必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.207.145.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.207.145.140.			IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122800 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 14:06:00 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 140.145.207.10.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.145.207.10.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.70.253.207 attackspam
HTTP: ThinkPHP CMS Getshell Vulnerability
HTTP: SQL Injection Attempt Detected
2019-10-04 06:05:48
110.253.16.64 attack
Unauthorised access (Oct  3) SRC=110.253.16.64 LEN=40 TTL=50 ID=19589 TCP DPT=8080 WINDOW=62723 SYN 
Unauthorised access (Oct  3) SRC=110.253.16.64 LEN=40 TTL=50 ID=3360 TCP DPT=8080 WINDOW=62723 SYN
2019-10-04 06:12:45
196.20.229.228 attackspam
Oct  3 23:39:36 meumeu sshd[8276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.20.229.228 
Oct  3 23:39:38 meumeu sshd[8276]: Failed password for invalid user xing from 196.20.229.228 port 51192 ssh2
Oct  3 23:45:29 meumeu sshd[9112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.20.229.228 
...
2019-10-04 05:58:48
179.184.23.195 attack
failed_logins
2019-10-04 06:32:43
49.235.214.68 attack
Oct  3 22:48:04 dev0-dcfr-rnet sshd[26955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Oct  3 22:48:06 dev0-dcfr-rnet sshd[26955]: Failed password for invalid user public from 49.235.214.68 port 40970 ssh2
Oct  3 22:52:03 dev0-dcfr-rnet sshd[27006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
2019-10-04 06:24:01
222.186.31.145 attackspambots
Oct  4 00:30:22 h2177944 sshd\[28290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.145  user=root
Oct  4 00:30:24 h2177944 sshd\[28290\]: Failed password for root from 222.186.31.145 port 46721 ssh2
Oct  4 00:30:26 h2177944 sshd\[28290\]: Failed password for root from 222.186.31.145 port 46721 ssh2
Oct  4 00:30:29 h2177944 sshd\[28290\]: Failed password for root from 222.186.31.145 port 46721 ssh2
...
2019-10-04 06:34:48
206.189.166.172 attack
Invalid user jasper from 206.189.166.172 port 53806
2019-10-04 06:20:53
39.135.1.160 attackspambots
Automatic report - Port Scan
2019-10-04 06:14:15
94.191.31.230 attackbotsspam
Oct  3 22:48:07 dev0-dcfr-rnet sshd[26957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.31.230
Oct  3 22:48:09 dev0-dcfr-rnet sshd[26957]: Failed password for invalid user dq from 94.191.31.230 port 54242 ssh2
Oct  3 22:52:24 dev0-dcfr-rnet sshd[27024]: Failed password for root from 94.191.31.230 port 32902 ssh2
2019-10-04 06:10:13
217.30.75.78 attackspam
Oct  3 11:45:39 php1 sshd\[24263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78  user=root
Oct  3 11:45:41 php1 sshd\[24263\]: Failed password for root from 217.30.75.78 port 35486 ssh2
Oct  3 11:49:47 php1 sshd\[24641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78  user=root
Oct  3 11:49:48 php1 sshd\[24641\]: Failed password for root from 217.30.75.78 port 56936 ssh2
Oct  3 11:54:06 php1 sshd\[25059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78  user=root
2019-10-04 05:56:57
117.44.168.126 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-04 06:20:35
49.88.112.78 attackbotsspam
Oct  4 00:00:28 tux-35-217 sshd\[31572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
Oct  4 00:00:30 tux-35-217 sshd\[31572\]: Failed password for root from 49.88.112.78 port 63078 ssh2
Oct  4 00:00:33 tux-35-217 sshd\[31572\]: Failed password for root from 49.88.112.78 port 63078 ssh2
Oct  4 00:00:35 tux-35-217 sshd\[31572\]: Failed password for root from 49.88.112.78 port 63078 ssh2
...
2019-10-04 06:03:39
156.196.244.188 attackbots
Honeypot attack, port: 445, PTR: host-156.196.188.244-static.tedata.net.
2019-10-04 06:13:17
94.176.141.57 attack
(Oct  4)  LEN=44 TTL=241 ID=29371 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=35550 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=46259 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=24925 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=50325 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=6787 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=14077 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=47903 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=32554 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=28287 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=24380 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=35206 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=45157 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=51546 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct  3)  LEN=44 TTL=241 ID=13493 DF TCP DPT=23 WINDOW=14600 S...
2019-10-04 05:56:12
139.59.94.225 attack
Oct  3 23:55:11 nextcloud sshd\[13449\]: Invalid user prueba1 from 139.59.94.225
Oct  3 23:55:11 nextcloud sshd\[13449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.94.225
Oct  3 23:55:14 nextcloud sshd\[13449\]: Failed password for invalid user prueba1 from 139.59.94.225 port 51764 ssh2
...
2019-10-04 06:21:22

最近上报的IP列表

104.83.60.216 114.51.11.239 180.152.111.138 226.93.217.215
25.160.126.59 25.74.91.98 31.145.114.103 23.206.253.46
100.159.241.120 60.216.149.232 140.247.241.94 82.67.254.116
45.95.110.172 196.139.21.5 200.137.67.194 28.173.224.208
41.141.80.248 218.156.46.118 42.64.148.172 54.108.86.237