必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Szczecin

省份(region): Zachodniopomorskie

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.94.30.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.94.30.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032800 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 28 18:01:21 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 142.30.94.80.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.30.94.80.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.120.106.254 attackbotsspam
Aug 12 06:55:10 localhost sshd\[26991\]: Invalid user paulb from 220.120.106.254 port 51946
Aug 12 06:55:10 localhost sshd\[26991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254
Aug 12 06:55:12 localhost sshd\[26991\]: Failed password for invalid user paulb from 220.120.106.254 port 51946 ssh2
2019-08-12 12:56:21
35.203.148.246 attack
Aug 12 09:49:49 vibhu-HP-Z238-Microtower-Workstation sshd\[30704\]: Invalid user quin from 35.203.148.246
Aug 12 09:49:49 vibhu-HP-Z238-Microtower-Workstation sshd\[30704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.203.148.246
Aug 12 09:49:51 vibhu-HP-Z238-Microtower-Workstation sshd\[30704\]: Failed password for invalid user quin from 35.203.148.246 port 36534 ssh2
Aug 12 09:54:00 vibhu-HP-Z238-Microtower-Workstation sshd\[30833\]: Invalid user user2 from 35.203.148.246
Aug 12 09:54:00 vibhu-HP-Z238-Microtower-Workstation sshd\[30833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.203.148.246
...
2019-08-12 13:08:48
218.92.0.141 attack
Aug 12 06:36:05 lnxweb62 sshd[23450]: Failed password for root from 218.92.0.141 port 23499 ssh2
Aug 12 06:36:07 lnxweb62 sshd[23450]: Failed password for root from 218.92.0.141 port 23499 ssh2
Aug 12 06:36:10 lnxweb62 sshd[23450]: Failed password for root from 218.92.0.141 port 23499 ssh2
Aug 12 06:36:13 lnxweb62 sshd[23450]: Failed password for root from 218.92.0.141 port 23499 ssh2
2019-08-12 12:40:01
157.230.248.65 attack
Aug 12 05:01:44 www_kotimaassa_fi sshd[27465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
Aug 12 05:01:46 www_kotimaassa_fi sshd[27465]: Failed password for invalid user hayden from 157.230.248.65 port 27032 ssh2
...
2019-08-12 13:06:11
118.24.50.253 attackspambots
Aug 12 06:47:26 icinga sshd[11793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.50.253
Aug 12 06:47:28 icinga sshd[11793]: Failed password for invalid user payroll from 118.24.50.253 port 44038 ssh2
...
2019-08-12 12:51:05
141.98.9.205 attack
Aug 12 06:33:54 Server12 postfix/smtpd[10912]: warning: unknown[141.98.9.205]: SASL LOGIN authentication failed: authentication failure
2019-08-12 12:42:54
51.83.76.139 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.76.139  user=root
Failed password for root from 51.83.76.139 port 49924 ssh2
Failed password for root from 51.83.76.139 port 49924 ssh2
Failed password for root from 51.83.76.139 port 49924 ssh2
Failed password for root from 51.83.76.139 port 49924 ssh2
2019-08-12 12:39:09
125.63.68.2 attack
Aug 12 02:12:35 vtv3 sshd\[4404\]: Invalid user camden from 125.63.68.2 port 49390
Aug 12 02:12:35 vtv3 sshd\[4404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.63.68.2
Aug 12 02:12:37 vtv3 sshd\[4404\]: Failed password for invalid user camden from 125.63.68.2 port 49390 ssh2
Aug 12 02:18:24 vtv3 sshd\[7024\]: Invalid user katie from 125.63.68.2 port 45752
Aug 12 02:18:24 vtv3 sshd\[7024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.63.68.2
Aug 12 02:29:31 vtv3 sshd\[12085\]: Invalid user cacti from 125.63.68.2 port 38255
Aug 12 02:29:31 vtv3 sshd\[12085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.63.68.2
Aug 12 02:29:33 vtv3 sshd\[12085\]: Failed password for invalid user cacti from 125.63.68.2 port 38255 ssh2
Aug 12 02:35:12 vtv3 sshd\[15665\]: Invalid user radvd from 125.63.68.2 port 34619
Aug 12 02:35:12 vtv3 sshd\[15665\]: pam_unix\(sshd:auth\): aut
2019-08-12 13:18:45
185.234.218.120 attackbots
Aug 12 06:37:55 herz-der-gamer postfix/smtpd[2906]: warning: unknown[185.234.218.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 06:51:39 herz-der-gamer postfix/smtpd[3476]: warning: unknown[185.234.218.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 13:04:09
223.145.113.178 attackbots
Bruteforce on SSH Honeypot
2019-08-12 13:00:49
193.32.161.48 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-12 13:01:55
193.112.74.137 attackbotsspam
Invalid user craven from 193.112.74.137 port 55500
2019-08-12 13:15:10
37.211.11.245 attackspambots
Aug 12 06:02:12 andromeda sshd\[40292\]: Invalid user thomas from 37.211.11.245 port 59858
Aug 12 06:02:12 andromeda sshd\[40292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.211.11.245
Aug 12 06:02:14 andromeda sshd\[40292\]: Failed password for invalid user thomas from 37.211.11.245 port 59858 ssh2
2019-08-12 12:41:29
177.124.216.106 attackspam
Tried sshing with brute force.
2019-08-12 13:15:48
54.39.145.59 attack
Aug 12 07:00:59 meumeu sshd[24796]: Failed password for invalid user test from 54.39.145.59 port 54994 ssh2
Aug 12 07:05:12 meumeu sshd[25202]: Failed password for invalid user nur from 54.39.145.59 port 46452 ssh2
...
2019-08-12 13:22:53

最近上报的IP列表

216.169.174.19 219.113.230.8 20.198.40.58 246.139.228.206
21.161.214.94 208.94.69.124 39.237.202.231 167.59.255.98
92.233.89.52 209.75.157.52 204.247.166.220 44.39.89.43
3.49.205.104 79.119.71.131 98.103.188.154 55.1.166.61
154.114.114.163 137.177.71.180 221.45.59.194 251.178.168.198