必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Denmark

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.164.220.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.164.220.140.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:57:08 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
140.220.164.131.in-addr.arpa domain name pointer 131-164-220-140-static.dk.customer.tdc.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.220.164.131.in-addr.arpa	name = 131-164-220-140-static.dk.customer.tdc.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.178 attack
May 31 19:22:51 vpn01 sshd[22701]: Failed password for root from 112.85.42.178 port 16102 ssh2
May 31 19:23:04 vpn01 sshd[22701]: error: maximum authentication attempts exceeded for root from 112.85.42.178 port 16102 ssh2 [preauth]
...
2020-06-01 01:35:30
150.109.47.167 attackbotsspam
 TCP (SYN) 150.109.47.167:43321 -> port 12112, len 44
2020-06-01 01:52:38
103.93.16.105 attack
2020-05-31T14:03:35.203624struts4.enskede.local sshd\[23941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105  user=root
2020-05-31T14:03:38.594580struts4.enskede.local sshd\[23941\]: Failed password for root from 103.93.16.105 port 52588 ssh2
2020-05-31T14:07:12.385299struts4.enskede.local sshd\[23950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105  user=root
2020-05-31T14:07:14.963105struts4.enskede.local sshd\[23950\]: Failed password for root from 103.93.16.105 port 55730 ssh2
2020-05-31T14:08:30.613514struts4.enskede.local sshd\[23953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105  user=root
...
2020-06-01 02:00:28
45.170.231.203 attack
port scan and connect, tcp 23 (telnet)
2020-06-01 01:31:39
184.168.193.160 attackspambots
MLV GET /1/wp-includes/wlwmanifest.xml
2020-06-01 01:57:19
178.217.169.247 attackbotsspam
May 31 17:19:16 ws25vmsma01 sshd[98922]: Failed password for root from 178.217.169.247 port 42706 ssh2
...
2020-06-01 01:48:36
114.242.139.19 attackspambots
May 31 17:08:25 marvibiene sshd[33767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.139.19  user=root
May 31 17:08:26 marvibiene sshd[33767]: Failed password for root from 114.242.139.19 port 51378 ssh2
May 31 17:13:00 marvibiene sshd[33859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.139.19  user=root
May 31 17:13:02 marvibiene sshd[33859]: Failed password for root from 114.242.139.19 port 49886 ssh2
...
2020-06-01 01:49:58
106.13.186.24 attackspambots
May 31 14:36:01 plex sshd[5056]: Invalid user vcamapp from 106.13.186.24 port 54378
2020-06-01 01:53:57
185.143.74.251 attack
May 31 19:13:16 mail postfix/smtpd\[27690\]: warning: unknown\[185.143.74.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 31 19:14:48 mail postfix/smtpd\[27690\]: warning: unknown\[185.143.74.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 31 19:45:19 mail postfix/smtpd\[28747\]: warning: unknown\[185.143.74.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 31 19:46:51 mail postfix/smtpd\[28515\]: warning: unknown\[185.143.74.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-01 01:49:18
35.231.211.161 attackspambots
May 31 19:14:25 abendstille sshd\[1141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161  user=root
May 31 19:14:27 abendstille sshd\[1141\]: Failed password for root from 35.231.211.161 port 34648 ssh2
May 31 19:17:52 abendstille sshd\[4263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161  user=root
May 31 19:17:55 abendstille sshd\[4263\]: Failed password for root from 35.231.211.161 port 37516 ssh2
May 31 19:21:04 abendstille sshd\[7571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161  user=root
...
2020-06-01 01:40:24
106.13.86.199 attack
May 31 14:04:11 prox sshd[32059]: Failed password for root from 106.13.86.199 port 50872 ssh2
2020-06-01 01:47:46
128.0.129.192 attack
Failed password for root from 128.0.129.192 port 42676 ssh2
2020-06-01 01:19:23
106.12.48.217 attackbots
SSH Brute-Force reported by Fail2Ban
2020-06-01 01:55:35
51.75.126.115 attackspambots
2020-05-31T21:22:29.130834vivaldi2.tree2.info sshd[25423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.ip-51-75-126.eu
2020-05-31T21:22:29.117234vivaldi2.tree2.info sshd[25423]: Invalid user admin from 51.75.126.115
2020-05-31T21:22:31.408654vivaldi2.tree2.info sshd[25423]: Failed password for invalid user admin from 51.75.126.115 port 47998 ssh2
2020-05-31T21:25:58.065041vivaldi2.tree2.info sshd[25556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.ip-51-75-126.eu  user=root
2020-05-31T21:25:59.944525vivaldi2.tree2.info sshd[25556]: Failed password for root from 51.75.126.115 port 52110 ssh2
...
2020-06-01 01:53:00
161.35.103.140 attackspambots
May 31 19:15:09 OPSO sshd\[11693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.103.140  user=root
May 31 19:15:11 OPSO sshd\[11693\]: Failed password for root from 161.35.103.140 port 43734 ssh2
May 31 19:15:23 OPSO sshd\[11830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.103.140  user=root
May 31 19:15:25 OPSO sshd\[11830\]: Failed password for root from 161.35.103.140 port 55132 ssh2
May 31 19:15:36 OPSO sshd\[11835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.103.140  user=root
2020-06-01 01:35:59

最近上报的IP列表

4.9.8.227 106.3.242.68 56.210.113.184 208.82.74.70
254.151.76.186 113.48.127.253 253.3.138.132 70.92.45.114
171.4.137.161 92.145.214.255 247.103.156.103 251.231.110.127
3.205.238.165 213.216.77.48 133.115.57.56 129.216.50.161
94.201.49.156 24.229.114.29 81.238.248.110 185.7.253.110