必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.125.240.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.125.240.125.		IN	A

;; AUTHORITY SECTION:
.			435	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:12:24 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
125.240.125.140.in-addr.arpa domain name pointer web05.yuntech.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.240.125.140.in-addr.arpa	name = web05.yuntech.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.236.0.147 attackbots
SMB Server BruteForce Attack
2019-07-11 02:47:11
128.199.143.163 attackspam
detected by Fail2Ban
2019-07-11 03:15:23
198.98.53.237 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-11 03:08:55
185.176.27.102 attackbots
firewall-block, port(s): 18695/tcp, 18696/tcp, 18798/tcp
2019-07-11 03:15:08
182.23.42.196 attack
[ssh] SSH attack
2019-07-11 03:12:58
112.234.22.248 attackspam
" "
2019-07-11 03:08:13
80.240.18.187 attackspambots
445/tcp
[2019-07-10]1pkt
2019-07-11 02:38:05
64.32.11.17 attack
Port 1080 Scan
2019-07-11 02:54:51
14.166.131.187 attackbots
Unauthorised access (Jul 10) SRC=14.166.131.187 LEN=52 TTL=117 ID=4948 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-11 03:02:30
77.40.95.64 attackbots
2019-07-10T18:28:55.003980mail01 postfix/smtpd[27867]: warning: unknown[77.40.95.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-10T18:29:28.110933mail01 postfix/smtpd[2135]: warning: unknown[77.40.95.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-10T18:29:47.121769mail01 postfix/smtpd[27886]: warning: unknown[77.40.95.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-11 02:53:34
45.117.30.26 attackbotsspam
Unauthorised access (Jul 10) SRC=45.117.30.26 LEN=48 PREC=0x20 TTL=108 ID=6384 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-11 02:48:12
185.176.27.178 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 02:57:44
59.90.81.156 attackbotsspam
Unauthorised access (Jul 10) SRC=59.90.81.156 LEN=40 PREC=0x20 TTL=48 ID=34275 TCP DPT=23 WINDOW=15253 SYN
2019-07-11 02:43:47
93.117.35.119 attackbotsspam
Unauthorised access (Jul 10) SRC=93.117.35.119 LEN=40 TTL=53 ID=57893 TCP DPT=23 WINDOW=11666 SYN
2019-07-11 03:02:50
185.222.211.2 attackbotsspam
Jul  8 12:57:10 server postfix/smtpd[26771]: NOQUEUE: reject: RCPT from unknown[185.222.211.2]: 554 5.7.1 Service unavailable; Client host [185.222.211.2] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL442573 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[185.222.211.2]>
Jul  8 12:57:10 server postfix/smtpd[26771]: NOQUEUE: reject: RCPT from unknown[185.222.211.2]: 554 5.7.1 Service unavailable; Client host [185.222.211.2] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL442573 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[185.222.211.2]>
2019-07-11 02:44:36

最近上报的IP列表

140.116.186.42 163.28.112.17 194.146.106.74 147.46.238.22
159.14.233.10 171.67.70.73 140.116.195.152 140.116.67.167
140.110.113.130 206.148.181.36 140.126.24.10 143.107.232.217
140.116.249.203 140.116.235.29 140.117.248.3 101.6.140.64
159.93.50.175 140.126.24.65 155.97.235.124 140.116.168.119