必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tainan

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.163.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.163.45.			IN	A

;; AUTHORITY SECTION:
.			517	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:26:18 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 45.163.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.163.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.225.17.9 attackspam
Nov 16 17:54:11 MK-Soft-VM5 sshd[29818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9 
Nov 16 17:54:13 MK-Soft-VM5 sshd[29818]: Failed password for invalid user manick from 14.225.17.9 port 41730 ssh2
...
2019-11-17 03:59:09
113.172.115.103 attackbots
Nov 16 15:48:03 MK-Soft-VM3 sshd[9715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.115.103 
Nov 16 15:48:06 MK-Soft-VM3 sshd[9715]: Failed password for invalid user admin from 113.172.115.103 port 54184 ssh2
...
2019-11-17 03:44:59
157.55.39.168 attackspam
Automatic report - Banned IP Access
2019-11-17 03:51:38
87.236.212.52 attackbotsspam
"Test Inject  am'a=0"
2019-11-17 03:51:11
187.217.199.20 attackbots
Nov 16 07:11:44 web9 sshd\[9090\]: Invalid user ubuntu from 187.217.199.20
Nov 16 07:11:44 web9 sshd\[9090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.199.20
Nov 16 07:11:46 web9 sshd\[9090\]: Failed password for invalid user ubuntu from 187.217.199.20 port 59742 ssh2
Nov 16 07:15:54 web9 sshd\[9775\]: Invalid user utnet from 187.217.199.20
Nov 16 07:15:54 web9 sshd\[9775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.199.20
2019-11-17 03:54:57
180.76.56.69 attack
Nov 16 16:54:56 markkoudstaal sshd[13759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.56.69
Nov 16 16:54:58 markkoudstaal sshd[13759]: Failed password for invalid user 12340 from 180.76.56.69 port 46910 ssh2
Nov 16 17:00:57 markkoudstaal sshd[14326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.56.69
2019-11-17 03:49:56
119.235.24.244 attackspam
Nov 16 17:54:28 eventyay sshd[6952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.24.244
Nov 16 17:54:29 eventyay sshd[6952]: Failed password for invalid user sandefer from 119.235.24.244 port 58471 ssh2
Nov 16 18:03:52 eventyay sshd[7102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.24.244
...
2019-11-17 03:29:02
40.73.116.245 attackbots
2019-11-16T16:25:08.507998abusebot-5.cloudsearch.cf sshd\[30226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.116.245  user=root
2019-11-17 03:32:46
93.151.181.242 attackbots
port scan and connect, tcp 23 (telnet)
2019-11-17 04:03:16
103.233.153.146 attackspam
Nov 16 18:38:50 lnxded63 sshd[17767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.233.153.146
2019-11-17 03:48:24
104.254.92.21 attackspambots
(From jaunita.morrice@gmail.com) Would you like to post your advertisement on over 1000 ad sites every month? Pay one low monthly fee and get virtually unlimited traffic to your site forever! For more information just visit: http://www.postonthousandsofsites.xyz
2019-11-17 03:36:38
106.12.77.199 attackspam
2019-11-16T17:33:40.318461shield sshd\[18585\]: Invalid user horror from 106.12.77.199 port 50690
2019-11-16T17:33:40.323455shield sshd\[18585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.199
2019-11-16T17:33:42.404612shield sshd\[18585\]: Failed password for invalid user horror from 106.12.77.199 port 50690 ssh2
2019-11-16T17:38:03.599702shield sshd\[19540\]: Invalid user password from 106.12.77.199 port 56316
2019-11-16T17:38:03.604500shield sshd\[19540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.199
2019-11-17 03:30:30
206.189.225.85 attackspam
$f2bV_matches
2019-11-17 03:47:05
151.80.254.74 attack
2019-11-16T19:22:50.703442abusebot-6.cloudsearch.cf sshd\[11609\]: Invalid user claudette from 151.80.254.74 port 39330
2019-11-17 03:33:56
150.116.48.2 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/150.116.48.2/ 
 
 TW - 1H : (167)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN131627 
 
 IP : 150.116.48.2 
 
 CIDR : 150.116.48.0/22 
 
 PREFIX COUNT : 45 
 
 UNIQUE IP COUNT : 90624 
 
 
 ATTACKS DETECTED ASN131627 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-16 15:47:34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-17 04:02:15

最近上报的IP列表

205.251.197.87 79.123.179.5 203.99.24.1 210.240.243.162
140.116.216.67 128.54.239.220 120.124.249.161 140.116.16.203
140.117.59.148 163.22.18.56 163.28.113.1 13.57.255.5
140.114.63.10 210.110.193.11 140.116.16.166 140.116.157.209
195.187.84.220 140.116.91.1 194.141.86.88 129.132.52.2