必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.140.207.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.140.207.127.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 15:02:06 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 127.207.140.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.207.140.132.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.142.209.49 attack
Oct  1 19:12:58 SilenceServices sshd[31246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.142.209.49
Oct  1 19:13:00 SilenceServices sshd[31246]: Failed password for invalid user lamarca from 188.142.209.49 port 38622 ssh2
Oct  1 19:19:43 SilenceServices sshd[638]: Failed password for root from 188.142.209.49 port 52372 ssh2
2019-10-02 01:28:13
45.116.232.60 attackspambots
2019-10-0114:13:251iFH1w-0007Ac-QS\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[1.38.181.4]:41145P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2151id=A8832AC4-30A5-4FCC-B99D-0E3AAA1FB188@imsuisse-sa.chT=""forjan.zimmerman@honeywell.comjanet.lovely@patriot-consulting.comJasmine.Donnell@nationstarmail.comjaymelee@comcast.netjcady@aglresources.com2019-10-0114:13:261iFH1x-0007Cd-71\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[45.116.232.60]:62375P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2757id=FD2DFD47-54A8-4B4F-B6CB-D9CC2E40781E@imsuisse-sa.chT=""forangel_m2468@yahoo.comjessmarangel@hotmail.comj7671@hotmail.comLittlestrauss@aol.comsuperstarsimo60@aol.combitzyboo16@live.com2019-10-0114:13:211iFH1r-00078n-Vv\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[202.134.9.131]:31296P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2249id=2F568067-D02C-451B-B08E-B14B1C1851D8@imsuisse-sa.chT="\
2019-10-02 01:44:03
190.90.239.45 attackbots
445/tcp 445/tcp 445/tcp...
[2019-08-16/10-01]14pkt,1pt.(tcp)
2019-10-02 01:38:29
45.116.233.17 attackspam
2019-10-0114:13:441iFH2F-0007L4-DK\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[37.111.227.130]:18243P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=1727id=9787D3F8-33C3-4FB8-BD0F-4B38CB017635@imsuisse-sa.chT=""forsmilealdatime1@yahoo.comyourmom.tetley66@hotmail.comtviesselmann@yahoo.com2019-10-0114:13:451iFH2G-0007KL-Pf\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[47.29.232.170]:49650P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2334id=2A24A501-74D6-4532-BA43-7CB11CFACA35@imsuisse-sa.chT=""forrheadley@wth.comheidiatienza@yahoo.comhelen.smith@teenchallenge.orghille137@aol.comraeann@spro.netmillioninsale2@yahoo.commhorvath@juliancharterschool.orgpkducky@cox.net2019-10-0114:13:471iFH2I-0007Im-D3\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[157.46.114.141]:41412P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2764id=81DCAC55-729A-436E-BA3A-FD27A9820FB9@imsuisse-sa.chT=""foractuan@char
2019-10-02 01:16:33
203.101.186.205 attack
2019-10-0114:13:281iFH1z-0007Ec-QH\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[106.209.152.140]:10292P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2105id=6036D636-BC08-468B-BA11-714F80326330@imsuisse-sa.chT=""forshysmile88@yahoo.comsitstill2000@yahoo.comslundy47@yahoo.comsmileymac16@aol.comsoosbednbreakfast@alaska.comthomasninan@juno.com2019-10-0114:13:321iFH24-0007GG-1l\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[154.121.26.237]:12753P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2050id=92603003-68FE-40AE-BBE3-622D7E99EBFE@imsuisse-sa.chT=""forvictoria_l_stull@msn.comsyeung@rubiconproject.com2019-10-0114:13:341iFH24-0007EJ-TT\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[157.39.83.216]:53267P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2404id=0C10C69B-15D3-4CB2-B38F-ADD65588F41B@imsuisse-sa.chT=""foremmadarby10@yahoo.co.ukgillgoddard20@btinternet.comjacqui_keyworth@sky.comjil
