必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.138.241.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.138.241.92.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:41:20 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 92.241.138.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.241.138.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.93.58.18 attackspam
Oct 13 14:23:14 minden010 sshd[924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.58.18
Oct 13 14:23:15 minden010 sshd[924]: Failed password for invalid user wangyi from 111.93.58.18 port 56382 ssh2
Oct 13 14:27:34 minden010 sshd[2511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.58.18
...
2020-10-13 21:21:26
221.203.23.107 attack
(ftpd) Failed FTP login from 221.203.23.107 (CN/China/-): 10 in the last 3600 secs
2020-10-13 21:41:43
165.231.148.166 attackspambots
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-10-13 21:56:33
82.208.65.46 attack
Unauthorized IMAP connection attempt
2020-10-13 21:12:49
189.190.40.87 attack
Lines containing failures of 189.190.40.87
Oct 12 16:31:17 nemesis sshd[12571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.190.40.87  user=r.r
Oct 12 16:31:20 nemesis sshd[12571]: Failed password for r.r from 189.190.40.87 port 40436 ssh2
Oct 12 16:31:22 nemesis sshd[12571]: Received disconnect from 189.190.40.87 port 40436:11: Bye Bye [preauth]
Oct 12 16:31:22 nemesis sshd[12571]: Disconnected from authenticating user r.r 189.190.40.87 port 40436 [preauth]
Oct 12 16:35:12 nemesis sshd[13997]: Invalid user soporte from 189.190.40.87 port 47084
Oct 12 16:35:12 nemesis sshd[13997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.190.40.87 
Oct 12 16:35:14 nemesis sshd[13997]: Failed password for invalid user soporte from 189.190.40.87 port 47084 ssh2
Oct 12 16:35:15 nemesis sshd[13997]: Received disconnect from 189.190.40.87 port 47084:11: Bye Bye [preauth]
Oct 12 16:35:15 nemesis ........
------------------------------
2020-10-13 21:55:37
167.71.211.45 attack
Invalid user honda from 167.71.211.45 port 57658
2020-10-13 21:34:34
102.114.15.254 attackbots
Port scan denied
2020-10-13 21:54:49
45.129.33.152 attackspambots
scans 17 times in preceeding hours on the ports (in chronological order) 4339 4075 4042 4048 4082 4027 4406 4349 4058 4110 4117 4321 4078 4421 4180 4121 4459 resulting in total of 82 scans from 45.129.33.0/24 block.
2020-10-13 21:37:28
73.13.104.201 attackspambots
Oct 13 07:47:31 mx sshd[9256]: Failed password for root from 73.13.104.201 port 57394 ssh2
Oct 13 08:04:24 mx sshd[21444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.13.104.201
2020-10-13 21:13:02
104.248.130.10 attackspambots
Oct 13 13:54:01 ajax sshd[30630]: Failed password for root from 104.248.130.10 port 51490 ssh2
Oct 13 13:57:38 ajax sshd[31719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10
2020-10-13 21:22:10
40.118.226.96 attackspam
Oct 13 12:31:42 localhost sshd\[26222\]: Invalid user sunny from 40.118.226.96
Oct 13 12:31:42 localhost sshd\[26222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.226.96
Oct 13 12:31:44 localhost sshd\[26222\]: Failed password for invalid user sunny from 40.118.226.96 port 56550 ssh2
Oct 13 12:35:46 localhost sshd\[26574\]: Invalid user kazakov from 40.118.226.96
Oct 13 12:35:46 localhost sshd\[26574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.226.96
...
2020-10-13 21:22:37
111.229.159.76 attackbotsspam
Oct 13 14:45:07 server sshd[462]: Failed password for invalid user lsfadmin from 111.229.159.76 port 39032 ssh2
Oct 13 15:00:21 server sshd[9588]: Failed password for invalid user patrick from 111.229.159.76 port 40828 ssh2
Oct 13 15:05:18 server sshd[12401]: Failed password for root from 111.229.159.76 port 37444 ssh2
2020-10-13 21:17:20
45.148.10.15 attackspambots
Bruteforce detected by fail2ban
2020-10-13 21:25:53
141.101.25.191 attackbots
uvcm 141.101.25.191 [13/Oct/2020:15:35:31 "-" "POST /wp-login.php 200 1962
141.101.25.191 [13/Oct/2020:15:35:31 "-" "GET /wp-login.php 200 1578
141.101.25.191 [13/Oct/2020:15:35:32 "-" "POST /wp-login.php 200 1936
2020-10-13 21:57:02
113.23.144.50 attack
Oct 13 13:10:43 scw-focused-cartwright sshd[16789]: Failed password for root from 113.23.144.50 port 58758 ssh2
2020-10-13 21:57:25

最近上报的IP列表

123.197.80.67 42.179.164.149 226.54.163.173 202.254.32.150
48.237.148.72 101.243.5.9 21.158.187.150 4.88.231.111
209.243.211.45 42.193.94.144 226.58.179.187 66.200.119.249
167.63.107.245 241.1.159.37 32.54.102.173 124.38.148.230
88.152.27.0 127.231.227.219 153.78.142.31 251.68.42.52