必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tainan

省份(region): Tainan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.42.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.42.243.			IN	A

;; AUTHORITY SECTION:
.			510	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:13:20 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 243.42.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.42.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.80.254.163 attack
Jun 23 21:05:42 debian sshd\[31405\]: Invalid user vboxuser from 188.80.254.163 port 41989
Jun 23 21:05:42 debian sshd\[31405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.254.163
...
2019-06-24 06:54:49
191.240.36.200 attackspam
failed_logins
2019-06-24 07:08:59
88.214.26.10 attackspambots
Jun 23 06:26:40 *** sshd[17555]: Failed password for invalid user admin from 88.214.26.10 port 46412 ssh2
Jun 23 07:09:35 *** sshd[17987]: Failed password for invalid user admin from 88.214.26.10 port 36638 ssh2
Jun 23 07:31:36 *** sshd[18113]: Failed password for invalid user admin from 88.214.26.10 port 49432 ssh2
Jun 23 07:58:30 *** sshd[18354]: Failed password for invalid user admin from 88.214.26.10 port 34476 ssh2
Jun 23 08:47:15 *** sshd[18922]: Failed password for invalid user admin from 88.214.26.10 port 36940 ssh2
Jun 23 09:08:45 *** sshd[19039]: Failed password for invalid user admin from 88.214.26.10 port 57194 ssh2
Jun 23 09:48:49 *** sshd[19450]: Failed password for invalid user admin from 88.214.26.10 port 57822 ssh2
Jun 23 10:14:28 *** sshd[19626]: Failed password for invalid user admin from 88.214.26.10 port 43178 ssh2
Jun 23 10:36:20 *** sshd[19858]: Failed password for invalid user admin from 88.214.26.10 port 49134 ssh2
Jun 23 11:08:38 *** sshd[20225]: Failed password for invalid user admi
2019-06-24 07:14:22
194.44.128.164 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-06-24 07:10:21
185.40.4.67 attackbots
\[2019-06-23 17:14:19\] NOTICE\[1849\] chan_sip.c: Registration from '\' failed for '185.40.4.67:55842' - Wrong password
\[2019-06-23 17:14:19\] SECURITY\[1857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-23T17:14:19.062-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="555555",SessionID="0x7fc42417ead8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.40.4.67/55842",Challenge="525b99b7",ReceivedChallenge="525b99b7",ReceivedHash="fc654993269211688535cacd6d3e4fe4"
\[2019-06-23 17:15:43\] NOTICE\[1849\] chan_sip.c: Registration from '\' failed for '185.40.4.67:54142' - Wrong password
...
2019-06-24 07:07:33
121.226.60.243 attackbotsspam
2019-06-23T21:32:37.391595 X postfix/smtpd[39204]: warning: unknown[121.226.60.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:34:59.309239 X postfix/smtpd[39209]: warning: unknown[121.226.60.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T22:04:06.204268 X postfix/smtpd[43529]: warning: unknown[121.226.60.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 07:21:35
157.55.39.138 attack
Automatic report - Web App Attack
2019-06-24 06:54:10
186.249.94.135 attackbotsspam
failed_logins
2019-06-24 07:10:53
61.163.176.117 attack
Jun 23 06:25:20 *** sshd[17552]: Failed password for invalid user ubuntu from 61.163.176.117 port 46802 ssh2
Jun 23 06:26:55 *** sshd[17557]: Failed password for invalid user mustang from 61.163.176.117 port 56338 ssh2
Jun 23 06:28:29 *** sshd[17561]: Failed password for invalid user correo from 61.163.176.117 port 1728 ssh2
Jun 23 06:30:05 *** sshd[17566]: Failed password for invalid user gameserver from 61.163.176.117 port 11091 ssh2
Jun 23 06:31:39 *** sshd[17572]: Failed password for invalid user rx from 61.163.176.117 port 20142 ssh2
Jun 23 06:34:35 *** sshd[17579]: Failed password for invalid user monitoring from 61.163.176.117 port 37431 ssh2
Jun 23 06:36:06 *** sshd[17585]: Failed password for invalid user xing from 61.163.176.117 port 46517 ssh2
Jun 23 06:37:45 *** sshd[17589]: Failed password for invalid user secret from 61.163.176.117 port 55126 ssh2
Jun 23 06:39:19 *** sshd[17650]: Failed password for invalid user ianb from 61.163.176.117 port 63536 ssh2
Jun 23 06:42:22 *** sshd[17706]: Failed pas
2019-06-24 07:18:11
185.99.176.35 attackbotsspam
Sending SPAM email
2019-06-24 07:01:34
116.226.30.84 attack
Unauthorized connection attempt from IP address 116.226.30.84 on Port 445(SMB)
2019-06-24 06:54:29
51.15.254.217 attackbots
firewall-block, port(s): 445/tcp
2019-06-24 06:56:43
77.28.102.7 attackspam
Jun 23 10:47:39 *** sshd[20075]: Failed password for invalid user broke from 77.28.102.7 port 51562 ssh2
Jun 23 10:50:50 *** sshd[20080]: Failed password for invalid user testuser from 77.28.102.7 port 35481 ssh2
Jun 23 10:53:11 *** sshd[20084]: Failed password for invalid user miu from 77.28.102.7 port 52231 ssh2
Jun 23 10:55:21 *** sshd[20096]: Failed password for invalid user teste from 77.28.102.7 port 59657 ssh2
Jun 23 10:57:29 *** sshd[20103]: Failed password for invalid user ping from 77.28.102.7 port 33956 ssh2
Jun 23 10:59:36 *** sshd[20107]: Failed password for invalid user postgres3 from 77.28.102.7 port 41377 ssh2
Jun 23 11:01:46 *** sshd[20147]: Failed password for invalid user filter from 77.28.102.7 port 48803 ssh2
Jun 23 11:04:00 *** sshd[20193]: Failed password for invalid user ftpuser from 77.28.102.7 port 43153 ssh2
2019-06-24 07:16:51
131.108.191.245 attackspambots
Jun 23 16:06:13 web1 postfix/smtpd[18731]: warning: unknown[131.108.191.245]: SASL PLAIN authentication failed: authentication failure
...
2019-06-24 06:40:28
36.66.156.125 attack
Jun 24 00:56:59 MK-Soft-Root1 sshd\[19738\]: Invalid user webmaster from 36.66.156.125 port 38476
Jun 24 00:56:59 MK-Soft-Root1 sshd\[19738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.156.125
Jun 24 00:57:01 MK-Soft-Root1 sshd\[19738\]: Failed password for invalid user webmaster from 36.66.156.125 port 38476 ssh2
...
2019-06-24 07:22:45

最近上报的IP列表

140.116.20.226 140.115.213.121 134.28.205.34 140.116.193.187
140.116.249.189 131.179.22.100 140.116.105.253 140.116.163.90
202.209.7.43 133.26.192.3 140.116.36.194 140.116.187.18
140.116.17.201 132.252.3.10 140.116.97.162 101.210.66.195
119.254.241.90 140.113.231.107 140.116.249.114 140.116.82.186