必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Vilnius

省份(region): Vilnius

国家(country): Republic of Lithuania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.116.103.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.116.103.142.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020073002 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 31 09:08:32 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
142.103.116.89.in-addr.arpa domain name pointer 142.103.116.89.static.lrtc.lt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.103.116.89.in-addr.arpa	name = 142.103.116.89.static.lrtc.lt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.176.231.51 attackspam
66.176.231.51 - admin [03/Nov/2019:15:04:42 +0100] "POST /editBlackAndWhiteList HTTP/1.1" 404 161 "-" "ApiTool"
2019-11-04 05:29:42
51.159.57.28 attackbotsspam
auto-add
2019-11-04 05:27:44
5.188.62.5 attackbots
5.188.62.5 - - \[03/Nov/2019:17:17:50 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(Windows NT 5.1\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2228.0 Safari/537.36"
5.188.62.5 - - \[03/Nov/2019:17:17:50 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(Windows NT 5.1\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2226.0 Safari/537.36"
5.188.62.5 - - \[03/Nov/2019:17:17:50 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(Windows NT 5.1\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2225.0 Safari/537.36"
...
2019-11-04 05:24:34
114.67.236.25 attackspam
SSH/22 MH Probe, BF, Hack -
2019-11-04 05:31:51
154.0.78.230 attackbotsspam
namecheap spam
2019-11-04 05:18:52
187.131.211.5 attackbots
Nov  3 19:38:16 mail sshd[25111]: Failed password for root from 187.131.211.5 port 64206 ssh2
...
2019-11-04 05:16:22
45.136.108.67 attackspam
Connection by 45.136.108.67 on port: 5929 got caught by honeypot at 11/3/2019 2:27:46 PM
2019-11-04 05:17:27
116.12.200.194 attack
Unauthorized connection attempt from IP address 116.12.200.194 on Port 445(SMB)
2019-11-04 04:58:22
80.211.115.16 attackbotsspam
Nov  3 18:07:35 firewall sshd[19670]: Failed password for invalid user kreo from 80.211.115.16 port 51128 ssh2
Nov  3 18:11:59 firewall sshd[19715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.115.16  user=root
Nov  3 18:12:01 firewall sshd[19715]: Failed password for root from 80.211.115.16 port 37796 ssh2
...
2019-11-04 05:35:33
182.61.46.245 attackspambots
Nov  3 21:21:29 tux-35-217 sshd\[11461\]: Invalid user ys from 182.61.46.245 port 45054
Nov  3 21:21:29 tux-35-217 sshd\[11461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.245
Nov  3 21:21:31 tux-35-217 sshd\[11461\]: Failed password for invalid user ys from 182.61.46.245 port 45054 ssh2
Nov  3 21:25:43 tux-35-217 sshd\[11492\]: Invalid user ftpuser from 182.61.46.245 port 51662
Nov  3 21:25:43 tux-35-217 sshd\[11492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.245
...
2019-11-04 05:22:45
164.132.145.70 attack
Nov  3 17:56:34 SilenceServices sshd[27276]: Failed password for root from 164.132.145.70 port 33882 ssh2
Nov  3 18:00:30 SilenceServices sshd[29825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.145.70
Nov  3 18:00:32 SilenceServices sshd[29825]: Failed password for invalid user papiers from 164.132.145.70 port 45518 ssh2
2019-11-04 05:32:15
168.61.176.121 attackbots
Nov  3 15:29:51 mout sshd[19723]: Invalid user hill from 168.61.176.121 port 44384
2019-11-04 05:09:54
66.220.155.171 attack
$f2bV_matches
2019-11-04 05:19:33
51.75.126.115 attackbots
Nov  3 18:05:02 lnxded64 sshd[13656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.115
2019-11-04 05:15:32
109.86.188.179 attackspambots
Web application attack detected by fail2ban
2019-11-04 05:07:43

最近上报的IP列表

124.35.99.221 92.45.210.10 211.3.86.34 176.241.26.229
41.15.86.37 222.85.56.223 62.195.191.208 211.186.12.110
129.164.83.33 41.195.201.238 166.198.74.195 179.163.191.96
222.92.102.85 185.155.41.178 131.213.103.0 3.239.79.184
188.30.19.57 152.188.159.109 183.158.78.6 123.217.100.170