必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.132.140.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.132.140.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 05:28:13 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 50.140.132.140.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 140.132.140.50.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.230.115.251 attackspambots
Invalid user winsevik from 222.230.115.251 port 56978
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.230.115.251
Failed password for invalid user winsevik from 222.230.115.251 port 56978 ssh2
Invalid user privacy123 from 222.230.115.251 port 42426
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.230.115.251
2019-12-24 17:38:55
51.75.153.255 attackbots
Dec 24 07:18:09 *** sshd[3683]: User root from 51.75.153.255 not allowed because not listed in AllowUsers
2019-12-24 17:49:59
132.232.4.33 attack
$f2bV_matches
2019-12-24 17:56:21
220.165.149.147 attackspambots
Honeypot attack, port: 23, PTR: 147.149.165.220.broad.lc.yn.dynamic.163data.com.cn.
2019-12-24 17:55:23
212.92.105.177 attackspambots
Automatic report - Windows Brute-Force Attack
2019-12-24 17:51:30
58.87.75.178 attack
Dec 24 06:53:28 raspberrypi sshd\[19685\]: Invalid user ching from 58.87.75.178Dec 24 06:53:30 raspberrypi sshd\[19685\]: Failed password for invalid user ching from 58.87.75.178 port 60886 ssh2Dec 24 07:18:05 raspberrypi sshd\[21203\]: Invalid user kirkpatrick from 58.87.75.178
...
2019-12-24 17:56:46
1.61.75.195 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-24 17:46:32
14.186.120.222 attackbotsspam
1577171879 - 12/24/2019 08:17:59 Host: 14.186.120.222/14.186.120.222 Port: 445 TCP Blocked
2019-12-24 18:05:21
91.221.132.131 attackspam
Dec 24 08:18:14 debian-2gb-nbg1-2 kernel: \[824635.312850\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=91.221.132.131 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=52 ID=16209 DF PROTO=TCP SPT=64120 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-24 17:48:23
127.0.0.1 attack
Test Connectivity
2019-12-24 17:43:54
197.51.165.101 attackspam
Honeypot attack, port: 23, PTR: host-197.51.165.101.tedata.net.
2019-12-24 17:37:03
111.72.194.183 attack
2019-12-24T08:17:49.526393 X postfix/smtpd[12691]: lost connection after AUTH from unknown[111.72.194.183]
2019-12-24T08:17:50.463229 X postfix/smtpd[10716]: lost connection after AUTH from unknown[111.72.194.183]
2019-12-24T08:17:51.383626 X postfix/smtpd[12693]: lost connection after AUTH from unknown[111.72.194.183]
2019-12-24 18:11:00
79.100.113.155 attack
SMB Server BruteForce Attack
2019-12-24 17:47:50
113.205.184.171 attackbotsspam
Scanning
2019-12-24 17:40:02
31.14.40.216 attackbotsspam
Dec 24 08:17:48 debian-2gb-nbg1-2 kernel: \[824609.841104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=31.14.40.216 DST=195.201.40.59 LEN=45 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=UDP SPT=41043 DPT=53413 LEN=25
2019-12-24 18:13:37

最近上报的IP列表

153.42.70.136 114.238.186.163 237.51.19.164 253.203.81.105
23.72.40.167 8.211.230.98 216.82.212.132 30.56.166.67
237.195.76.85 172.156.133.234 161.61.164.244 248.33.87.82
52.202.106.215 63.194.139.197 254.237.165.157 93.45.253.37
80.200.229.62 95.140.81.147 255.108.222.123 130.151.61.204