必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chushui

省份(region): Changhua

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.151.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.151.253.		IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 17:44:30 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
Host 253.151.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.151.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.134.141.89 attackspam
Sep 24 17:26:19 dedicated sshd[8132]: Invalid user werkstatt from 91.134.141.89 port 55678
2019-09-24 23:34:54
41.223.152.50 attackbotsspam
LGS,WP GET /wp-login.php
2019-09-24 23:34:25
222.186.175.212 attackbots
2019-09-24T14:44:09.714191hub.schaetter.us sshd\[3086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-09-24T14:44:11.759976hub.schaetter.us sshd\[3086\]: Failed password for root from 222.186.175.212 port 50644 ssh2
2019-09-24T14:44:15.919472hub.schaetter.us sshd\[3086\]: Failed password for root from 222.186.175.212 port 50644 ssh2
2019-09-24T14:44:20.424633hub.schaetter.us sshd\[3086\]: Failed password for root from 222.186.175.212 port 50644 ssh2
2019-09-24T14:44:24.146898hub.schaetter.us sshd\[3086\]: Failed password for root from 222.186.175.212 port 50644 ssh2
...
2019-09-24 22:47:56
218.80.245.54 attackspambots
Unauthorised access (Sep 24) SRC=218.80.245.54 LEN=44 TOS=0x10 PREC=0x40 TTL=240 ID=53406 TCP DPT=445 WINDOW=1024 SYN
2019-09-24 23:11:58
185.176.27.6 attackbots
09/24/2019-16:03:47.463147 185.176.27.6 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-24 23:21:35
111.95.37.222 attack
Sep 24 04:28:56 georgia postfix/smtpd[22392]: warning: hostname fm-dyn-111-95-37-222.fast.net.id does not resolve to address 111.95.37.222: Name or service not known
Sep 24 04:28:56 georgia postfix/smtpd[22392]: connect from unknown[111.95.37.222]
Sep 24 04:29:16 georgia postfix/smtpd[22392]: SSL_accept error from unknown[111.95.37.222]: lost connection
Sep 24 04:29:16 georgia postfix/smtpd[22392]: lost connection after CONNECT from unknown[111.95.37.222]
Sep 24 04:29:16 georgia postfix/smtpd[22392]: disconnect from unknown[111.95.37.222] commands=0/0
Sep 24 04:29:33 georgia postfix/smtpd[22392]: warning: hostname fm-dyn-111-95-37-222.fast.net.id does not resolve to address 111.95.37.222: Name or service not known
Sep 24 04:29:33 georgia postfix/smtpd[22392]: connect from unknown[111.95.37.222]
Sep 24 04:29:34 georgia postfix/smtpd[22392]: warning: unknown[111.95.37.222]: SASL CRAM-MD5 authentication failed: authentication failure
Sep 24 04:29:35 georgia postfix/smtpd[2........
-------------------------------
2019-09-24 22:43:06
116.203.177.66 attack
Sep 24 08:19:10 shadeyouvpn sshd[17994]: Invalid user user1 from 116.203.177.66
Sep 24 08:19:12 shadeyouvpn sshd[17994]: Failed password for invalid user user1 from 116.203.177.66 port 51588 ssh2
Sep 24 08:19:12 shadeyouvpn sshd[17994]: Received disconnect from 116.203.177.66: 11: Bye Bye [preauth]
Sep 24 08:33:00 shadeyouvpn sshd[30162]: Invalid user xbmc from 116.203.177.66
Sep 24 08:33:02 shadeyouvpn sshd[30162]: Failed password for invalid user xbmc from 116.203.177.66 port 37026 ssh2
Sep 24 08:33:02 shadeyouvpn sshd[30162]: Received disconnect from 116.203.177.66: 11: Bye Bye [preauth]
Sep 24 08:36:55 shadeyouvpn sshd[758]: Invalid user cnt from 116.203.177.66
Sep 24 08:36:56 shadeyouvpn sshd[758]: Failed password for invalid user cnt from 116.203.177.66 port 51070 ssh2
Sep 24 08:36:57 shadeyouvpn sshd[758]: Received disconnect from 116.203.177.66: 11: Bye Bye [preauth]
Sep 24 08:40:37 shadeyouvpn sshd[3437]: Invalid user bbs from 116.203.177.66


