必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.120.90.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.120.90.46.			IN	A

;; AUTHORITY SECTION:
.			144	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:15:14 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
46.90.120.140.in-addr.arpa domain name pointer lsnchu.ee.nchu.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.90.120.140.in-addr.arpa	name = lsnchu.ee.nchu.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.78.8.83 attackbotsspam
Oct 20 09:00:04 firewall sshd[31603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.8.83
Oct 20 09:00:04 firewall sshd[31603]: Invalid user steve from 115.78.8.83
Oct 20 09:00:06 firewall sshd[31603]: Failed password for invalid user steve from 115.78.8.83 port 56954 ssh2
...
2019-10-21 01:04:12
51.38.127.31 attackbots
2019-10-20T13:14:58.034519shield sshd\[12995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-51-38-127.eu  user=root
2019-10-20T13:15:00.080081shield sshd\[12995\]: Failed password for root from 51.38.127.31 port 33522 ssh2
2019-10-20T13:19:01.693016shield sshd\[13970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-51-38-127.eu  user=root
2019-10-20T13:19:04.425411shield sshd\[13970\]: Failed password for root from 51.38.127.31 port 44538 ssh2
2019-10-20T13:23:02.414752shield sshd\[14848\]: Invalid user gx from 51.38.127.31 port 55542
2019-10-21 01:01:38
49.48.96.113 attackbots
Hits on port : 9001
2019-10-21 00:47:35
174.7.235.9 attack
Oct 20 13:13:54 XXX sshd[46827]: Invalid user ofsaa from 174.7.235.9 port 57560
2019-10-21 01:09:44
211.147.216.19 attackbotsspam
Oct 20 17:54:51 vps647732 sshd[20548]: Failed password for root from 211.147.216.19 port 51482 ssh2
...
2019-10-21 00:55:09
103.57.80.58 attack
SpamReport
2019-10-21 01:00:30
23.129.64.190 attackspambots
GET (not exists) posting.php-spambot
2019-10-21 00:28:06
160.153.156.135 attack
Automatic report - XMLRPC Attack
2019-10-21 00:33:07
178.33.221.33 attackspam
Automatic report - XMLRPC Attack
2019-10-21 01:18:27
185.40.14.59 attack
" "
2019-10-21 01:02:51
218.150.220.214 attackbots
Oct 20 13:44:02 XXX sshd[47236]: Invalid user ofsaa from 218.150.220.214 port 44862
2019-10-21 00:49:34
36.74.75.31 attackbotsspam
Oct 20 13:28:27 XXX sshd[47014]: Invalid user df from 36.74.75.31 port 42450
2019-10-21 00:54:18
110.231.45.218 attackspam
(Oct 20)  LEN=40 TTL=48 ID=17985 TCP DPT=8080 WINDOW=15279 SYN 
 (Oct 20)  LEN=40 TTL=48 ID=671 TCP DPT=8080 WINDOW=40474 SYN 
 (Oct 20)  LEN=40 TTL=48 ID=50146 TCP DPT=8080 WINDOW=15279 SYN 
 (Oct 20)  LEN=40 TTL=48 ID=24457 TCP DPT=8080 WINDOW=32487 SYN 
 (Oct 19)  LEN=40 TTL=48 ID=19289 TCP DPT=8080 WINDOW=15279 SYN 
 (Oct 19)  LEN=40 TTL=48 ID=900 TCP DPT=8080 WINDOW=1910 SYN 
 (Oct 18)  LEN=40 TTL=48 ID=16352 TCP DPT=8080 WINDOW=1910 SYN 
 (Oct 17)  LEN=40 TTL=48 ID=38216 TCP DPT=8080 WINDOW=61031 SYN 
 (Oct 16)  LEN=40 TTL=48 ID=6828 TCP DPT=8080 WINDOW=38175 SYN 
 (Oct 16)  LEN=40 TTL=48 ID=15284 TCP DPT=8080 WINDOW=42274 SYN 
 (Oct 16)  LEN=40 TTL=48 ID=58309 TCP DPT=8080 WINDOW=1910 SYN 
 (Oct 15)  LEN=40 TTL=48 ID=31270 TCP DPT=8080 WINDOW=35236 SYN 
 (Oct 15)  LEN=40 TTL=48 ID=61348 TCP DPT=8080 WINDOW=35236 SYN 
 (Oct 15)  LEN=40 TTL=48 ID=51828 TCP DPT=8080 WINDOW=40474 SYN 
 (Oct 15)  LEN=40 TTL=48 ID=29274 TCP DPT=8080 WINDOW=53484 SYN 
 (Oct 15)  LEN=40 TTL=48 ID=56363...
2019-10-21 00:25:32
59.127.32.39 attackbotsspam
firewall-block, port(s): 9001/tcp
2019-10-21 00:51:03
14.18.100.90 attackspambots
Oct 20 16:50:57 hcbbdb sshd\[4780\]: Invalid user test9 from 14.18.100.90
Oct 20 16:50:57 hcbbdb sshd\[4780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.100.90
Oct 20 16:51:00 hcbbdb sshd\[4780\]: Failed password for invalid user test9 from 14.18.100.90 port 34960 ssh2
Oct 20 16:56:04 hcbbdb sshd\[5288\]: Invalid user med from 14.18.100.90
Oct 20 16:56:04 hcbbdb sshd\[5288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.100.90
2019-10-21 01:16:33

最近上报的IP列表

140.116.187.27 140.116.214.17 140.110.16.55 152.66.226.47
140.116.31.82 210.72.16.35 140.130.22.71 140.116.176.116
183.172.170.25 140.116.163.116 134.208.43.127 140.116.88.150
140.116.71.127 202.118.1.81 140.116.155.129 147.46.94.213
140.116.187.126 140.116.49.24 205.251.192.206 54.219.144.49