必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.139.124.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.139.124.146.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:12:19 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 146.124.139.140.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 140.139.124.146.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.107.70.202 attack
timhelmke.de:80 185.107.70.202 - - \[27/Sep/2019:14:09:15 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 491 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_11_6\) AppleWebKit/605.1.15 \(KHTML, like Gecko\) Version/11.1.2 Safari/605.1.15"
timhelmke.de 185.107.70.202 \[27/Sep/2019:14:09:17 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3777 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_11_6\) AppleWebKit/605.1.15 \(KHTML, like Gecko\) Version/11.1.2 Safari/605.1.15"
2019-09-28 01:58:40
222.186.175.148 attack
2019-09-27T18:07:15.299960hub.schaetter.us sshd\[3814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2019-09-27T18:07:16.912035hub.schaetter.us sshd\[3814\]: Failed password for root from 222.186.175.148 port 62254 ssh2
2019-09-27T18:07:20.973873hub.schaetter.us sshd\[3814\]: Failed password for root from 222.186.175.148 port 62254 ssh2
2019-09-27T18:07:25.586925hub.schaetter.us sshd\[3814\]: Failed password for root from 222.186.175.148 port 62254 ssh2
2019-09-27T18:07:29.747970hub.schaetter.us sshd\[3814\]: Failed password for root from 222.186.175.148 port 62254 ssh2
...
2019-09-28 02:15:23
185.164.72.117 attack
[FriSep2715:18:39.8089032019][:error][pid10000:tid46955287844608][client185.164.72.117:62976][client185.164.72.117]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:s-e-x\|zoo\(\?:ph\|f\)ilia\|giantcock\\\\\\\\b\|porn\(\?:hub\|tube\)\|sexyongpin\|\(\?:wi\(\?:f\|v\)es\?\|slaves\?\|strippers\?\|whores\?\|prostitutes\?\|under[-_.\,\\\\"\\\\\\\\'\\\\\\\\\|]\?age\|teeners\?\|lolitas\?\|animal\|dog\|couples\?\|bisexuals\?\|bicurious\|anal\|ass\|fisting\|rimming\|pussy[-_.\,\\\\"\\\\\\\\'\\\\\\\\\|]..."atARGS:pwd.[file"/usr/local/apache.ea3/conf/modsec_rules/30_asl_antispam.conf"][line"322"][id"300074"][rev"23"][msg"Atomicorp.comWAFAntiSpamRules:Spam:Adult"][data"33foundwithinARGS:pwd:analsex"][severity"WARNING"][hostname"trullomanagement.com"][uri"/wp-login.php"][unique_id"XY4ML26aUGl1EsiY6p14XQAAAI8"][FriSep2715:22:53.1337872019][:error][pid4843:tid46955292047104][client185.164.72.117:63837][client185.164.72.117]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\
2019-09-28 02:03:17
162.243.136.230 attackbots
Sep 27 18:12:54 apollo sshd\[9603\]: Invalid user ods from 162.243.136.230Sep 27 18:12:57 apollo sshd\[9603\]: Failed password for invalid user ods from 162.243.136.230 port 43994 ssh2Sep 27 18:22:34 apollo sshd\[9642\]: Invalid user nicole from 162.243.136.230
...
2019-09-28 02:01:08
124.41.211.27 attackbots
Sep 27 14:45:25 vtv3 sshd\[5747\]: Invalid user tf from 124.41.211.27 port 39982
Sep 27 14:45:25 vtv3 sshd\[5747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27
Sep 27 14:45:27 vtv3 sshd\[5747\]: Failed password for invalid user tf from 124.41.211.27 port 39982 ssh2
Sep 27 14:51:08 vtv3 sshd\[8586\]: Invalid user matilda from 124.41.211.27 port 42534
Sep 27 14:51:08 vtv3 sshd\[8586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27
Sep 27 15:02:08 vtv3 sshd\[14439\]: Invalid user archive from 124.41.211.27 port 44782
Sep 27 15:02:08 vtv3 sshd\[14439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27
Sep 27 15:02:10 vtv3 sshd\[14439\]: Failed password for invalid user archive from 124.41.211.27 port 44782 ssh2
Sep 27 15:07:49 vtv3 sshd\[17485\]: Invalid user qhsupport from 124.41.211.27 port 45690
Sep 27 15:07:49 vtv3 sshd\[17485\]: pam_un
2019-09-28 02:28:32
118.68.170.172 attack
Sep 27 18:05:54 venus sshd\[23870\]: Invalid user alyssa from 118.68.170.172 port 35556
Sep 27 18:05:54 venus sshd\[23870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172
Sep 27 18:05:56 venus sshd\[23870\]: Failed password for invalid user alyssa from 118.68.170.172 port 35556 ssh2
...
2019-09-28 02:14:48
51.75.195.222 attackspam
Sep 27 06:11:30 hanapaa sshd\[6217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-75-195.eu  user=root
Sep 27 06:11:32 hanapaa sshd\[6217\]: Failed password for root from 51.75.195.222 port 44444 ssh2
Sep 27 06:16:03 hanapaa sshd\[6627\]: Invalid user dan1 from 51.75.195.222
Sep 27 06:16:03 hanapaa sshd\[6627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-75-195.eu
Sep 27 06:16:04 hanapaa sshd\[6627\]: Failed password for invalid user dan1 from 51.75.195.222 port 57592 ssh2
2019-09-28 02:17:06
148.72.207.248 attackspam
Sep 27 20:18:27 MK-Soft-VM3 sshd[25903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.207.248 
Sep 27 20:18:28 MK-Soft-VM3 sshd[25903]: Failed password for invalid user be from 148.72.207.248 port 43938 ssh2
...