2019-10-02 01:36:22
187.142.203.174 attack
Automatic report - Port Scan Attack
2019-10-02 01:20:21
99.185.76.161 attackspam
Oct  1 17:03:43 *** sshd[3161]: Invalid user tomcat from 99.185.76.161
2019-10-02 01:10:12
188.19.178.86 attack
port scan and connect, tcp 23 (telnet)
2019-10-02 01:30:15
92.63.106.108 attackbotsspam
Oct  1 14:28:42 ip-172-31-62-245 sshd\[8445\]: Invalid user admin from 92.63.106.108\
Oct  1 14:28:43 ip-172-31-62-245 sshd\[8445\]: Failed password for invalid user admin from 92.63.106.108 port 36760 ssh2\
Oct  1 14:32:59 ip-172-31-62-245 sshd\[8463\]: Invalid user ts from 92.63.106.108\
Oct  1 14:33:01 ip-172-31-62-245 sshd\[8463\]: Failed password for invalid user ts from 92.63.106.108 port 57140 ssh2\
Oct  1 14:37:19 ip-172-31-62-245 sshd\[8492\]: Invalid user ryank from 92.63.106.108\
2019-10-02 01:12:42
112.229.182.212 attackspambots
Automated reporting of FTP Brute Force
2019-10-02 01:51:03
196.28.101.78 attack
445/tcp 445/tcp 445/tcp...
[2019-08-03/10-01]17pkt,1pt.(tcp)
2019-10-02 01:32:22
121.126.161.117 attackbotsspam
Oct  1 18:24:23 microserver sshd[49918]: Invalid user shirley from 121.126.161.117 port 36492
Oct  1 18:24:23 microserver sshd[49918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117
Oct  1 18:24:25 microserver sshd[49918]: Failed password for invalid user shirley from 121.126.161.117 port 36492 ssh2
Oct  1 18:29:32 microserver sshd[50590]: Invalid user M from 121.126.161.117 port 48848
Oct  1 18:29:32 microserver sshd[50590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117
Oct  1 18:40:27 microserver sshd[52344]: Invalid user zcy from 121.126.161.117 port 45314
Oct  1 18:40:27 microserver sshd[52344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117
Oct  1 18:40:29 microserver sshd[52344]: Failed password for invalid user zcy from 121.126.161.117 port 45314 ssh2
Oct  1 18:45:41 microserver sshd[53026]: Invalid user cj from 121.126.161.117 port
2019-10-02 01:10:44
49.69.200.63 attackbots
Oct  1 15:43:28 Ubuntu-1404-trusty-64-minimal sshd\[10041\]: Invalid user admin from 49.69.200.63
Oct  1 15:43:28 Ubuntu-1404-trusty-64-minimal sshd\[10041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.69.200.63
Oct  1 15:43:30 Ubuntu-1404-trusty-64-minimal sshd\[10041\]: Failed password for invalid user admin from 49.69.200.63 port 1870 ssh2
Oct  1 15:43:33 Ubuntu-1404-trusty-64-minimal sshd\[10041\]: Failed password for invalid user admin from 49.69.200.63 port 1870 ssh2
Oct  1 15:43:35 Ubuntu-1404-trusty-64-minimal sshd\[10041\]: Failed password for invalid user admin from 49.69.200.63 port 1870 ssh2
2019-10-02 01:15:00
190.180.73.228 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-08-02/10-01]14pkt,1pt.(tcp)
2019-10-02 01:43:15
23.254.203.51 attackspam
Automatic report - Banned IP Access
2019-10-02 00:59:58

最近上报的IP列表

133.56.144.94 217.82.153.122 154.39.196.211 214.50.41.200
224.140.156.202 109.192.0.244 85.32.72.213 251.44.12.190
67.90.43.159 28.195.33.124 194.194.56.32 248.29.94.71
243.158.52.177 198.120.179.194 244.174.19.220 69.86.87.184
55.251.223.193 48.159.55.148 63.90.126.173 80.31.101.199