必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taipei

省份(region): Taipei City

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): National Tsing-Hua University

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.114.138.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 899
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.114.138.91.			IN	A

;; AUTHORITY SECTION:
.			2595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051500 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 20:27:46 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
91.138.114.140.in-addr.arpa domain name pointer csd.ctm.nthu.edu.tw.
NSLOOKUP信息:
Server:		183.60.82.98
Address:	183.60.82.98#53

Non-authoritative answer:
91.138.114.140.in-addr.arpa	name = csd.ctm.nthu.edu.tw.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.243.119.201 attackbots
Apr 20 08:05:20 vpn01 sshd[19706]: Failed password for root from 192.243.119.201 port 60540 ssh2
Apr 20 08:16:28 vpn01 sshd[19817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.243.119.201
...
2020-04-20 19:57:04
222.91.97.134 attack
Invalid user tq from 222.91.97.134 port 2420
2020-04-20 20:02:48
122.51.137.21 attack
$f2bV_matches
2020-04-20 19:48:48
180.101.147.147 attackspambots
Apr 20 12:52:02 Enigma sshd[7182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.147.147
Apr 20 12:52:02 Enigma sshd[7182]: Invalid user online from 180.101.147.147 port 47521
Apr 20 12:52:04 Enigma sshd[7182]: Failed password for invalid user online from 180.101.147.147 port 47521 ssh2
Apr 20 12:56:49 Enigma sshd[7689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.147.147  user=root
Apr 20 12:56:52 Enigma sshd[7689]: Failed password for root from 180.101.147.147 port 50230 ssh2
2020-04-20 19:42:08
222.154.86.51 attackspambots
$f2bV_matches
2020-04-20 19:40:40
207.154.193.178 attackbots
Invalid user kf from 207.154.193.178 port 47448
2020-04-20 20:08:03
139.199.25.110 attack
$f2bV_matches
2020-04-20 20:21:31
221.1.177.2 attack
Automatic report - Banned IP Access
2020-04-20 19:56:07
181.16.31.167 attack
Invalid user test from 181.16.31.167 port 55714
2020-04-20 20:13:50
213.234.252.110 attackspam
Invalid user qs from 213.234.252.110 port 33122
2020-04-20 20:05:11
37.59.232.6 attack
5x Failed Password
2020-04-20 19:52:03
168.205.133.65 attackbots
Scanning
2020-04-20 19:43:07
95.111.74.98 attackspambots
Apr 20 01:40:23 php1 sshd\[15164\]: Invalid user postgres from 95.111.74.98
Apr 20 01:40:23 php1 sshd\[15164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
Apr 20 01:40:26 php1 sshd\[15164\]: Failed password for invalid user postgres from 95.111.74.98 port 41906 ssh2
Apr 20 01:44:41 php1 sshd\[15578\]: Invalid user ftpuser1 from 95.111.74.98
Apr 20 01:44:41 php1 sshd\[15578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
2020-04-20 19:51:49
213.244.123.182 attack
5x Failed Password
2020-04-20 19:50:49
194.44.241.86 attackbotsspam
Automatic report - Banned IP Access
2020-04-20 19:49:34

最近上报的IP列表

222.103.168.208 185.10.68.232 223.178.132.120 78.39.7.230
144.139.165.241 191.40.101.163 182.52.132.184 172.199.70.93
12.243.215.129 61.14.229.46 187.228.55.60 85.21.251.136
51.68.95.209 187.98.30.127 8.40.45.178 212.33.202.57
85.35.150.54 152.63.153.199 117.4.0.244 27.101.13.53