必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.74.126.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.74.126.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:40:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
140.126.74.119.in-addr.arpa domain name pointer bb119-74-126-140.singnet.com.sg.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.126.74.119.in-addr.arpa	name = bb119-74-126-140.singnet.com.sg.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
156.212.191.64 attackbots
Unauthorized connection attempt from IP address 156.212.191.64 on Port 445(SMB)
2019-12-05 01:50:22
190.186.32.81 attackspam
Unauthorized connection attempt from IP address 190.186.32.81 on Port 445(SMB)
2019-12-05 02:01:20
101.230.236.177 attack
no
2019-12-05 01:48:12
122.180.244.119 attack
Unauthorized connection attempt from IP address 122.180.244.119 on Port 445(SMB)
2019-12-05 01:36:20
103.89.91.33 attackbots
Dec  4 18:07:55 andromeda postfix/smtpd\[39575\]: warning: unknown\[103.89.91.33\]: SASL LOGIN authentication failed: authentication failure
Dec  4 18:07:55 andromeda postfix/smtpd\[39575\]: warning: unknown\[103.89.91.33\]: SASL LOGIN authentication failed: authentication failure
Dec  4 18:07:56 andromeda postfix/smtpd\[39575\]: warning: unknown\[103.89.91.33\]: SASL LOGIN authentication failed: authentication failure
Dec  4 18:07:57 andromeda postfix/smtpd\[39575\]: warning: unknown\[103.89.91.33\]: SASL LOGIN authentication failed: authentication failure
Dec  4 18:07:58 andromeda postfix/smtpd\[39575\]: warning: unknown\[103.89.91.33\]: SASL LOGIN authentication failed: authentication failure
2019-12-05 01:50:57
128.199.211.110 attack
Dec  4 13:21:42 nextcloud sshd\[31296\]: Invalid user guest from 128.199.211.110
Dec  4 13:21:42 nextcloud sshd\[31296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.110
Dec  4 13:21:44 nextcloud sshd\[31296\]: Failed password for invalid user guest from 128.199.211.110 port 39549 ssh2
...
2019-12-05 01:58:01
77.60.37.105 attack
Brute-force attempt banned
2019-12-05 01:41:29
187.1.57.210 attackbots
Dec  4 01:29:23 kapalua sshd\[29138\]: Invalid user ftpuser from 187.1.57.210
Dec  4 01:29:23 kapalua sshd\[29138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-187-1-57-210.isp.valenet.com.br
Dec  4 01:29:25 kapalua sshd\[29138\]: Failed password for invalid user ftpuser from 187.1.57.210 port 46234 ssh2
Dec  4 01:36:37 kapalua sshd\[29765\]: Invalid user subzero from 187.1.57.210
Dec  4 01:36:37 kapalua sshd\[29765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-187-1-57-210.isp.valenet.com.br
2019-12-05 02:12:59
202.107.238.94 attackbotsspam
Dec  4 18:35:19 minden010 sshd[10168]: Failed password for uucp from 202.107.238.94 port 50863 ssh2
Dec  4 18:41:37 minden010 sshd[13742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.107.238.94
Dec  4 18:41:39 minden010 sshd[13742]: Failed password for invalid user kaleem from 202.107.238.94 port 51770 ssh2
...
2019-12-05 01:49:41
111.93.235.74 attackspambots
Dec  4 08:50:15 server sshd\[23874\]: Failed password for invalid user webmaste from 111.93.235.74 port 55117 ssh2
Dec  4 20:16:02 server sshd\[16824\]: Invalid user rundmc from 111.93.235.74
Dec  4 20:16:02 server sshd\[16824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74 
Dec  4 20:16:05 server sshd\[16824\]: Failed password for invalid user rundmc from 111.93.235.74 port 36958 ssh2
Dec  4 20:30:27 server sshd\[21544\]: Invalid user recchia from 111.93.235.74
Dec  4 20:30:27 server sshd\[21544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74 
...
2019-12-05 01:43:41
185.78.75.199 attack
Automatic report - Port Scan Attack
2019-12-05 01:57:44
51.252.2.33 attackbotsspam
Unauthorized connection attempt from IP address 51.252.2.33 on Port 445(SMB)
2019-12-05 01:39:13
113.91.141.150 attackbotsspam
Unauthorized connection attempt from IP address 113.91.141.150 on Port 445(SMB)
2019-12-05 02:13:50
122.52.141.185 attackspam
Unauthorized connection attempt from IP address 122.52.141.185 on Port 445(SMB)
2019-12-05 01:47:26
60.250.164.169 attackbots
Dec  4 14:25:57 * sshd[10557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.164.169
Dec  4 14:25:59 * sshd[10557]: Failed password for invalid user abc123 from 60.250.164.169 port 38522 ssh2
2019-12-05 01:55:03

最近上报的IP列表

50.186.106.10 74.11.223.22 253.194.123.173 127.22.232.5
107.245.31.59 204.217.139.39 56.45.57.182 230.159.76.7
66.120.106.149 15.95.88.237 59.236.247.242 130.223.195.103
170.188.9.44 121.222.71.34 242.102.7.164 78.32.166.169
28.76.226.213 217.100.196.130 197.185.45.102 220.9.11.71