必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.21.208.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.21.208.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:08:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 152.208.21.140.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 140.21.208.152.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.137.54.246 attack
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Invalid user crap from 119.137.54.246 port 21753
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Failed password for invalid user crap from 119.137.54.246 port 21753 ssh2
Nov 15 06:27:48 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:48 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Received disconnect from 119.137.54.246 port 21753:11: Bye Bye [preauth]
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Disconnected from 119.137.54.246 port 21753 [preauth]
Nov 15 06:27:49 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:49 ACSRAD auth.warn sshguard[3498]: Blocking "119.137.54.246/32" forever (3 attacks in 1 secs, after 2 abuses over 577 secs.)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2019-11-16 22:40:40
46.38.144.57 attackbotsspam
Nov 16 15:34:55 host postfix/smtpd[4160]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure
Nov 16 15:35:31 host postfix/smtpd[4160]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure
...
2019-11-16 22:42:37
222.186.180.223 attackspam
Nov 16 15:58:16 dedicated sshd[19480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Nov 16 15:58:18 dedicated sshd[19480]: Failed password for root from 222.186.180.223 port 15280 ssh2
2019-11-16 22:59:31
46.219.3.139 attack
Nov 16 05:06:55 web1 sshd\[7694\]: Invalid user kodsi from 46.219.3.139
Nov 16 05:06:55 web1 sshd\[7694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.3.139
Nov 16 05:06:57 web1 sshd\[7694\]: Failed password for invalid user kodsi from 46.219.3.139 port 60796 ssh2
Nov 16 05:10:58 web1 sshd\[8114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.3.139  user=root
Nov 16 05:11:00 web1 sshd\[8114\]: Failed password for root from 46.219.3.139 port 42682 ssh2
2019-11-16 23:11:28
222.186.175.169 attack
Nov 16 14:54:16 124388 sshd[22278]: Failed password for root from 222.186.175.169 port 62198 ssh2
Nov 16 14:54:19 124388 sshd[22278]: Failed password for root from 222.186.175.169 port 62198 ssh2
Nov 16 14:54:19 124388 sshd[22278]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 62198 ssh2 [preauth]
Nov 16 14:54:23 124388 sshd[22296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Nov 16 14:54:24 124388 sshd[22296]: Failed password for root from 222.186.175.169 port 13148 ssh2
2019-11-16 22:55:59
194.37.92.48 attackbotsspam
k+ssh-bruteforce
2019-11-16 22:36:23
202.96.137.99 attackspam
1433/tcp 1433/tcp 1433/tcp
[2019-10-20/11-16]3pkt
2019-11-16 23:02:06
123.6.5.121 attack
Invalid user arron from 123.6.5.121 port 25531
2019-11-16 22:45:35
187.108.207.59 attack
Invalid user shivdarsan from 187.108.207.59 port 59024
2019-11-16 22:31:33
195.154.108.194 attack
Nov 16 15:54:21 icinga sshd[15201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.108.194
Nov 16 15:54:23 icinga sshd[15201]: Failed password for invalid user ctrls from 195.154.108.194 port 49900 ssh2
...
2019-11-16 22:56:32
203.128.78.177 attackbotsspam
1573885006 - 11/16/2019 07:16:46 Host: 203.128.78.177/203.128.78.177 Port: 22 TCP Blocked
2019-11-16 22:34:48
109.122.59.228 attack
445/tcp 445/tcp 445/tcp
[2019-10-07/11-16]3pkt
2019-11-16 22:58:16
58.20.139.26 attack
Nov 16 20:24:03 areeb-Workstation sshd[12939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.139.26
Nov 16 20:24:06 areeb-Workstation sshd[12939]: Failed password for invalid user admin from 58.20.139.26 port 58510 ssh2
...
2019-11-16 23:11:58
79.164.48.29 attackbots
11/16/2019-07:16:53.555586 79.164.48.29 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 80
2019-11-16 22:30:49
183.111.227.199 attackbots
Nov 15 22:16:37 hpm sshd\[8535\]: Invalid user toor from 183.111.227.199
Nov 15 22:16:37 hpm sshd\[8535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.199
Nov 15 22:16:39 hpm sshd\[8535\]: Failed password for invalid user toor from 183.111.227.199 port 55246 ssh2
Nov 15 22:21:32 hpm sshd\[8927\]: Invalid user admin from 183.111.227.199
Nov 15 22:21:32 hpm sshd\[8927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.199
2019-11-16 22:33:20

最近上报的IP列表

51.120.131.173 52.150.88.110 46.113.59.203 160.115.90.155
131.103.30.203 106.208.117.47 9.243.34.183 54.88.150.51
71.246.252.131 192.7.101.175 180.68.23.119 186.71.16.116
53.248.157.188 238.251.14.232 175.57.46.211 194.252.90.120
21.137.16.44 145.133.40.90 159.164.43.219 120.1.112.84