必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tainan

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.34.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.34.75.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 10:15:54 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
Host 75.34.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.34.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.32.30.213 attack
 TCP (SYN) 114.32.30.213:53816 -> port 23, len 44
2020-09-10 01:12:50
188.166.54.199 attackspam
2020-09-09T16:37:47.749720abusebot-8.cloudsearch.cf sshd[3789]: Invalid user bellen from 188.166.54.199 port 40127
2020-09-09T16:37:47.755004abusebot-8.cloudsearch.cf sshd[3789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199
2020-09-09T16:37:47.749720abusebot-8.cloudsearch.cf sshd[3789]: Invalid user bellen from 188.166.54.199 port 40127
2020-09-09T16:37:50.324154abusebot-8.cloudsearch.cf sshd[3789]: Failed password for invalid user bellen from 188.166.54.199 port 40127 ssh2
2020-09-09T16:43:36.098744abusebot-8.cloudsearch.cf sshd[3798]: Invalid user rapport from 188.166.54.199 port 43470
2020-09-09T16:43:36.105711abusebot-8.cloudsearch.cf sshd[3798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199
2020-09-09T16:43:36.098744abusebot-8.cloudsearch.cf sshd[3798]: Invalid user rapport from 188.166.54.199 port 43470
2020-09-09T16:43:38.920866abusebot-8.cloudsearch.cf sshd[3798]: 
...
2020-09-10 01:17:31
106.12.33.78 attackspambots
 TCP (SYN) 106.12.33.78:58179 -> port 5287, len 44
2020-09-10 01:08:05
36.65.110.120 attackbots
1599583799 - 09/08/2020 18:49:59 Host: 36.65.110.120/36.65.110.120 Port: 445 TCP Blocked
2020-09-10 01:13:28
88.26.184.227 attack
 TCP (SYN) 88.26.184.227:36998 -> port 23, len 44
2020-09-10 00:37:36
195.206.62.142 attackspam
firewall-block, port(s): 445/tcp
2020-09-10 00:50:01
123.207.97.250 attack
Sep  9 17:11:48 sso sshd[24725]: Failed password for root from 123.207.97.250 port 59562 ssh2
...
2020-09-10 00:45:14
45.176.208.50 attackbotsspam
2020-09-09T04:22:57.091093linuxbox-skyline sshd[166706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.176.208.50  user=root
2020-09-09T04:22:59.176411linuxbox-skyline sshd[166706]: Failed password for root from 45.176.208.50 port 55696 ssh2
...
2020-09-10 00:45:38
152.136.36.250 attackspambots
2020-09-09T13:34:47.543439abusebot-7.cloudsearch.cf sshd[2008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.36.250  user=root
2020-09-09T13:34:50.083767abusebot-7.cloudsearch.cf sshd[2008]: Failed password for root from 152.136.36.250 port 56487 ssh2
2020-09-09T13:37:34.448629abusebot-7.cloudsearch.cf sshd[2023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.36.250  user=root
2020-09-09T13:37:36.582377abusebot-7.cloudsearch.cf sshd[2023]: Failed password for root from 152.136.36.250 port 23516 ssh2
2020-09-09T13:40:18.957957abusebot-7.cloudsearch.cf sshd[2027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.36.250  user=root
2020-09-09T13:40:21.272433abusebot-7.cloudsearch.cf sshd[2027]: Failed password for root from 152.136.36.250 port 54526 ssh2
2020-09-09T13:43:05.207053abusebot-7.cloudsearch.cf sshd[2087]: Invalid user bettyc from 15
...
2020-09-10 01:14:54
123.59.194.253 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-10 00:35:40
61.160.251.98 attackbotsspam
Sep  9 14:55:56 onepixel sshd[2860438]: Failed password for invalid user erajkot from 61.160.251.98 port 38035 ssh2
Sep  9 14:59:40 onepixel sshd[2861023]: Invalid user koeso from 61.160.251.98 port 58354
Sep  9 14:59:40 onepixel sshd[2861023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.251.98 
Sep  9 14:59:40 onepixel sshd[2861023]: Invalid user koeso from 61.160.251.98 port 58354
Sep  9 14:59:42 onepixel sshd[2861023]: Failed password for invalid user koeso from 61.160.251.98 port 58354 ssh2
2020-09-10 00:48:35
31.171.152.105 attackbotsspam
(From contact1@theonlinepublishers.com) Hello, we are The Online Publishers (TOP) and want to introduce ourselves to you.  TOP is an established comprehensive global online hub.  We connect clients to expert freelancers in all facets of the world of digital marketing such as writers, journalists, bloggers, authors, advertisers, publishers, social media influencers, backlinks managers, Vloggers/video marketers and reviewers… A few of the many services we offer are content creation and placement, publishing, advertising, online translation, and social media management.  We also have two full online libraries, one of photographs and the other of eBooks and informative resources. 
Save money and time by using TOP services.  Rather than having to search for multiple providers of various tasks, we are a one-stop-shop.  We have all the services you will ever need right here.  For a complete list, check out our website https://www.theonlinepublishers.com 
TOP can help any business surge ahead of its competition and
2020-09-10 01:10:21
167.71.195.173 attackspambots
9126/tcp 25244/tcp 19716/tcp...
[2020-08-31/09-09]28pkt,10pt.(tcp)
2020-09-10 00:38:34
158.69.222.2 attackbots
2020-09-09T10:22:33.051788Z 8d6a1b595251 New connection: 158.69.222.2:54548 (172.17.0.2:2222) [session: 8d6a1b595251]
2020-09-09T10:29:55.011634Z 5cd2b5cb9b41 New connection: 158.69.222.2:44700 (172.17.0.2:2222) [session: 5cd2b5cb9b41]
2020-09-10 00:42:43
189.8.95.30 attackbotsspam
$f2bV_matches
2020-09-10 00:48:59

最近上报的IP列表

223.255.224.124 223.255.230.2 81.186.175.186 140.116.246.1
140.116.180.152 93.95.178.217 35.2.35.40 212.182.63.66
134.208.40.81 140.116.93.91 140.116.103.31 140.116.109.104
140.113.170.33 144.32.129.210 141.212.123.198 140.116.6.49
140.120.49.191 178.212.111.37 140.116.24.123 66.96.229.39