2
...
2019-12-04 03:37:06
191.241.242.68 attackspambots
Dec  3 18:54:37 localhost sshd\[22991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.242.68  user=root
Dec  3 18:54:39 localhost sshd\[22991\]: Failed password for root from 191.241.242.68 port 13638 ssh2
Dec  3 19:01:50 localhost sshd\[23261\]: Invalid user taurick from 191.241.242.68 port 38752
Dec  3 19:01:50 localhost sshd\[23261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.242.68
Dec  3 19:01:52 localhost sshd\[23261\]: Failed password for invalid user taurick from 191.241.242.68 port 38752 ssh2
...
2019-12-04 03:22:51

最近上报的IP列表

161.149.35.219 237.45.51.103 86.69.151.63 86.125.75.43
32.83.59.9 205.172.198.144 121.17.179.242 137.63.179.142
93.221.11.128 94.197.96.205 148.176.144.149 3.9.174.96
89.34.187.3 36.58.99.118 149.124.152.238 31.78.184.51
52.138.63.109 69.78.234.243 250.55.13.131 134.206.162.67