必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): East District

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.133.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.133.79.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 15:51:12 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 79.133.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 79.133.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.218.70 attackbotsspam
port scan and connect, tcp 3128 (squid-http)
2020-03-04 07:51:19
115.31.172.51 attack
Mar  3 23:08:39 serwer sshd\[4442\]: Invalid user guest from 115.31.172.51 port 36156
Mar  3 23:08:39 serwer sshd\[4442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.31.172.51
Mar  3 23:08:41 serwer sshd\[4442\]: Failed password for invalid user guest from 115.31.172.51 port 36156 ssh2
...
2020-03-04 07:56:38
113.62.176.98 attackspambots
SSH Brute Force
2020-03-04 08:21:46
209.141.62.246 attackbots
Automatic report - Banned IP Access
2020-03-04 07:40:41
118.25.156.20 attackbotsspam
Mar  4 04:54:40 gw1 sshd[5596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.156.20
Mar  4 04:54:42 gw1 sshd[5596]: Failed password for invalid user sake from 118.25.156.20 port 51689 ssh2
...
2020-03-04 08:01:00
103.109.108.50 attackbots
IMAP
2020-03-04 07:36:18
46.221.46.70 attackbots
Automatic report - Port Scan Attack
2020-03-04 07:36:39
61.84.196.50 attackspam
SSH-BruteForce
2020-03-04 07:48:13
182.162.104.153 attackspambots
Mar  4 00:27:59 silence02 sshd[13000]: Failed password for root from 182.162.104.153 port 40965 ssh2
Mar  4 00:36:47 silence02 sshd[13808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.104.153
Mar  4 00:36:50 silence02 sshd[13808]: Failed password for invalid user odoo from 182.162.104.153 port 16286 ssh2
2020-03-04 07:39:08
34.94.21.138 attack
Mar  3 18:17:28 NPSTNNYC01T sshd[26742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.94.21.138
Mar  3 18:17:30 NPSTNNYC01T sshd[26742]: Failed password for invalid user xuyz from 34.94.21.138 port 37476 ssh2
Mar  3 18:23:37 NPSTNNYC01T sshd[27681]: Failed password for bin from 34.94.21.138 port 41692 ssh2
...
2020-03-04 07:37:12
40.112.53.148 attack
Mar  3 20:17:34 firewall sshd[16284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.53.148
Mar  3 20:17:34 firewall sshd[16284]: Invalid user cpanelcabcache from 40.112.53.148
Mar  3 20:17:36 firewall sshd[16284]: Failed password for invalid user cpanelcabcache from 40.112.53.148 port 51158 ssh2
...
2020-03-04 07:57:08
118.24.14.18 attackspam
Mar  4 04:05:54 gw1 sshd[2765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.14.18
Mar  4 04:05:56 gw1 sshd[2765]: Failed password for invalid user postgres from 118.24.14.18 port 41046 ssh2
...
2020-03-04 07:43:31
49.234.200.123 attackspam
Mar  3 22:56:16 ns382633 sshd\[32036\]: Invalid user newuser from 49.234.200.123 port 44272
Mar  3 22:56:16 ns382633 sshd\[32036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.200.123
Mar  3 22:56:18 ns382633 sshd\[32036\]: Failed password for invalid user newuser from 49.234.200.123 port 44272 ssh2
Mar  3 23:08:43 ns382633 sshd\[1439\]: Invalid user marvin from 49.234.200.123 port 39232
Mar  3 23:08:43 ns382633 sshd\[1439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.200.123
2020-03-04 07:56:05
106.13.233.178 attack
Mar  4 04:29:40 gw1 sshd[4224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.178
Mar  4 04:29:42 gw1 sshd[4224]: Failed password for invalid user root2 from 106.13.233.178 port 54412 ssh2
...
2020-03-04 07:54:48
180.247.206.122 attackbots
1583273334 - 03/03/2020 23:08:54 Host: 180.247.206.122/180.247.206.122 Port: 445 TCP Blocked
2020-03-04 07:49:42

最近上报的IP列表

203.159.249.102 128.210.106.57 189.158.106.74 140.116.157.68
147.229.140.36 140.116.118.7 140.116.249.218 140.116.168.79
140.116.56.205 140.116.193.20 194.95.203.143 137.82.55.33
194.210.231.194 140.116.61.184 150.229.0.138 165.91.12.197
200.17.203.181 152.78.0.191 178.23.70.137 193.63.252.11