必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amagasaki

省份(region): Hyōgo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.140.219.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.140.219.34.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 11:05:55 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
34.219.140.101.in-addr.arpa domain name pointer 101-140-219-34f1.kyt1.eonet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.219.140.101.in-addr.arpa	name = 101-140-219-34f1.kyt1.eonet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.175.168.144 attackbotsspam
20/5/8@00:35:00: FAIL: Alarm-Network address from=1.175.168.144
20/5/8@00:35:00: FAIL: Alarm-Network address from=1.175.168.144
...
2020-05-08 12:48:26
218.17.185.31 attackspambots
May  8 05:58:09 163-172-32-151 sshd[13494]: Invalid user carmel from 218.17.185.31 port 60026
...
2020-05-08 12:49:40
102.177.145.221 attackbots
May  8 07:06:31 PorscheCustomer sshd[5618]: Failed password for root from 102.177.145.221 port 49094 ssh2
May  8 07:11:20 PorscheCustomer sshd[5766]: Failed password for root from 102.177.145.221 port 59362 ssh2
...
2020-05-08 13:16:48
49.234.150.207 attack
May  8 06:59:51 vps639187 sshd\[3945\]: Invalid user carl from 49.234.150.207 port 48760
May  8 06:59:51 vps639187 sshd\[3945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.150.207
May  8 06:59:52 vps639187 sshd\[3945\]: Failed password for invalid user carl from 49.234.150.207 port 48760 ssh2
...
2020-05-08 13:07:10
125.227.236.60 attack
$f2bV_matches
2020-05-08 12:58:46
49.235.49.150 attack
2020-05-08T04:08:51.997011shield sshd\[10893\]: Invalid user adp from 49.235.49.150 port 45668
2020-05-08T04:08:52.000479shield sshd\[10893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.49.150
2020-05-08T04:08:54.623321shield sshd\[10893\]: Failed password for invalid user adp from 49.235.49.150 port 45668 ssh2
2020-05-08T04:14:12.022521shield sshd\[12663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.49.150  user=root
2020-05-08T04:14:13.712050shield sshd\[12663\]: Failed password for root from 49.235.49.150 port 46734 ssh2
2020-05-08 12:43:00
122.51.223.155 attackbots
May  8 06:32:48 vpn01 sshd[3869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.223.155
May  8 06:32:50 vpn01 sshd[3869]: Failed password for invalid user user from 122.51.223.155 port 43700 ssh2
...
2020-05-08 12:53:59
194.61.55.40 attackbots
May  8 04:10:35 localhost sshd[4512]: Invalid user pi from 194.61.55.40 port 2789
May  8 04:10:35 localhost sshd[4512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.55.40
May  8 04:10:35 localhost sshd[4512]: Invalid user pi from 194.61.55.40 port 2789
May  8 04:10:36 localhost sshd[4512]: Failed password for invalid user pi from 194.61.55.40 port 2789 ssh2
May  8 04:10:37 localhost sshd[4524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.55.40  user=root
May  8 04:10:39 localhost sshd[4524]: Failed password for root from 194.61.55.40 port 4055 ssh2
...
2020-05-08 12:56:52
217.163.30.151 attack
hi
2020-05-08 13:08:27
103.209.147.75 attack
May  8 06:48:06 localhost sshd\[22435\]: Invalid user dux from 103.209.147.75
May  8 06:48:06 localhost sshd\[22435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.209.147.75
May  8 06:48:08 localhost sshd\[22435\]: Failed password for invalid user dux from 103.209.147.75 port 35774 ssh2
May  8 06:52:57 localhost sshd\[22691\]: Invalid user nd from 103.209.147.75
May  8 06:52:57 localhost sshd\[22691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.209.147.75
...
2020-05-08 13:09:55
61.53.12.199 attackbotsspam
[portscan] Port scan
2020-05-08 13:00:34
23.116.185.114 attackspam
May  8 05:57:25 debian-2gb-nbg1-2 kernel: \[11169128.137849\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=23.116.185.114 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=30760 PROTO=TCP SPT=42736 DPT=23 WINDOW=35800 RES=0x00 SYN URGP=0
2020-05-08 13:19:21
58.152.50.202 attackbotsspam
May  8 06:14:09 inter-technics sshd[6868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.50.202  user=root
May  8 06:14:11 inter-technics sshd[6868]: Failed password for root from 58.152.50.202 port 42550 ssh2
May  8 06:22:11 inter-technics sshd[7625]: Invalid user fileshare from 58.152.50.202 port 38672
May  8 06:22:11 inter-technics sshd[7625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.50.202
May  8 06:22:11 inter-technics sshd[7625]: Invalid user fileshare from 58.152.50.202 port 38672
May  8 06:22:12 inter-technics sshd[7625]: Failed password for invalid user fileshare from 58.152.50.202 port 38672 ssh2
...
2020-05-08 13:16:00
80.211.98.67 attack
2020-05-08T05:51:03.692547vps773228.ovh.net sshd[13206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.98.67  user=root
2020-05-08T05:51:05.698349vps773228.ovh.net sshd[13206]: Failed password for root from 80.211.98.67 port 55540 ssh2
2020-05-08T05:54:36.423938vps773228.ovh.net sshd[13249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.98.67  user=root
2020-05-08T05:54:39.002228vps773228.ovh.net sshd[13249]: Failed password for root from 80.211.98.67 port 36760 ssh2
2020-05-08T05:58:05.339479vps773228.ovh.net sshd[13314]: Invalid user kula from 80.211.98.67 port 46218
...
2020-05-08 12:52:51
187.167.192.58 attackspam
Automatic report - Port Scan Attack
2020-05-08 12:39:49

最近上报的IP列表

101.133.165.31 101.178.140.110 101.200.150.5 101.200.216.156
101.200.74.24 101.200.84.124 101.255.171.22 101.255.93.254
101.32.179.156 68.5.204.75 101.32.221.238 101.36.121.165
101.36.179.184 101.37.135.234 101.37.172.177 55.143.120.53
101.37.28.169 101.37.79.215 101.50.3.100 101.50.84.232