必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.21.145.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.21.145.26.			IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122900 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 29 18:24:09 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 26.145.21.140.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.145.21.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.151.151.211 attackspam
[portscan] Port scan
2019-11-07 21:59:34
104.238.110.15 attackspambots
104.238.110.15 - - [07/Nov/2019:10:13:09 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.238.110.15 - - [07/Nov/2019:10:13:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.238.110.15 - - [07/Nov/2019:10:13:11 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.238.110.15 - - [07/Nov/2019:10:13:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.238.110.15 - - [07/Nov/2019:10:13:13 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.238.110.15 - - [07/Nov/2019:10:13:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-07 22:15:39
45.136.110.41 attack
firewall-block, port(s): 393/tcp, 678/tcp, 1365/tcp, 2275/tcp, 2335/tcp, 4320/tcp, 4330/tcp, 4370/tcp, 9240/tcp, 22922/tcp, 47774/tcp
2019-11-07 22:27:10
218.92.0.154 attack
$f2bV_matches
2019-11-07 22:06:49
220.191.237.203 attackbots
11/07/2019-01:18:51.191975 220.191.237.203 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2019-11-07 22:17:04
185.216.132.15 attackspambots
2019-11-07T07:19:01.479797  sshd[5493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
2019-11-07T07:19:03.228684  sshd[5493]: Failed password for root from 185.216.132.15 port 14991 ssh2
2019-11-07T07:19:05.060596  sshd[5495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
2019-11-07T07:19:07.026622  sshd[5495]: Failed password for root from 185.216.132.15 port 15467 ssh2
2019-11-07T07:19:08.661950  sshd[5499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
2019-11-07T07:19:11.039529  sshd[5499]: Failed password for root from 185.216.132.15 port 16010 ssh2
...
2019-11-07 22:02:28
23.95.84.74 attackbotsspam
11/07/2019-01:18:58.775803 23.95.84.74 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-07 22:13:46
5.36.36.117 attack
Hits on port : 445
2019-11-07 22:09:43
193.70.8.163 attack
Nov  7 10:32:58 SilenceServices sshd[20422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.8.163
Nov  7 10:33:00 SilenceServices sshd[20422]: Failed password for invalid user fletch from 193.70.8.163 port 43954 ssh2
Nov  7 10:36:59 SilenceServices sshd[21582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.8.163
2019-11-07 22:00:43
51.91.48.22 attackbots
Nov  7 14:09:09 XXX sshd[61137]: Invalid user devuser from 51.91.48.22 port 40846
2019-11-07 22:25:09
211.143.246.38 attackbotsspam
Nov  7 02:33:20 hanapaa sshd\[2500\]: Invalid user db2fenc1 from 211.143.246.38
Nov  7 02:33:20 hanapaa sshd\[2500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38
Nov  7 02:33:23 hanapaa sshd\[2500\]: Failed password for invalid user db2fenc1 from 211.143.246.38 port 51069 ssh2
Nov  7 02:38:34 hanapaa sshd\[2910\]: Invalid user hadoop from 211.143.246.38
Nov  7 02:38:34 hanapaa sshd\[2910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38
2019-11-07 22:26:13
49.146.1.53 attack
Forged login request.
2019-11-07 22:00:28
46.10.161.57 attackspambots
Nov  7 08:43:06 ny01 sshd[15157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.10.161.57
Nov  7 08:43:08 ny01 sshd[15157]: Failed password for invalid user admin from 46.10.161.57 port 46126 ssh2
Nov  7 08:47:04 ny01 sshd[15584]: Failed password for root from 46.10.161.57 port 37011 ssh2
2019-11-07 21:53:03
106.13.59.229 attackbotsspam
Nov  7 10:19:40 DAAP sshd[23562]: Invalid user Isaac2017 from 106.13.59.229 port 47884
Nov  7 10:19:40 DAAP sshd[23562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.59.229
Nov  7 10:19:40 DAAP sshd[23562]: Invalid user Isaac2017 from 106.13.59.229 port 47884
Nov  7 10:19:42 DAAP sshd[23562]: Failed password for invalid user Isaac2017 from 106.13.59.229 port 47884 ssh2
...
2019-11-07 22:11:23
92.222.20.65 attack
Nov  6 21:59:31 xxxxxxx7446550 sshd[32664]: Failed password for r.r from 92.222.20.65 port 39056 ssh2
Nov  6 21:59:32 xxxxxxx7446550 sshd[32665]: Received disconnect from 92.222.20.65: 11: Bye Bye
Nov  6 22:39:24 xxxxxxx7446550 sshd[12919]: Invalid user zxin20 from 92.222.20.65
Nov  6 22:39:25 xxxxxxx7446550 sshd[12919]: Failed password for invalid user zxin20 from 92.222.20.65 port 34722 ssh2
Nov  6 22:39:25 xxxxxxx7446550 sshd[12920]: Received disconnect from 92.222.20.65: 11: Bye Bye
Nov  6 22:42:56 xxxxxxx7446550 sshd[13781]: Failed password for r.r from 92.222.20.65 port 46856 ssh2
Nov  6 22:42:56 xxxxxxx7446550 sshd[13782]: Received disconnect from 92.222.20.65: 11: Bye Bye
Nov  6 22:46:20 xxxxxxx7446550 sshd[14692]: Failed password for r.r from 92.222.20.65 port 58806 ssh2
Nov  6 22:46:20 xxxxxxx7446550 sshd[14693]: Received disconnect from 92.222.20.65: 11: Bye Bye
Nov  6 22:49:38 xxxxxxx7446550 sshd[15716]: Failed password for r.r from 92.222.20.65 port 42584 s........
-------------------------------
2019-11-07 22:17:38

最近上报的IP列表

149.128.42.4 136.91.135.235 135.198.80.222 134.150.62.80
131.188.61.73 13.180.64.228 129.83.135.146 13.126.246.11
127.171.65.103 122.238.162.191 119.24.98.136 117.107.184.141
108.64.135.9 104.76.34.43 103.226.173.59 102.15.138.221
100.135.189.59 137.184.234.81 166.40.0.87 253.203.215.230