2019-09-28 02:25:37
80.211.113.144 attack
Sep 13 03:48:11 vtv3 sshd\[22284\]: Invalid user mongouser from 80.211.113.144 port 46510
Sep 13 03:48:11 vtv3 sshd\[22284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 13 03:48:13 vtv3 sshd\[22284\]: Failed password for invalid user mongouser from 80.211.113.144 port 46510 ssh2
Sep 13 03:57:14 vtv3 sshd\[26986\]: Invalid user oracle from 80.211.113.144 port 60066
Sep 13 03:57:14 vtv3 sshd\[26986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 13 04:10:24 vtv3 sshd\[1160\]: Invalid user ts3 from 80.211.113.144 port 32906
Sep 13 04:10:24 vtv3 sshd\[1160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.144
Sep 13 04:10:26 vtv3 sshd\[1160\]: Failed password for invalid user ts3 from 80.211.113.144 port 32906 ssh2
Sep 13 04:15:41 vtv3 sshd\[3744\]: Invalid user tester from 80.211.113.144 port 56692
Sep 13 04:15:41 vtv3 sshd\[374
2019-09-28 02:10:25
138.117.109.103 attack
Sep 27 08:38:30 hpm sshd\[32043\]: Invalid user ubnt from 138.117.109.103
Sep 27 08:38:30 hpm sshd\[32043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.109.103
Sep 27 08:38:32 hpm sshd\[32043\]: Failed password for invalid user ubnt from 138.117.109.103 port 33048 ssh2
Sep 27 08:43:09 hpm sshd\[32609\]: Invalid user guest from 138.117.109.103
Sep 27 08:43:09 hpm sshd\[32609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.109.103
2019-09-28 02:47:05
139.59.41.154 attackspambots
2019-09-27T21:27:00.827842tmaserv sshd\[18465\]: Failed password for invalid user telnetd from 139.59.41.154 port 54926 ssh2
2019-09-27T21:41:01.301253tmaserv sshd\[19162\]: Invalid user its from 139.59.41.154 port 40988
2019-09-27T21:41:01.307254tmaserv sshd\[19162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
2019-09-27T21:41:04.056839tmaserv sshd\[19162\]: Failed password for invalid user its from 139.59.41.154 port 40988 ssh2
2019-09-27T21:45:38.645422tmaserv sshd\[19411\]: Invalid user minecraftserver from 139.59.41.154 port 37728
2019-09-27T21:45:38.651843tmaserv sshd\[19411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
...
2019-09-28 02:46:38
121.182.166.82 attack
Sep 27 14:05:08 xeon sshd[39712]: Failed password for invalid user jacob from 121.182.166.82 port 34004 ssh2
2019-09-28 02:38:43
171.240.41.84 attackspam
Sep 27 14:08:07 dev sshd\[1742\]: Invalid user admin from 171.240.41.84 port 39399
Sep 27 14:08:07 dev sshd\[1742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.240.41.84
Sep 27 14:08:09 dev sshd\[1742\]: Failed password for invalid user admin from 171.240.41.84 port 39399 ssh2
2019-09-28 02:37:09
119.112.207.94 attack
Unauthorised access (Sep 27) SRC=119.112.207.94 LEN=40 TTL=49 ID=40882 TCP DPT=8080 WINDOW=41535 SYN 
Unauthorised access (Sep 27) SRC=119.112.207.94 LEN=40 TTL=49 ID=7142 TCP DPT=8080 WINDOW=7339 SYN 
Unauthorised access (Sep 26) SRC=119.112.207.94 LEN=40 TTL=49 ID=29758 TCP DPT=8080 WINDOW=7339 SYN 
Unauthorised access (Sep 26) SRC=119.112.207.94 LEN=40 TTL=49 ID=64745 TCP DPT=8080 WINDOW=41535 SYN 
Unauthorised access (Sep 26) SRC=119.112.207.94 LEN=40 TTL=49 ID=58393 TCP DPT=8080 WINDOW=43537 SYN 
Unauthorised access (Sep 25) SRC=119.112.207.94 LEN=40 TTL=49 ID=9066 TCP DPT=8080 WINDOW=43537 SYN 
Unauthorised access (Sep 24) SRC=119.112.207.94 LEN=40 TTL=48 ID=14136 TCP DPT=8080 WINDOW=36543 SYN
2019-09-28 02:37:25
41.207.74.5 attackspambots
" "
2019-09-28 02:32:33

最近上报的IP列表

90.28.114.147 192.198.10.85 28.181.79.229 13.80.241.80
65.46.128.62 31.211.59.68 8.202.254.108 214.56.159.17
7.229.4.60 206.146.236.12 2.236.70.38 115.179.161.214
94.213.139.10 78.119.194.209 212.241.17.98 121.81.135.242
36.198.41.40 101.182.173.218 209.127.18.3 104.113.210.222