必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Melbourne

省份(region): Victoria

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.159.118.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.159.118.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:05:02 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 52.118.159.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.118.159.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.39.160.69 attackspambots
Unauthorized connection attempt from IP address 195.39.160.69 on Port 445(SMB)
2019-10-10 00:48:39
219.90.115.237 attackspambots
Oct  9 06:50:02 wbs sshd\[21878\]: Invalid user Par0la1! from 219.90.115.237
Oct  9 06:50:02 wbs sshd\[21878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-ip-237-115-90-219.rev.dyxnet.com
Oct  9 06:50:03 wbs sshd\[21878\]: Failed password for invalid user Par0la1! from 219.90.115.237 port 43682 ssh2
Oct  9 06:53:50 wbs sshd\[22183\]: Invalid user Haslo!@\#123 from 219.90.115.237
Oct  9 06:53:50 wbs sshd\[22183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-ip-237-115-90-219.rev.dyxnet.com
2019-10-10 01:00:51
196.218.38.151 attackspam
Oct 07 20:22:08 host sshd[15937]: Failed password for invalid user root from 196.218.38.151 port 58378
2019-10-10 00:52:50
36.91.75.125 attack
Unauthorized connection attempt from IP address 36.91.75.125 on Port 445(SMB)
2019-10-10 01:20:17
168.187.36.193 attackbots
Unauthorized connection attempt from IP address 168.187.36.193 on Port 445(SMB)
2019-10-10 00:51:06
185.126.253.161 attackbotsspam
2019-10-09T17:49:03.890366+01:00 suse sshd[27530]: User root from 185.126.253.161 not allowed because not listed in AllowUsers
2019-10-09T17:49:05.796768+01:00 suse sshd[27530]: error: PAM: Authentication failure for illegal user root from 185.126.253.161
2019-10-09T17:49:03.890366+01:00 suse sshd[27530]: User root from 185.126.253.161 not allowed because not listed in AllowUsers
2019-10-09T17:49:05.796768+01:00 suse sshd[27530]: error: PAM: Authentication failure for illegal user root from 185.126.253.161
2019-10-09T17:49:03.890366+01:00 suse sshd[27530]: User root from 185.126.253.161 not allowed because not listed in AllowUsers
2019-10-09T17:49:05.796768+01:00 suse sshd[27530]: error: PAM: Authentication failure for illegal user root from 185.126.253.161
2019-10-09T17:49:05.801602+01:00 suse sshd[27530]: Failed keyboard-interactive/pam for invalid user root from 185.126.253.161 port 60644 ssh2
...
2019-10-10 01:13:51
129.146.149.185 attackspam
Oct  9 01:28:40 web9 sshd\[4254\]: Invalid user %TGB\^YHN from 129.146.149.185
Oct  9 01:28:40 web9 sshd\[4254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.149.185
Oct  9 01:28:42 web9 sshd\[4254\]: Failed password for invalid user %TGB\^YHN from 129.146.149.185 port 43758 ssh2
Oct  9 01:32:24 web9 sshd\[4733\]: Invalid user %TGB\^YHN from 129.146.149.185
Oct  9 01:32:24 web9 sshd\[4733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.149.185
2019-10-10 01:14:07
115.73.30.250 attack
Unauthorized connection attempt from IP address 115.73.30.250 on Port 445(SMB)
2019-10-10 01:00:30
217.113.26.10 attackbotsspam
Unauthorized connection attempt from IP address 217.113.26.10 on Port 445(SMB)
2019-10-10 00:43:35
167.114.55.84 attack
Oct  9 16:39:23 game-panel sshd[659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.55.84
Oct  9 16:39:26 game-panel sshd[659]: Failed password for invalid user 123France from 167.114.55.84 port 48900 ssh2
Oct  9 16:43:32 game-panel sshd[762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.55.84
2019-10-10 00:54:15
104.236.28.167 attack
Oct  9 18:35:31 dev0-dcde-rnet sshd[15469]: Failed password for root from 104.236.28.167 port 40188 ssh2
Oct  9 18:39:43 dev0-dcde-rnet sshd[15496]: Failed password for root from 104.236.28.167 port 52592 ssh2
2019-10-10 01:08:11
106.12.27.46 attackspambots
Automatic report - Banned IP Access
2019-10-10 01:11:03
106.13.39.233 attackspam
[ssh] SSH attack
2019-10-10 01:21:52
202.69.66.130 attackbotsspam
Oct  9 18:08:32 jane sshd[676]: Failed password for root from 202.69.66.130 port 60722 ssh2
...
2019-10-10 01:05:55
174.16.187.23 attack
Automatic report - Port Scan Attack
2019-10-10 00:50:09

最近上报的IP列表

244.54.254.181 8.164.106.73 213.151.139.7 64.15.193.71
131.82.228.188 231.163.108.115 3.63.122.244 226.25.104.125
227.185.240.151 204.111.68.212 64.42.158.238 233.109.69.204
216.0.39.215 133.149.187.105 232.33.155.180 241.199.233.120
149.3.252.168 179.24.215.194 150.141.210.189 144.48.58.8