必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Aachen

省份(region): North Rhine-Westphalia

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.22.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.22.140.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062402 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 10:34:17 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 140.22.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.22.226.137.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.36.68.204 attack
port scan/probe/communication attempt
2019-11-04 22:12:42
167.99.255.246 attack
Nov  4 08:16:24 vserver sshd\[27772\]: Invalid user gtadmin from 167.99.255.246Nov  4 08:16:26 vserver sshd\[27772\]: Failed password for invalid user gtadmin from 167.99.255.246 port 38236 ssh2Nov  4 08:19:47 vserver sshd\[27802\]: Invalid user usuario from 167.99.255.246Nov  4 08:19:49 vserver sshd\[27802\]: Failed password for invalid user usuario from 167.99.255.246 port 47988 ssh2
...
2019-11-04 22:05:10
78.26.253.237 attackbots
" "
2019-11-04 21:56:58
43.240.127.86 attack
SSH/22 MH Probe, BF, Hack -
2019-11-04 22:01:06
151.45.246.82 attackbotsspam
Port Scan
2019-11-04 21:44:44
61.133.232.251 attack
Nov  4 14:47:34 vpn01 sshd[18415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.251
Nov  4 14:47:35 vpn01 sshd[18415]: Failed password for invalid user 123456 from 61.133.232.251 port 56135 ssh2
...
2019-11-04 21:50:06
62.234.23.78 attackspambots
Nov  4 14:27:34 v22019058497090703 sshd[1298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.23.78
Nov  4 14:27:36 v22019058497090703 sshd[1298]: Failed password for invalid user crypterium from 62.234.23.78 port 9874 ssh2
Nov  4 14:32:48 v22019058497090703 sshd[1646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.23.78
...
2019-11-04 21:43:52
43.251.104.190 attackbotsspam
Repeated brute force against a port
2019-11-04 21:36:58
69.16.221.104 attackbots
2019-11-04T14:22:04.344777mail01 postfix/smtpd[24738]: warning: unknown[69.16.221.104]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04T14:22:23.038043mail01 postfix/smtpd[21003]: warning: unknown[69.16.221.104]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04T14:28:28.344158mail01 postfix/smtpd[21099]: warning: unknown[69.16.221.104]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04 21:32:56
122.158.6.150 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/122.158.6.150/ 
 
 CN - 1H : (589)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 122.158.6.150 
 
 CIDR : 122.156.0.0/14 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 4 
  3H - 21 
  6H - 54 
 12H - 118 
 24H - 229 
 
 DateTime : 2019-11-04 07:19:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-04 22:13:32
106.12.24.1 attackspam
Nov  4 07:11:20 ovpn sshd\[11422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1  user=root
Nov  4 07:11:22 ovpn sshd\[11422\]: Failed password for root from 106.12.24.1 port 56834 ssh2
Nov  4 07:20:41 ovpn sshd\[13466\]: Invalid user oracle from 106.12.24.1
Nov  4 07:20:41 ovpn sshd\[13466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1
Nov  4 07:20:43 ovpn sshd\[13466\]: Failed password for invalid user oracle from 106.12.24.1 port 57978 ssh2
2019-11-04 21:43:32
103.99.113.62 attackbots
Nov  4 12:23:13 XXX sshd[36771]: Invalid user gz from 103.99.113.62 port 55772
2019-11-04 21:49:15
139.59.5.179 attackspambots
wp4.breidenba.ch 139.59.5.179 \[04/Nov/2019:07:20:12 +0100\] "POST /wp-login.php HTTP/1.1" 200 5603 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
wp4.breidenba.ch 139.59.5.179 \[04/Nov/2019:07:20:17 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4083 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-04 22:00:24
185.104.216.215 attackbots
Automatic report - Banned IP Access
2019-11-04 22:14:10
64.39.99.194 attackbots
5x Failed Password
2019-11-04 21:36:31

最近上报的IP列表

43.156.123.24 137.226.22.186 137.226.23.175 45.12.88.148
45.56.117.11 50.215.29.169 46.114.104.176 95.141.17.50
95.134.130.182 106.12.115.193 5.167.69.177 137.226.18.45
164.163.69.12 95.47.136.18 137.226.68.115 137.226.23.93
137.226.22.213 137.226.240.201 43.156.125.247 137.226.29.76