必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tainan

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.121.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.121.68.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 15:54:31 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 68.121.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.121.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.211 attackspam
Feb 23 06:17:19 silence02 sshd[2728]: Failed password for root from 218.92.0.211 port 15271 ssh2
Feb 23 06:17:22 silence02 sshd[2728]: Failed password for root from 218.92.0.211 port 15271 ssh2
Feb 23 06:17:24 silence02 sshd[2728]: Failed password for root from 218.92.0.211 port 15271 ssh2
2020-02-23 13:28:09
116.110.10.230 attackbotsspam
Unauthorised access (Feb 23) SRC=116.110.10.230 LEN=52 TTL=108 ID=208 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-23 13:04:33
152.89.244.113 attackspam
Feb 23 02:45:18 lukav-desktop sshd\[22248\]: Invalid user sara from 152.89.244.113
Feb 23 02:45:18 lukav-desktop sshd\[22248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.244.113
Feb 23 02:45:20 lukav-desktop sshd\[22248\]: Failed password for invalid user sara from 152.89.244.113 port 51464 ssh2
Feb 23 02:48:06 lukav-desktop sshd\[23551\]: Invalid user hadoop from 152.89.244.113
Feb 23 02:48:06 lukav-desktop sshd\[23551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.89.244.113
2020-02-23 09:39:54
89.41.153.55 attack
Automatic report - Port Scan Attack
2020-02-23 13:10:17
142.93.163.77 attack
Feb 22 19:10:20 hpm sshd\[26175\]: Invalid user amandabackup from 142.93.163.77
Feb 22 19:10:20 hpm sshd\[26175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77
Feb 22 19:10:22 hpm sshd\[26175\]: Failed password for invalid user amandabackup from 142.93.163.77 port 50884 ssh2
Feb 22 19:13:27 hpm sshd\[26436\]: Invalid user openproject from 142.93.163.77
Feb 22 19:13:27 hpm sshd\[26436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77
2020-02-23 13:19:54
85.243.128.8 attackspam
Feb 22 18:55:41 auw2 sshd\[28781\]: Invalid user ubuntu from 85.243.128.8
Feb 22 18:55:41 auw2 sshd\[28781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl10-128-8.dsl.telepac.pt
Feb 22 18:55:43 auw2 sshd\[28781\]: Failed password for invalid user ubuntu from 85.243.128.8 port 33230 ssh2
Feb 22 18:58:20 auw2 sshd\[28995\]: Invalid user qw from 85.243.128.8
Feb 22 18:58:20 auw2 sshd\[28995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bl10-128-8.dsl.telepac.pt
2020-02-23 13:14:51
222.186.175.220 attack
Feb 23 02:26:46 dedicated sshd[4384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Feb 23 02:26:48 dedicated sshd[4384]: Failed password for root from 222.186.175.220 port 43500 ssh2
2020-02-23 09:37:53
62.10.34.149 attackbotsspam
$f2bV_matches
2020-02-23 13:10:49
78.128.113.174 attackspam
Feb 23 05:44:44 relay postfix/smtpd\[1595\]: warning: unknown\[78.128.113.174\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 05:44:52 relay postfix/smtpd\[27199\]: warning: unknown\[78.128.113.174\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 05:57:10 relay postfix/smtpd\[1595\]: warning: unknown\[78.128.113.174\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 05:57:18 relay postfix/smtpd\[29902\]: warning: unknown\[78.128.113.174\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 23 05:58:38 relay postfix/smtpd\[27199\]: warning: unknown\[78.128.113.174\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-23 13:04:48
186.3.234.169 attackspam
Feb 22 23:52:44 ny01 sshd[20017]: Failed password for root from 186.3.234.169 port 49826 ssh2
Feb 22 23:58:24 ny01 sshd[22757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.3.234.169
Feb 22 23:58:26 ny01 sshd[22757]: Failed password for invalid user test_dw from 186.3.234.169 port 49341 ssh2
2020-02-23 13:12:19
222.186.175.181 attack
Feb 23 07:08:48 areeb-Workstation sshd[4344]: Failed password for root from 222.186.175.181 port 43022 ssh2
Feb 23 07:08:54 areeb-Workstation sshd[4344]: Failed password for root from 222.186.175.181 port 43022 ssh2
...
2020-02-23 09:40:21
145.239.93.146 attackbotsspam
Feb 22 18:55:46 sachi sshd\[24143\]: Invalid user frappe from 145.239.93.146
Feb 22 18:55:46 sachi sshd\[24143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.ip-145-239-93.eu
Feb 22 18:55:47 sachi sshd\[24143\]: Failed password for invalid user frappe from 145.239.93.146 port 59166 ssh2
Feb 22 18:58:46 sachi sshd\[24386\]: Invalid user dev from 145.239.93.146
Feb 22 18:58:46 sachi sshd\[24386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.ip-145-239-93.eu
2020-02-23 13:02:02
146.168.2.84 attack
Feb 22 19:21:07 auw2 sshd\[30911\]: Invalid user 1234 from 146.168.2.84
Feb 22 19:21:07 auw2 sshd\[30911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-146-168-2-84.nh.cpe.atlanticbb.net
Feb 22 19:21:09 auw2 sshd\[30911\]: Failed password for invalid user 1234 from 146.168.2.84 port 49248 ssh2
Feb 22 19:23:50 auw2 sshd\[31113\]: Invalid user mirc from 146.168.2.84
Feb 22 19:23:50 auw2 sshd\[31113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-146-168-2-84.nh.cpe.atlanticbb.net
2020-02-23 13:33:04
213.217.5.23 attack
Feb 23 10:28:46 areeb-Workstation sshd[10342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.217.5.23 
Feb 23 10:28:48 areeb-Workstation sshd[10342]: Failed password for invalid user tsuji from 213.217.5.23 port 48690 ssh2
...
2020-02-23 13:01:26
180.76.60.144 attackspam
Feb 23 05:57:54 ns381471 sshd[26625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.60.144
Feb 23 05:57:55 ns381471 sshd[26625]: Failed password for invalid user demo from 180.76.60.144 port 42786 ssh2
2020-02-23 13:29:43

最近上报的IP列表

161.112.232.40 192.35.82.50 140.116.88.168 140.116.54.38
140.96.100.93 140.116.229.61 140.116.103.94 194.149.157.122
140.116.40.233 140.116.47.40 140.96.158.142 176.227.233.159
130.216.95.212 136.152.143.125 129.13.67.2 124.16.189.61
133.17.5.17 140.116.112.6 140.120.63.56 168.131.35.111