必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.142.86.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.142.86.157.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112102 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 22 09:29:23 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 157.86.142.8.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.86.142.8.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.117 attackspambots
09.10.2019 06:39:34 SSH access blocked by firewall
2019-10-09 14:42:19
180.182.47.132 attackspambots
Oct  9 08:10:46 pornomens sshd\[16527\]: Invalid user @WSX!QAZ from 180.182.47.132 port 40750
Oct  9 08:10:46 pornomens sshd\[16527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
Oct  9 08:10:49 pornomens sshd\[16527\]: Failed password for invalid user @WSX!QAZ from 180.182.47.132 port 40750 ssh2
...
2019-10-09 14:50:45
222.186.173.119 attackspambots
Oct  9 09:00:27 v22018076622670303 sshd\[23663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.119  user=root
Oct  9 09:00:29 v22018076622670303 sshd\[23663\]: Failed password for root from 222.186.173.119 port 57399 ssh2
Oct  9 09:00:32 v22018076622670303 sshd\[23663\]: Failed password for root from 222.186.173.119 port 57399 ssh2
...
2019-10-09 15:03:38
195.181.168.138 attack
\[2019-10-09 03:10:22\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.181.168.138:55890' - Wrong password
\[2019-10-09 03:10:22\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-09T03:10:22.201-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7611",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.138/55890",Challenge="5cea1033",ReceivedChallenge="5cea1033",ReceivedHash="d4d7809dffb7e2b2251a4595fba43fe4"
\[2019-10-09 03:11:39\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.181.168.138:55171' - Wrong password
\[2019-10-09 03:11:39\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-09T03:11:39.357-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7700",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195
2019-10-09 15:14:14
165.22.146.167 attackbotsspam
Aug  9 10:28:55 server sshd\[38020\]: Invalid user ankit from 165.22.146.167
Aug  9 10:28:55 server sshd\[38020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.146.167
Aug  9 10:28:57 server sshd\[38020\]: Failed password for invalid user ankit from 165.22.146.167 port 41260 ssh2
...
2019-10-09 15:05:43
222.186.15.101 attackspam
SSH Brute Force, server-1 sshd[5627]: Failed password for root from 222.186.15.101 port 41971 ssh2
2019-10-09 14:35:49
80.211.179.154 attackspam
Oct  9 02:37:54 plusreed sshd[26438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.179.154  user=root
Oct  9 02:37:56 plusreed sshd[26438]: Failed password for root from 80.211.179.154 port 52492 ssh2
...
2019-10-09 15:11:22
182.61.58.131 attackbots
Oct  8 20:39:46 php1 sshd\[18565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.131  user=root
Oct  8 20:39:48 php1 sshd\[18565\]: Failed password for root from 182.61.58.131 port 47570 ssh2
Oct  8 20:43:34 php1 sshd\[19026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.131  user=root
Oct  8 20:43:35 php1 sshd\[19026\]: Failed password for root from 182.61.58.131 port 46576 ssh2
Oct  8 20:47:18 php1 sshd\[19494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.131  user=root
2019-10-09 15:00:49
125.167.223.65 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:17.
2019-10-09 14:59:26
62.210.101.81 attack
Oct  9 08:51:22 localhost sshd\[7349\]: Invalid user Passw0rt!234 from 62.210.101.81 port 48274
Oct  9 08:51:22 localhost sshd\[7349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.101.81
Oct  9 08:51:24 localhost sshd\[7349\]: Failed password for invalid user Passw0rt!234 from 62.210.101.81 port 48274 ssh2
2019-10-09 15:02:55
220.94.70.32 attackspam
Oct905:55:06server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[www]Oct905:55:07server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[anonymous]Oct905:55:12server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[forum-wbp]Oct905:55:13server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[forum-wbp]Oct905:55:17server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[www]Oct905:55:20server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[forum-wbp]Oct905:55:22server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[forum-wbp]Oct905:55:25server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[www]Oct905:55:27server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[forum-wbp]Oct905:55:30server4pure-ftpd:\(\?@220.94.70.32\)[WARNING]Authenticationfailedforuser[www]
2019-10-09 14:40:19
165.227.0.162 attackbots
Aug  3 00:20:31 server sshd\[217209\]: Invalid user plesk from 165.227.0.162
Aug  3 00:20:31 server sshd\[217209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.0.162
Aug  3 00:20:32 server sshd\[217209\]: Failed password for invalid user plesk from 165.227.0.162 port 37540 ssh2
...
2019-10-09 14:43:15
165.227.122.7 attackbots
May 20 18:26:06 server sshd\[21493\]: Invalid user team from 165.227.122.7
May 20 18:26:06 server sshd\[21493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.122.7
May 20 18:26:07 server sshd\[21493\]: Failed password for invalid user team from 165.227.122.7 port 40744 ssh2
...
2019-10-09 14:39:21
165.22.110.16 attackbots
Aug 10 04:24:55 server sshd\[230372\]: Invalid user httpd from 165.22.110.16
Aug 10 04:24:55 server sshd\[230372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.16
Aug 10 04:24:57 server sshd\[230372\]: Failed password for invalid user httpd from 165.22.110.16 port 36664 ssh2
...
2019-10-09 15:11:42
62.234.134.139 attackspambots
Oct  8 20:22:16 web9 sshd\[18033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.134.139  user=root
Oct  8 20:22:17 web9 sshd\[18033\]: Failed password for root from 62.234.134.139 port 55206 ssh2
Oct  8 20:26:41 web9 sshd\[18758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.134.139  user=root
Oct  8 20:26:43 web9 sshd\[18758\]: Failed password for root from 62.234.134.139 port 60406 ssh2
Oct  8 20:31:00 web9 sshd\[19420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.134.139  user=root
2019-10-09 14:49:57

最近上报的IP列表

1.11.199.72 92.117.244.180 217.110.95.229 223.72.117.212
47.100.224.51 119.29.239.230 167.172.7.203 106.14.43.122
45.75.33.47 45.75.33.68 1.173.23.253 25.114.190.133
157.255.217.245 37.99.44.52 128.199.208.26 140.125.240.44
209.97.162.49 209.97.162.115 167.71.201.196 209.97.162.37