必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tainan

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.191.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.191.113.		IN	A

;; AUTHORITY SECTION:
.			121	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050400 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 04 17:57:00 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
Host 113.191.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.191.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.139.111 attackbotsspam
2020-03-25T08:07:28.007583abusebot-5.cloudsearch.cf sshd[9449]: Invalid user icekao from 106.13.139.111 port 51678
2020-03-25T08:07:28.018790abusebot-5.cloudsearch.cf sshd[9449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111
2020-03-25T08:07:28.007583abusebot-5.cloudsearch.cf sshd[9449]: Invalid user icekao from 106.13.139.111 port 51678
2020-03-25T08:07:29.645807abusebot-5.cloudsearch.cf sshd[9449]: Failed password for invalid user icekao from 106.13.139.111 port 51678 ssh2
2020-03-25T08:10:23.283756abusebot-5.cloudsearch.cf sshd[9452]: Invalid user leyna from 106.13.139.111 port 34580
2020-03-25T08:10:23.291750abusebot-5.cloudsearch.cf sshd[9452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.111
2020-03-25T08:10:23.283756abusebot-5.cloudsearch.cf sshd[9452]: Invalid user leyna from 106.13.139.111 port 34580
2020-03-25T08:10:25.611214abusebot-5.cloudsearch.cf sshd[9452]: Fail
...
2020-03-25 16:34:58
111.67.199.188 attackbots
Mar 25 04:46:45 meumeu sshd[12620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.199.188 
Mar 25 04:46:47 meumeu sshd[12620]: Failed password for invalid user desktop from 111.67.199.188 port 40798 ssh2
Mar 25 04:50:05 meumeu sshd[13094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.199.188 
...
2020-03-25 16:21:10
152.32.74.155 attackbots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-03-25 16:14:17
195.5.216.13 attackbots
RDP Brute-Force
2020-03-25 16:30:05
54.36.163.141 attackspam
$f2bV_matches
2020-03-25 16:29:42
14.231.179.7 attackbotsspam
Mar 25 00:50:55 firewall sshd[1584]: Invalid user admin from 14.231.179.7
Mar 25 00:50:57 firewall sshd[1584]: Failed password for invalid user admin from 14.231.179.7 port 59128 ssh2
Mar 25 00:51:02 firewall sshd[1593]: Invalid user admin from 14.231.179.7
...
2020-03-25 16:50:11
120.188.92.238 attackbotsspam
1585108319 - 03/25/2020 04:51:59 Host: 120.188.92.238/120.188.92.238 Port: 445 TCP Blocked
2020-03-25 16:04:51
114.234.200.232 attackspam
Unauthorised access (Mar 25) SRC=114.234.200.232 LEN=40 TTL=52 ID=47171 TCP DPT=8080 WINDOW=21766 SYN 
Unauthorised access (Mar 25) SRC=114.234.200.232 LEN=40 TTL=52 ID=60628 TCP DPT=8080 WINDOW=17982 SYN 
Unauthorised access (Mar 24) SRC=114.234.200.232 LEN=40 TTL=52 ID=26027 TCP DPT=8080 WINDOW=35998 SYN
2020-03-25 16:57:05
79.184.133.138 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/79.184.133.138/ 
 
 PL - 1H : (56)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 79.184.133.138 
 
 CIDR : 79.184.0.0/14 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 5 
 24H - 5 
 
 DateTime : 2020-03-25 04:51:03 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2020-03-25 16:48:30
67.190.45.3 attack
port scan and connect, tcp 22 (ssh)
2020-03-25 16:07:11
95.85.38.127 attackspambots
Tried sshing with brute force.
2020-03-25 16:08:16
180.76.247.6 attackspambots
Mar 25 06:47:49 vps sshd\[25381\]: Invalid user admin from 180.76.247.6
Mar 25 06:52:16 vps sshd\[25423\]: Invalid user ubuntu from 180.76.247.6
...
2020-03-25 16:56:28
178.62.9.122 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-25 16:24:14
120.29.158.173 attackspambots
SSH Authentication Attempts Exceeded
2020-03-25 16:35:57
185.36.81.42 attackbotsspam
Mar 25 07:53:29 debian-2gb-nbg1-2 kernel: \[7378290.394202\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.36.81.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=TCP SPT=40469 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2020-03-25 16:41:45

最近上报的IP列表

193.170.64.102 140.116.159.231 140.116.114.102 129.130.19.80
115.178.255.165 139.179.221.175 140.116.8.10 156.56.31.11
140.116.74.62 202.154.24.174 140.116.196.41 220.142.51.64
120.110.82.132 140.116.39.124 143.107.229.197 140.116.73.214
140.116.16.195 144.41.205.155 140.116.92.238 193.225.193.145