必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tainan

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.12.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.12.220.			IN	A

;; AUTHORITY SECTION:
.			504	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:16:38 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 220.12.116.140.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 220.12.116.140.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.133.15 attackbots
firewall-block, port(s): 28520/tcp
2020-05-31 00:48:52
2.238.32.42 attack
firewall-block, port(s): 80/tcp
2020-05-31 00:54:34
89.248.168.217 attack
1 Attack(s) Detected
[DoS Attack: Ascend Kill] from source: 89.248.168.217, port 35081, Friday, May 29, 2020 04:11:10
2020-05-31 01:19:44
119.196.184.101 attack
May 30 13:09:03 l03 sshd[10907]: Invalid user manager from 119.196.184.101 port 1471
...
2020-05-31 01:28:28
218.21.218.10 attack
SSH auth scanning - multiple failed logins
2020-05-31 01:29:10
162.0.228.113 attack
Failed password for invalid user susan from 162.0.228.113 port 55800 ssh2
2020-05-31 00:58:00
116.255.242.20 attack
Unauthorized connection attempt detected from IP address 116.255.242.20 to port 1433
2020-05-31 01:13:29
222.186.173.226 attack
$f2bV_matches
2020-05-31 01:15:16
180.242.67.229 attack
1590840564 - 05/30/2020 14:09:24 Host: 180.242.67.229/180.242.67.229 Port: 445 TCP Blocked
2020-05-31 01:17:12
93.123.96.138 attack
$f2bV_matches
2020-05-31 01:26:52
70.37.56.225 attackbots
Failed password for invalid user ftp from 70.37.56.225 port 41602 ssh2
2020-05-31 00:57:03
2.190.156.72 attack
firewall-block, port(s): 445/tcp
2020-05-31 00:57:24
196.189.91.166 attackbots
May 31 01:51:42 web1 sshd[24819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.166  user=root
May 31 01:51:44 web1 sshd[24819]: Failed password for root from 196.189.91.166 port 48616 ssh2
May 31 02:02:47 web1 sshd[27683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.166  user=root
May 31 02:02:48 web1 sshd[27683]: Failed password for root from 196.189.91.166 port 53016 ssh2
May 31 02:05:37 web1 sshd[28657]: Invalid user purple from 196.189.91.166 port 33688
May 31 02:05:37 web1 sshd[28657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.166
May 31 02:05:37 web1 sshd[28657]: Invalid user purple from 196.189.91.166 port 33688
May 31 02:05:39 web1 sshd[28657]: Failed password for invalid user purple from 196.189.91.166 port 33688 ssh2
May 31 02:08:27 web1 sshd[29284]: Invalid user redmine from 196.189.91.166 port 42496
...
2020-05-31 01:24:54
60.174.72.69 attackspam
(eximsyntax) Exim syntax errors from 60.174.72.69 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-30 16:38:59 SMTP call from [60.174.72.69] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-05-31 01:28:53
188.63.55.112 attackbots
Unauthorized connection attempt detected from IP address 188.63.55.112 to port 22
2020-05-31 01:22:07

最近上报的IP列表

140.116.253.171 140.116.12.178 140.116.110.71 133.82.251.244
140.180.223.42 140.116.165.64 103.113.56.64 140.116.221.11
140.116.111.130 140.116.102.193 140.116.51.151 147.91.1.5
147.26.87.186 164.67.100.181 140.116.239.125 125.208.40.1
163.25.93.83 140.116.38.47 141.24.34.167 83.212.190.197