必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kaohsiung

省份(region): Kaohsiung

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.75.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.75.253.			IN	A

;; AUTHORITY SECTION:
.			232	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050100 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 01 22:50:59 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 253.75.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.75.116.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.181 attackspam
Jun 24 01:37:07 vps sshd[545012]: Failed password for root from 112.85.42.181 port 1502 ssh2
Jun 24 01:37:09 vps sshd[545012]: Failed password for root from 112.85.42.181 port 1502 ssh2
Jun 24 01:37:14 vps sshd[545012]: Failed password for root from 112.85.42.181 port 1502 ssh2
Jun 24 01:37:17 vps sshd[545012]: Failed password for root from 112.85.42.181 port 1502 ssh2
Jun 24 01:37:21 vps sshd[545012]: Failed password for root from 112.85.42.181 port 1502 ssh2
...
2020-06-24 07:50:10
175.140.85.253 attackspam
Jun 24 01:08:08 DAAP sshd[19440]: Invalid user yr from 175.140.85.253 port 57732
Jun 24 01:08:08 DAAP sshd[19440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.85.253
Jun 24 01:08:08 DAAP sshd[19440]: Invalid user yr from 175.140.85.253 port 57732
Jun 24 01:08:09 DAAP sshd[19440]: Failed password for invalid user yr from 175.140.85.253 port 57732 ssh2
Jun 24 01:10:38 DAAP sshd[19520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.85.253  user=root
Jun 24 01:10:40 DAAP sshd[19520]: Failed password for root from 175.140.85.253 port 51742 ssh2
...
2020-06-24 08:05:01
120.132.120.7 attackbots
Jun 24 01:25:33 lnxweb61 sshd[26882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.120.7
2020-06-24 08:02:50
176.113.115.210 attackspam
Jun 24 00:00:46 debian-2gb-nbg1-2 kernel: \[15208315.362240\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.113.115.210 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=42534 PROTO=TCP SPT=42211 DPT=3360 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-24 08:16:56
43.243.75.87 attackbots
Unauthorized connection attempt from IP address 43.243.75.87 on Port 445(SMB)
2020-06-24 08:09:30
140.143.9.142 attackbotsspam
Invalid user dom from 140.143.9.142 port 59676
2020-06-24 07:54:07
221.149.8.48 attackspam
Jun 23 19:24:40 Host-KEWR-E sshd[2212]: User root from 221.149.8.48 not allowed because not listed in AllowUsers
...
2020-06-24 08:06:06
188.254.0.183 attack
Jun 23 23:16:58 localhost sshd[54916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183  user=mysql
Jun 23 23:17:01 localhost sshd[54916]: Failed password for mysql from 188.254.0.183 port 60802 ssh2
Jun 23 23:21:42 localhost sshd[55412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183  user=root
Jun 23 23:21:44 localhost sshd[55412]: Failed password for root from 188.254.0.183 port 59972 ssh2
Jun 23 23:26:22 localhost sshd[55884]: Invalid user kevin from 188.254.0.183 port 59130
...
2020-06-24 08:11:01
115.78.229.60 attack
20/6/23@16:31:43: FAIL: Alarm-Network address from=115.78.229.60
...
2020-06-24 07:49:31
212.145.192.205 attack
Jun 23 19:21:20 firewall sshd[26523]: Failed password for invalid user ebs from 212.145.192.205 port 57098 ssh2
Jun 23 19:27:25 firewall sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205  user=root
Jun 23 19:27:27 firewall sshd[26656]: Failed password for root from 212.145.192.205 port 57636 ssh2
...
2020-06-24 08:18:18
218.75.72.82 attackspambots
Jun 23 23:14:21 marvibiene sshd[18543]: Invalid user ent from 218.75.72.82 port 49928
Jun 23 23:14:21 marvibiene sshd[18543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.72.82
Jun 23 23:14:21 marvibiene sshd[18543]: Invalid user ent from 218.75.72.82 port 49928
Jun 23 23:14:23 marvibiene sshd[18543]: Failed password for invalid user ent from 218.75.72.82 port 49928 ssh2
...
2020-06-24 08:17:50
103.145.12.166 attackbots
[2020-06-23 19:48:25] NOTICE[1273][C-000041af] chan_sip.c: Call from '' (103.145.12.166:60982) to extension '76500046542208930' rejected because extension not found in context 'public'.
[2020-06-23 19:48:25] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-23T19:48:25.059-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="76500046542208930",SessionID="0x7f31c03f7758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.166/60982",ACLName="no_extension_match"
[2020-06-23 19:49:08] NOTICE[1273][C-000041b0] chan_sip.c: Call from '' (103.145.12.166:53063) to extension '76510046542208930' rejected because extension not found in context 'public'.
[2020-06-23 19:49:08] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-23T19:49:08.986-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="76510046542208930",SessionID="0x7f31c03f7758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress
...
2020-06-24 08:01:53
197.62.123.17 attackbotsspam
2020-06-23T20:31:21.316769homeassistant sshd[25721]: Invalid user admin from 197.62.123.17 port 56611
2020-06-23T20:31:21.329514homeassistant sshd[25721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.123.17
...
2020-06-24 08:16:34
222.186.3.249 attackbots
Jun 24 01:56:31 OPSO sshd\[16427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249  user=root
Jun 24 01:56:33 OPSO sshd\[16427\]: Failed password for root from 222.186.3.249 port 13515 ssh2
Jun 24 01:56:35 OPSO sshd\[16427\]: Failed password for root from 222.186.3.249 port 13515 ssh2
Jun 24 01:56:37 OPSO sshd\[16427\]: Failed password for root from 222.186.3.249 port 13515 ssh2
Jun 24 01:57:45 OPSO sshd\[16643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249  user=root
2020-06-24 08:09:55
196.221.149.76 attackspam
Unauthorized connection attempt from IP address 196.221.149.76 on Port 445(SMB)
2020-06-24 08:06:25

最近上报的IP列表

140.116.108.158 103.37.201.191 140.116.233.56 140.116.117.113
195.199.248.141 140.130.201.11 140.116.16.237 130.34.47.53
140.116.191.228 210.240.248.55 116.206.43.103 140.116.95.101
137.63.196.2 140.116.20.91 140.116.76.63 140.116.218.251
140.116.53.103 223.202.216.33 140.116.26.79 155.207.200.85