........
-----------------------------------------------
2019-09-24 23:05:59
92.62.139.103 attackbotsspam
2019-09-24T13:57:26.716124abusebot.cloudsearch.cf sshd\[5785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.139.103  user=root
2019-09-24 23:13:40
114.67.70.206 attackbotsspam
Sep 24 16:37:56 OPSO sshd\[5933\]: Invalid user doubleT from 114.67.70.206 port 51284
Sep 24 16:37:56 OPSO sshd\[5933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.206
Sep 24 16:37:57 OPSO sshd\[5933\]: Failed password for invalid user doubleT from 114.67.70.206 port 51284 ssh2
Sep 24 16:43:27 OPSO sshd\[6953\]: Invalid user at from 114.67.70.206 port 60862
Sep 24 16:43:27 OPSO sshd\[6953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.206
2019-09-24 22:55:01
94.23.212.137 attack
Sep 24 14:43:30 host sshd\[39869\]: Invalid user patricia from 94.23.212.137 port 32786
Sep 24 14:43:33 host sshd\[39869\]: Failed password for invalid user patricia from 94.23.212.137 port 32786 ssh2
...
2019-09-24 23:21:02
192.227.252.6 attack
Sep 24 16:27:10 markkoudstaal sshd[14509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.6
Sep 24 16:27:12 markkoudstaal sshd[14509]: Failed password for invalid user noreply from 192.227.252.6 port 33168 ssh2
Sep 24 16:35:38 markkoudstaal sshd[15306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.6
2019-09-24 22:43:39
13.233.176.0 attackspam
Sep 24 17:56:14 server sshd\[27849\]: Invalid user sales from 13.233.176.0 port 53772
Sep 24 17:56:14 server sshd\[27849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.233.176.0
Sep 24 17:56:16 server sshd\[27849\]: Failed password for invalid user sales from 13.233.176.0 port 53772 ssh2
Sep 24 18:04:35 server sshd\[5537\]: Invalid user nfsd from 13.233.176.0 port 38966
Sep 24 18:04:35 server sshd\[5537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.233.176.0
2019-09-24 23:22:22
207.154.245.200 attackbotsspam
Sep 24 13:39:08 ghostname-secure sshd[31896]: Failed password for invalid user vyacheslav from 207.154.245.200 port 56036 ssh2
Sep 24 13:39:08 ghostname-secure sshd[31896]: Received disconnect from 207.154.245.200: 11: Bye Bye [preauth]
Sep 24 13:54:23 ghostname-secure sshd[32155]: Failed password for invalid user emilie from 207.154.245.200 port 50480 ssh2
Sep 24 13:54:23 ghostname-secure sshd[32155]: Received disconnect from 207.154.245.200: 11: Bye Bye [preauth]
Sep 24 13:57:59 ghostname-secure sshd[32189]: Failed password for invalid user aisha from 207.154.245.200 port 36800 ssh2
Sep 24 13:57:59 ghostname-secure sshd[32189]: Received disconnect from 207.154.245.200: 11: Bye Bye [preauth]
Sep 24 14:01:31 ghostname-secure sshd[32233]: Failed password for invalid user dave from 207.154.245.200 port 51354 ssh2
Sep 24 14:01:31 ghostname-secure sshd[32233]: Received disconnect from 207.154.245.200: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view
2019-09-24 23:32:03
200.108.143.6 attack
Sep 24 04:33:15 web9 sshd\[11425\]: Invalid user ryank from 200.108.143.6
Sep 24 04:33:15 web9 sshd\[11425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
Sep 24 04:33:17 web9 sshd\[11425\]: Failed password for invalid user ryank from 200.108.143.6 port 42030 ssh2
Sep 24 04:37:59 web9 sshd\[12265\]: Invalid user martyn from 200.108.143.6
Sep 24 04:37:59 web9 sshd\[12265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
2019-09-24 22:51:14
103.89.89.25 attackspambots
port scan and connect, tcp 22 (ssh)
2019-09-24 23:25:06

最近上报的IP列表

140.116.179.15 66.96.228.45 192.54.49.100 210.72.25.224
202.92.128.246 140.116.17.221 140.116.161.164 140.116.218.81
142.244.5.85 137.248.1.8 140.116.240.231 140.116.118.138
130.203.135.59 140.116.68.33 72.33.2.22 139.179.151.87
134.208.58.33 143.248.38.181 128.36.196.88 140.116.250.152