必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Princeton

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Princeton University

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.180.160.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19266
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.180.160.140.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 23 00:31:31 +08 2019
;; MSG SIZE  rcvd: 119

HOST信息:
140.160.180.140.in-addr.arpa domain name pointer dynamic-oit-pu-dormnet-bb-a-1735.princeton.edu.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
140.160.180.140.in-addr.arpa	name = dynamic-oit-pu-dormnet-bb-a-1735.princeton.edu.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.26.25.81 attackbots
[H1.VM1] Blocked by UFW
2020-07-24 22:07:26
43.243.214.42 attackspambots
2020-07-24T15:43:26.839195v22018076590370373 sshd[32733]: Invalid user recepcion from 43.243.214.42 port 55064
2020-07-24T15:43:26.844722v22018076590370373 sshd[32733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.214.42
2020-07-24T15:43:26.839195v22018076590370373 sshd[32733]: Invalid user recepcion from 43.243.214.42 port 55064
2020-07-24T15:43:28.854943v22018076590370373 sshd[32733]: Failed password for invalid user recepcion from 43.243.214.42 port 55064 ssh2
2020-07-24T15:48:09.801330v22018076590370373 sshd[17787]: Invalid user art from 43.243.214.42 port 39862
...
2020-07-24 22:40:07
192.144.234.204 attackspam
Jul 24 15:48:38 vps639187 sshd\[31728\]: Invalid user ubuntu from 192.144.234.204 port 54408
Jul 24 15:48:38 vps639187 sshd\[31728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.234.204
Jul 24 15:48:39 vps639187 sshd\[31728\]: Failed password for invalid user ubuntu from 192.144.234.204 port 54408 ssh2
...
2020-07-24 22:03:44
5.180.220.106 attack
[2020-07-24 10:00:03] NOTICE[1277][C-000029f8] chan_sip.c: Call from '' (5.180.220.106:49935) to extension '~011972595725668' rejected because extension not found in context 'public'.
[2020-07-24 10:00:03] SECURITY[1295] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-24T10:00:03.036-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="~011972595725668",SessionID="0x7f1754694fe8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.180.220.106/49935",ACLName="no_extension_match"
[2020-07-24 10:03:42] NOTICE[1277][C-00002a00] chan_sip.c: Call from '' (5.180.220.106:53315) to extension '10011972595725668' rejected because extension not found in context 'public'.
[2020-07-24 10:03:42] SECURITY[1295] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-24T10:03:42.126-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="10011972595725668",SessionID="0x7f1754694fe8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV
...
2020-07-24 22:16:42
210.14.77.102 attack
$f2bV_matches
2020-07-24 22:07:07
118.129.34.166 attackspambots
Jul 24 16:10:11 ns381471 sshd[32595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.129.34.166
Jul 24 16:10:12 ns381471 sshd[32595]: Failed password for invalid user argus from 118.129.34.166 port 32934 ssh2
2020-07-24 22:25:54
123.20.23.102 attack
www.goldgier.de 123.20.23.102 [24/Jul/2020:15:48:12 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4563 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
www.goldgier.de 123.20.23.102 [24/Jul/2020:15:48:17 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4563 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-07-24 22:30:01
211.139.61.219 attack
" "
2020-07-24 22:41:16
108.11.213.164 attackspambots
Jul 24 13:52:07 ip-172-31-61-156 sshd[9786]: Invalid user lotus from 108.11.213.164
Jul 24 13:52:07 ip-172-31-61-156 sshd[9786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.11.213.164
Jul 24 13:52:07 ip-172-31-61-156 sshd[9786]: Invalid user lotus from 108.11.213.164
Jul 24 13:52:09 ip-172-31-61-156 sshd[9786]: Failed password for invalid user lotus from 108.11.213.164 port 52018 ssh2
Jul 24 13:55:53 ip-172-31-61-156 sshd[10125]: Invalid user jiao from 108.11.213.164
...
2020-07-24 22:26:17
82.64.201.47 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-24 22:42:31
142.93.159.29 attack
$f2bV_matches
2020-07-24 22:18:14
190.52.166.83 attack
SSH Brute-Force reported by Fail2Ban
2020-07-24 22:36:38
219.77.155.82 attackspam
Honeypot attack, port: 5555, PTR: n219077155082.netvigator.com.
2020-07-24 22:01:00
37.59.46.228 attack
37.59.46.228 - - [24/Jul/2020:14:45:48 +0100] "POST /wp-login.php HTTP/1.1" 200 5837 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.46.228 - - [24/Jul/2020:14:47:21 +0100] "POST /wp-login.php HTTP/1.1" 200 5830 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.46.228 - - [24/Jul/2020:14:48:37 +0100] "POST /wp-login.php HTTP/1.1" 200 5837 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-24 22:10:43
31.132.151.46 attack
Jul 24 16:26:24 ip106 sshd[24313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.132.151.46 
Jul 24 16:26:26 ip106 sshd[24313]: Failed password for invalid user amit from 31.132.151.46 port 40575 ssh2
...
2020-07-24 22:32:26

最近上报的IP列表

196.33.78.7 112.171.185.120 74.54.99.163 66.72.248.216
188.2.52.136 144.246.25.145 154.126.208.230 89.96.85.240
59.28.109.139 63.48.93.24 165.22.150.18 162.243.144.94
18.90.18.153 102.244.47.218 193.215.88.34 206.255.242.36
117.188.156.237 186.52.137.231 196.45.182.64 37.130.115.159