必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.133.80.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.133.80.115.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:42:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
115.80.133.140.in-addr.arpa domain name pointer 140-133-80-115.client.kuas.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
115.80.133.140.in-addr.arpa	name = 140-133-80-115.client.kuas.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.64.94.221 attack
unauthorized connection attempt
2020-02-01 14:59:32
5.89.10.81 attackbotsspam
Feb  1 07:51:44 legacy sshd[7510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.89.10.81
Feb  1 07:51:46 legacy sshd[7510]: Failed password for invalid user fabian from 5.89.10.81 port 52472 ssh2
Feb  1 07:55:12 legacy sshd[7672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.89.10.81
...
2020-02-01 15:21:24
185.234.216.88 attack
Unauthorized connection attempt detected from IP address 185.234.216.88 to port 25 [J]
2020-02-01 15:14:47
77.42.74.42 attackbotsspam
Automatic report - Port Scan Attack
2020-02-01 15:20:02
185.232.67.5 attackspambots
Feb  1 06:46:08 dedicated sshd[2709]: Invalid user admin from 185.232.67.5 port 52461
2020-02-01 14:58:16
54.193.35.70 attackbotsspam
User agent spoofing, by Amazon Technologies Inc.
2020-02-01 15:25:48
51.89.125.114 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-01 14:48:35
138.36.205.30 attackspambots
Feb  1 05:56:24 grey postfix/smtpd\[15098\]: NOQUEUE: reject: RCPT from unknown\[138.36.205.30\]: 554 5.7.1 Service unavailable\; Client host \[138.36.205.30\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?138.36.205.30\; from=\ to=\ proto=ESMTP helo=\<\[138.36.205.30\]\>
...
2020-02-01 14:46:56
175.145.89.123 attackspambots
Feb  1 05:52:26 plex sshd[578]: Invalid user tester from 175.145.89.123 port 18504
Feb  1 05:52:26 plex sshd[578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.89.123
Feb  1 05:52:26 plex sshd[578]: Invalid user tester from 175.145.89.123 port 18504
Feb  1 05:52:28 plex sshd[578]: Failed password for invalid user tester from 175.145.89.123 port 18504 ssh2
Feb  1 05:56:24 plex sshd[613]: Invalid user teamspeak from 175.145.89.123 port 33574
2020-02-01 14:46:25
219.84.229.101 attackspambots
20/1/31@23:55:59: FAIL: Alarm-Network address from=219.84.229.101
...
2020-02-01 15:00:28
103.210.133.20 attackbotsspam
Invalid user DUP from 103.210.133.20 port 59672
2020-02-01 15:17:22
194.55.185.63 attackspam
FROM MAYAK CONSULTING
2020-02-01 15:12:55
36.67.226.223 attackbots
Invalid user abdullah from 36.67.226.223 port 53720
2020-02-01 15:29:26
106.13.118.216 attackbots
Feb  1 05:55:40 jane sshd[9077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.118.216 
Feb  1 05:55:42 jane sshd[9077]: Failed password for invalid user vyatta from 106.13.118.216 port 35560 ssh2
...
2020-02-01 15:12:37
118.71.97.37 attackbots
1580532947 - 02/01/2020 05:55:47 Host: 118.71.97.37/118.71.97.37 Port: 445 TCP Blocked
2020-02-01 15:10:02

最近上报的IP列表

27.81.19.199 185.79.119.106 78.28.183.186 95.251.228.205
141.109.155.236 139.170.52.202 77.25.53.205 60.146.215.89
41.40.18.220 113.93.88.87 120.102.136.121 70.68.67.18
198.96.212.249 242.65.209.53 146.139.133.135 83.128.136.184
95.161.81.81 94.181.151.152 77.50.38.253 154.45.45.51