必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): Ziggo B.V.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackbots
Unauthorized connection attempt detected from IP address 94.209.140.142 to port 2220 [J]
2020-02-23 13:31:56
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.209.140.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33921
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.209.140.142.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022300 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 13:31:51 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
142.140.209.94.in-addr.arpa domain name pointer 94-209-140-142.cable.dynamic.v4.ziggo.nl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.140.209.94.in-addr.arpa	name = 94-209-140-142.cable.dynamic.v4.ziggo.nl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.43.221.198 attack
Honeypot attack, port: 23, PTR: 114-43-221-198.dynamic-ip.hinet.net.
2019-09-27 03:28:11
119.28.29.169 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2019-09-27 03:09:24
89.36.220.145 attack
Sep 26 12:28:10 TORMINT sshd\[16197\]: Invalid user resumes from 89.36.220.145
Sep 26 12:28:10 TORMINT sshd\[16197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.220.145
Sep 26 12:28:13 TORMINT sshd\[16197\]: Failed password for invalid user resumes from 89.36.220.145 port 33850 ssh2
...
2019-09-27 02:58:05
73.91.40.171 attackbots
Honeypot attack, port: 23, PTR: c-73-91-40-171.hsd1.fl.comcast.net.
2019-09-27 03:17:05
222.72.39.138 attackspambots
Unauthorized connection attempt from IP address 222.72.39.138 on Port 445(SMB)
2019-09-27 02:57:00
59.99.8.60 attack
445/tcp
[2019-09-26]1pkt
2019-09-27 03:17:23
93.67.105.216 attack
Honeypot attack, port: 81, PTR: net-93-67-105-216.cust.vodafonedsl.it.
2019-09-27 02:56:36
193.194.69.99 attackspambots
Sep 26 08:17:05 lcprod sshd\[3057\]: Invalid user raph from 193.194.69.99
Sep 26 08:17:05 lcprod sshd\[3057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.69.99
Sep 26 08:17:07 lcprod sshd\[3057\]: Failed password for invalid user raph from 193.194.69.99 port 60232 ssh2
Sep 26 08:21:08 lcprod sshd\[3415\]: Invalid user zxcloudsetup from 193.194.69.99
Sep 26 08:21:08 lcprod sshd\[3415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.69.99
2019-09-27 02:52:53
210.212.94.210 attackspam
Unauthorized connection attempt from IP address 210.212.94.210 on Port 445(SMB)
2019-09-27 03:13:20
178.62.181.74 attackbots
$f2bV_matches
2019-09-27 03:15:55
121.9.226.219 attackspambots
Automatic report - CMS Brute-Force Attack
2019-09-27 03:07:36
27.106.117.186 attackspam
Unauthorized connection attempt from IP address 27.106.117.186 on Port 445(SMB)
2019-09-27 03:22:04
222.87.0.79 attackspam
2019-09-26T05:33:52.562755suse-nuc sshd[23033]: Invalid user test from 222.87.0.79 port 43947
...
2019-09-27 03:09:46
179.126.140.78 attackbots
Unauthorized connection attempt from IP address 179.126.140.78 on Port 445(SMB)
2019-09-27 03:03:34
185.51.201.102 attack
Honeypot attack, port: 445, PTR: 185.51.201.102.shahrad.net.
2019-09-27 03:14:40

最近上报的IP列表

117.60.90.248 187.102.54.188 52.168.142.54 138.68.41.74
42.2.142.199 223.111.144.148 54.233.243.176 220.133.196.82
50.115.168.100 91.121.173.186 117.50.34.167 122.117.122.231
187.103.82.89 87.229.120.152 113.188.225.161 152.168.210.101
111.67.194.109 78.47.18.60 93.174.115.147 129.221.37.113