必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.119.195.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.119.195.27.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 15:46:43 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 27.195.119.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 27.195.119.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.171.11.116 attackbots
Nov 11 15:37:19 MK-Soft-VM7 sshd[28925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.171.11.116 
Nov 11 15:37:22 MK-Soft-VM7 sshd[28925]: Failed password for invalid user asd from 46.171.11.116 port 33464 ssh2
...
2019-11-12 05:01:27
59.124.104.157 attackbotsspam
Nov 11 18:15:44 v22018086721571380 sshd[18981]: Failed password for invalid user Passowrd01 from 59.124.104.157 port 34200 ssh2
Nov 11 19:20:14 v22018086721571380 sshd[21125]: Failed password for invalid user ricky from 59.124.104.157 port 40089 ssh2
2019-11-12 04:54:43
81.218.186.117 attack
Honeypot attack, port: 23, PTR: bzq-218-186-117.red.bezeqint.net.
2019-11-12 05:20:23
86.188.246.2 attack
SSH Brute Force
2019-11-12 05:09:45
157.230.239.99 attackspam
2019-11-11T16:28:54.395665abusebot-7.cloudsearch.cf sshd\[18448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.239.99  user=root
2019-11-12 05:24:32
198.50.197.216 attackspambots
Nov 11 16:00:01 dedicated sshd[4018]: Invalid user 11111111 from 198.50.197.216 port 41364
2019-11-12 04:54:55
14.181.78.177 attack
Unauthorised access (Nov 11) SRC=14.181.78.177 LEN=44 TTL=53 ID=32980 TCP DPT=23 WINDOW=24719 SYN
2019-11-12 05:23:57
114.116.180.115 attack
ENG,DEF GET /w00tw00t.at.blackhats.romanian.anti-sec:)
2019-11-12 05:16:04
178.128.217.58 attackspam
2019-11-11T16:38:49.669323abusebot.cloudsearch.cf sshd\[12275\]: Invalid user modeste from 178.128.217.58 port 47208
2019-11-12 05:28:17
117.121.38.110 attackbots
Nov 11 08:47:55 php1 sshd\[20519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.38.110  user=root
Nov 11 08:47:57 php1 sshd\[20519\]: Failed password for root from 117.121.38.110 port 41427 ssh2
Nov 11 08:52:22 php1 sshd\[20897\]: Invalid user wiggin from 117.121.38.110
Nov 11 08:52:22 php1 sshd\[20897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.38.110
Nov 11 08:52:25 php1 sshd\[20897\]: Failed password for invalid user wiggin from 117.121.38.110 port 57617 ssh2
2019-11-12 05:23:16
118.24.153.230 attack
Nov 11 15:31:46 vserver sshd\[26180\]: Invalid user sundell from 118.24.153.230Nov 11 15:31:48 vserver sshd\[26180\]: Failed password for invalid user sundell from 118.24.153.230 port 39686 ssh2Nov 11 15:36:56 vserver sshd\[26205\]: Invalid user ulrika from 118.24.153.230Nov 11 15:36:58 vserver sshd\[26205\]: Failed password for invalid user ulrika from 118.24.153.230 port 46528 ssh2
...
2019-11-12 05:18:33
46.38.144.202 attack
2019-11-11T21:36:37.101770mail01 postfix/smtpd[20570]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T21:37:03.106168mail01 postfix/smtpd[3248]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T21:37:29.148464mail01 postfix/smtpd[20570]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12 04:58:39
222.186.175.212 attack
SSH Brute Force, server-1 sshd[12670]: Failed password for root from 222.186.175.212 port 22350 ssh2
2019-11-12 05:18:51
138.68.53.163 attack
SSH Bruteforce attack
2019-11-12 05:21:37
59.72.122.148 attackspam
2019-11-11T18:28:18.160265abusebot-5.cloudsearch.cf sshd\[5512\]: Invalid user www from 59.72.122.148 port 51258
2019-11-12 05:06:23

最近上报的IP列表

132.20.15.202 96.222.150.69 251.246.126.75 89.198.201.1
174.54.2.189 138.227.128.120 189.199.82.40 180.211.163.193
213.86.91.156 220.181.91.44 253.246.156.94 109.128.96.234
119.121.157.5 167.11.19.10 104.154.250.84 6.126.23.69
165.172.54.42 43.113.205.110 205.127.184.73 228.242.13.187