必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
1.1.140.126 attackspambots
unauthorized connection attempt
2020-02-19 16:59:24
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.140.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.140.34.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 164 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 04:38:56 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
34.140.1.1.in-addr.arpa domain name pointer node-2ea.pool-1-1.dynamic.totinternet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.140.1.1.in-addr.arpa	name = node-2ea.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.72.254.71 attackbots
Jul 12 05:16:58 rpi sshd[29627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.254.71 
Jul 12 05:17:00 rpi sshd[29627]: Failed password for invalid user to from 61.72.254.71 port 44148 ssh2
2019-07-12 12:24:39
46.101.101.66 attack
Invalid user booking from 46.101.101.66 port 40778
2019-07-12 12:19:09
77.45.85.89 attackspambots
SMTP-sasl brute force
...
2019-07-12 12:34:09
3.83.13.255 attackspambots
[portscan] Port scan
2019-07-12 12:27:31
116.111.98.63 attackspambots
Invalid user admin from 116.111.98.63 port 56785
2019-07-12 12:02:15
206.189.136.160 attackspam
Jul 12 05:11:00 icinga sshd[25874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.160
Jul 12 05:11:03 icinga sshd[25874]: Failed password for invalid user earl from 206.189.136.160 port 54618 ssh2
...
2019-07-12 12:21:03
141.98.81.81 attackbots
2019-07-11 UTC: 1x - admin
2019-07-12 11:58:31
188.166.72.240 attackspambots
IP attempted unauthorised action
2019-07-12 11:53:12
142.93.39.29 attack
SSH Brute Force
2019-07-12 11:57:44
178.128.124.83 attackspam
IP attempted unauthorised action
2019-07-12 11:54:41
156.155.136.254 attack
12.07.2019 02:40:48 SSH access blocked by firewall
2019-07-12 11:57:05
139.59.17.173 attackspam
$f2bV_matches
2019-07-12 11:43:29
180.175.8.88 attackspambots
Invalid user admin from 180.175.8.88 port 54050
2019-07-12 11:54:11
67.217.148.199 attackspam
Spamassassin_67.217.148.199
2019-07-12 12:24:11
67.207.86.74 attackspambots
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-12 02:00:18]
2019-07-12 12:18:17

最近上报的IP列表

178.84.176.121 1.1.140.54 1.1.140.74 1.1.141.106
1.1.141.161 1.1.142.113 1.1.142.120 1.1.142.130
112.83.157.199 1.1.142.208 1.1.142.25 1.1.142.254
1.1.142.41 1.1.143.109 1.1.143.129 1.1.143.15
1.1.143.18 1.1.143.189 1.1.143.62 1.1.143.74