必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.103.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.103.189.		IN	A

;; AUTHORITY SECTION:
.			250	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 08:45:49 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
Host 189.103.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.103.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.86.164.106 attack
Wordpress attack
2019-11-30 22:13:55
183.7.174.127 attackspambots
Unauthorised access (Nov 30) SRC=183.7.174.127 LEN=40 TTL=52 ID=6703 TCP DPT=23 WINDOW=45857 SYN
2019-11-30 22:14:17
173.212.204.184 attackspam
Unauthorized SSH login attempts
2019-11-30 21:57:33
184.105.139.67 attackbotsspam
GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak
2019-11-30 22:15:43
129.211.22.160 attack
Oct 26 11:44:44 meumeu sshd[15112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.22.160 
Oct 26 11:44:45 meumeu sshd[15112]: Failed password for invalid user test from 129.211.22.160 port 41214 ssh2
Oct 26 11:49:12 meumeu sshd[15577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.22.160 
...
2019-11-30 21:57:46
106.12.107.17 attackbots
SSH Brute Force
2019-11-30 21:54:00
175.126.176.21 attackspambots
May 14 20:38:11 meumeu sshd[6432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21 
May 14 20:38:13 meumeu sshd[6432]: Failed password for invalid user braxton from 175.126.176.21 port 52178 ssh2
May 14 20:41:54 meumeu sshd[6935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21 
May 14 20:41:56 meumeu sshd[6935]: Failed password for invalid user gustave from 175.126.176.21 port 57808 ssh2
...
2019-11-30 22:27:13
159.65.9.28 attackbotsspam
Nov 30 14:33:11 localhost sshd\[23363\]: Invalid user roebi from 159.65.9.28 port 38172
Nov 30 14:33:11 localhost sshd\[23363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.9.28
Nov 30 14:33:12 localhost sshd\[23363\]: Failed password for invalid user roebi from 159.65.9.28 port 38172 ssh2
2019-11-30 21:45:10
220.191.160.42 attack
Automatic report - Banned IP Access
2019-11-30 22:07:50
113.179.133.34 attackbots
Unauthorised access (Nov 30) SRC=113.179.133.34 LEN=52 TTL=116 ID=11270 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 21:59:57
190.221.81.6 attackbots
Nov 30 11:22:37 ws12vmsma01 sshd[21461]: Invalid user aery from 190.221.81.6
Nov 30 11:22:39 ws12vmsma01 sshd[21461]: Failed password for invalid user aery from 190.221.81.6 port 40708 ssh2
Nov 30 11:26:18 ws12vmsma01 sshd[21917]: Invalid user patricia from 190.221.81.6
...
2019-11-30 21:58:44
111.123.81.75 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:51:06
66.207.68.117 attackbots
66.207.68.117 - - \[30/Nov/2019:09:54:29 +0100\] "POST /wp-login.php HTTP/1.0" 200 4128 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.207.68.117 - - \[30/Nov/2019:09:54:30 +0100\] "POST /wp-login.php HTTP/1.0" 200 3955 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.207.68.117 - - \[30/Nov/2019:09:54:31 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-30 22:00:49
118.122.77.5 attack
Port scan detected on ports: 4243[TCP], 2375[TCP], 2375[TCP]
2019-11-30 22:18:08
139.199.204.61 attack
Nov 24 04:39:32 meumeu sshd[24857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.204.61 
Nov 24 04:39:34 meumeu sshd[24857]: Failed password for invalid user guest from 139.199.204.61 port 33169 ssh2
Nov 24 04:46:40 meumeu sshd[25789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.204.61 
...
2019-11-30 21:48:29

最近上报的IP列表

66.96.236.245 207.241.232.122 122.129.121.130 140.116.113.43
140.116.41.3 152.46.255.174 150.216.218.87 140.116.49.1
159.226.35.201 140.116.151.53 140.116.44.226 140.116.130.112
139.18.1.159 131.212.249.106 193.136.138.2 140.116.70.96
137.43.116.19 140.116.33.10 162.129.44.13 131.251.255.28