必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Donetsk

省份(region): Donets'ka Oblast'

国家(country): Ukraine

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): AMIK LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.237.109.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15738
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;91.237.109.142.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052202 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 24 00:29:02 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
142.109.237.91.in-addr.arpa domain name pointer 91-237-109-142.amik.dn.ua.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.109.237.91.in-addr.arpa	name = 91-237-109-142.amik.dn.ua.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.100.51 attackspam
Oct 24 03:55:43 www_kotimaassa_fi sshd[27198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.100.51
Oct 24 03:55:45 www_kotimaassa_fi sshd[27198]: Failed password for invalid user training from 139.199.100.51 port 55248 ssh2
...
2019-10-24 12:17:05
46.175.243.9 attack
Oct 21 05:58:03 odroid64 sshd\[5292\]: User root from 46.175.243.9 not allowed because not listed in AllowUsers
Oct 21 05:58:03 odroid64 sshd\[5292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9  user=root
Oct 21 05:58:05 odroid64 sshd\[5292\]: Failed password for invalid user root from 46.175.243.9 port 54424 ssh2
Oct 21 05:58:03 odroid64 sshd\[5292\]: User root from 46.175.243.9 not allowed because not listed in AllowUsers
Oct 21 05:58:03 odroid64 sshd\[5292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9  user=root
Oct 21 05:58:05 odroid64 sshd\[5292\]: Failed password for invalid user root from 46.175.243.9 port 54424 ssh2
...
2019-10-24 08:17:05
216.218.206.70 attackbots
50070/tcp 3389/tcp 8080/tcp...
[2019-08-26/10-23]29pkt,13pt.(tcp),1pt.(udp)
2019-10-24 12:04:33
164.132.111.76 attackspam
2019-10-24T03:52:10.834819shield sshd\[7424\]: Invalid user aliba from 164.132.111.76 port 46206
2019-10-24T03:52:10.838838shield sshd\[7424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.ip-164-132-111.eu
2019-10-24T03:52:12.986765shield sshd\[7424\]: Failed password for invalid user aliba from 164.132.111.76 port 46206 ssh2
2019-10-24T03:55:59.406729shield sshd\[8511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.ip-164-132-111.eu  user=root
2019-10-24T03:56:01.660064shield sshd\[8511\]: Failed password for root from 164.132.111.76 port 57300 ssh2
2019-10-24 12:02:55
49.235.175.217 attackbotsspam
Oct 24 02:53:23 sauna sshd[189016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.175.217
Oct 24 02:53:25 sauna sshd[189016]: Failed password for invalid user admin from 49.235.175.217 port 55660 ssh2
...
2019-10-24 08:14:46
104.219.250.214 attackspambots
Trying ports that it shouldn't be.
2019-10-24 12:02:12
110.18.243.70 attack
2019-10-24T10:55:59.524727enmeeting.mahidol.ac.th sshd\[8138\]: User root from 110.18.243.70 not allowed because not listed in AllowUsers
2019-10-24T10:55:59.651670enmeeting.mahidol.ac.th sshd\[8138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.18.243.70  user=root
2019-10-24T10:56:01.897498enmeeting.mahidol.ac.th sshd\[8138\]: Failed password for invalid user root from 110.18.243.70 port 42310 ssh2
...
2019-10-24 12:03:24
45.55.158.8 attackspam
Oct 22 08:18:15 odroid64 sshd\[1604\]: User root from 45.55.158.8 not allowed because not listed in AllowUsers
Oct 22 08:18:15 odroid64 sshd\[1604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8  user=root
Oct 22 08:18:17 odroid64 sshd\[1604\]: Failed password for invalid user root from 45.55.158.8 port 50934 ssh2
Oct 22 08:18:15 odroid64 sshd\[1604\]: User root from 45.55.158.8 not allowed because not listed in AllowUsers
Oct 22 08:18:15 odroid64 sshd\[1604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8  user=root
Oct 22 08:18:17 odroid64 sshd\[1604\]: Failed password for invalid user root from 45.55.158.8 port 50934 ssh2
Oct 22 08:18:15 odroid64 sshd\[1604\]: User root from 45.55.158.8 not allowed because not listed in AllowUsers
Oct 22 08:18:15 odroid64 sshd\[1604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8
...
2019-10-24 08:23:45
46.101.27.6 attack
Oct 23 09:38:26 XXX sshd[31640]: Invalid user ftpuser from 46.101.27.6 port 34806
2019-10-24 08:19:09
51.255.174.215 attackspambots
Invalid user www from 51.255.174.215 port 52074
2019-10-24 08:10:39
113.109.247.37 attack
2019-10-24T03:55:54.267436abusebot-5.cloudsearch.cf sshd\[14058\]: Invalid user mailer from 113.109.247.37 port 17998
2019-10-24 12:09:57
167.71.229.184 attackbotsspam
Invalid user Admin from 167.71.229.184 port 39084
2019-10-24 08:24:41
94.23.32.126 attackbots
Wordpress bruteforce
2019-10-24 12:10:50
112.199.95.227 attackspambots
Unauthorised access (Oct 23) SRC=112.199.95.227 LEN=40 TOS=0x08 TTL=242 ID=46236 TCP DPT=445 WINDOW=1024 SYN
2019-10-24 08:13:01
84.255.152.10 attackspam
Oct 24 01:23:26 XXX sshd[59446]: Invalid user Jewel from 84.255.152.10 port 54983
2019-10-24 08:14:27

最近上报的IP列表

177.63.192.144 223.220.211.177 5.32.168.184 2.209.129.194
1.10.178.152 202.46.63.38 196.165.215.74 97.157.245.4
221.53.13.115 50.53.230.251 201.184.241.45 177.66.114.96
165.82.248.76 5.179.244.249 222.244.188.48 52.143.134.116
45.195.35.119 139.59.70.143 27.159.230.80 113.162.79.89