必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tangsel

省份(region): West Java

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Linknet-Fastnet ASN

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.0.21.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36552
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.0.21.227.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 01:59:34 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
227.21.0.140.in-addr.arpa domain name pointer fm-dyn-140-0-21-227.fast.net.id.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
227.21.0.140.in-addr.arpa	name = fm-dyn-140-0-21-227.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.216.156.66 attackbotsspam
Automatic report - Port Scan Attack
2020-09-12 04:22:00
51.38.190.237 attackbots
xmlrpc attack
2020-09-12 04:19:21
197.40.217.116 attackspambots
Threat Management Alert 1: Attempted Administrator Privilege Gain. Signature ET EXPLOIT MVPower DVR Shell UCE. From: 197.40.217.116:40747, to: 192.168.4.99:80, protocol: TCP
2020-09-12 04:27:52
5.188.87.58 attack
SSH Bruteforce Attempt on Honeypot
2020-09-12 04:21:01
92.167.25.241 attack
Hits on port : 445
2020-09-12 04:32:48
142.93.103.141 attack
fail2ban -- 142.93.103.141
...
2020-09-12 04:25:26
39.35.160.166 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-12 04:33:48
185.39.11.32 attackspambots
firewall-block, port(s): 3469/tcp
2020-09-12 04:17:29
213.32.22.189 attackbotsspam
ssh intrusion attempt
2020-09-12 04:26:37
79.47.154.195 attackbots
Hits on port : 23
2020-09-12 04:33:20
178.128.88.244 attackbotsspam
Sep 11 21:03:16 pve1 sshd[21568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.88.244 
Sep 11 21:03:18 pve1 sshd[21568]: Failed password for invalid user ernestino from 178.128.88.244 port 59742 ssh2
...
2020-09-12 04:44:56
86.188.246.2 attackbots
2020-09-11T16:50:49.580591abusebot-6.cloudsearch.cf sshd[15825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2  user=root
2020-09-11T16:50:51.601700abusebot-6.cloudsearch.cf sshd[15825]: Failed password for root from 86.188.246.2 port 34693 ssh2
2020-09-11T16:54:53.719618abusebot-6.cloudsearch.cf sshd[15834]: Invalid user minecraftserver from 86.188.246.2 port 40549
2020-09-11T16:54:53.726231abusebot-6.cloudsearch.cf sshd[15834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
2020-09-11T16:54:53.719618abusebot-6.cloudsearch.cf sshd[15834]: Invalid user minecraftserver from 86.188.246.2 port 40549
2020-09-11T16:54:55.576772abusebot-6.cloudsearch.cf sshd[15834]: Failed password for invalid user minecraftserver from 86.188.246.2 port 40549 ssh2
2020-09-11T16:58:41.193472abusebot-6.cloudsearch.cf sshd[15839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
...
2020-09-12 04:47:13
162.243.232.174 attack
firewall-block, port(s): 26135/tcp
2020-09-12 04:42:40
148.163.124.15 attackbots
Phishing site
2020-09-12 04:49:07
23.224.229.98 attackspambots
Port 22 Scan, PTR: None
2020-09-12 04:36:15

最近上报的IP列表

24.197.6.88 210.23.122.199 209.97.161.177 212.25.101.121
42.196.241.135 188.15.25.234 121.156.254.90 149.202.143.154
144.163.101.240 114.94.3.50 131.90.3.140 194.82.18.155
206.229.169.157 100.217.31.192 115.162.156.169 93.91.219.152
191.62.5.115 60.65.68.10 117.81.88.146 185.193.196.83