必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
140.213.231.19 attack
2025-03-22 06:38:12
140.213.231.188 spambotsattackproxynormal
长度不能超过2048, 不能为空
2023-10-29 03:55:52
140.213.24.183 spam
Penipu akun Facebook saya hampir diretas tolong beri loksi dia agar dia kapok, PENIPUUUUUUUU
2021-03-26 11:52:32
140.213.24.90 spamattack
Penipu akun Facebook saya hampir diretas tolong beri loksi dia agar dia kapok
2020-08-18 16:21:51
140.213.24.90 spamattack
Penipu akun Facebook saya hampir diretas tolong beri loksi dia agar dia kapok
2020-08-18 16:21:43
140.213.24.90 spamattack
Penipu akun Facebook saya hampir diretas tolong beri loksi dia agar dia kapok
2020-08-18 16:21:17
140.213.25.34 attackbotsspam
Lines containing failures of 140.213.25.34
Jun  7 13:42:38 shared01 sshd[11190]: Did not receive identification string from 140.213.25.34 port 27283
Jun  7 13:42:42 shared01 sshd[11191]: Invalid user 666666 from 140.213.25.34 port 41704
Jun  7 13:42:42 shared01 sshd[11191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.213.25.34
Jun  7 13:42:43 shared01 sshd[11191]: Failed password for invalid user 666666 from 140.213.25.34 port 41704 ssh2
Jun  7 13:42:44 shared01 sshd[11191]: Connection closed by invalid user 666666 140.213.25.34 port 41704 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=140.213.25.34
2020-06-08 01:28:33
140.213.22.45 attackbots
1582032288 - 02/18/2020 14:24:48 Host: 140.213.22.45/140.213.22.45 Port: 445 TCP Blocked
2020-02-19 00:04:33
140.213.2.227 attackspam
Email rejected due to spam filtering
2020-02-02 22:03:45
140.213.20.14 attack
Email address rejected
2019-12-19 05:18:07
140.213.24.174 attackspambots
445/tcp
[2019-09-29]1pkt
2019-09-30 01:18:34
140.213.24.14 attackbotsspam
SSH invalid-user multiple login try
2019-07-23 03:21:06
140.213.22.180 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 11:54:27,868 INFO [shellcode_manager] (140.213.22.180) no match, writing hexdump (105993f5942f66a74b89d89a16b403cc :2178079) - MS17010 (EternalBlue)
2019-07-05 04:01:30
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.213.2.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.213.2.32.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:57:13 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 32.2.213.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 32.2.213.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.211.110.133 attackspambots
Oct  2 19:33:14 vtv3 sshd\[30259\]: Invalid user nagios from 198.211.110.133 port 45628
Oct  2 19:33:14 vtv3 sshd\[30259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133
Oct  2 19:33:16 vtv3 sshd\[30259\]: Failed password for invalid user nagios from 198.211.110.133 port 45628 ssh2
Oct  2 19:36:46 vtv3 sshd\[32046\]: Invalid user team from 198.211.110.133 port 57558
Oct  2 19:36:46 vtv3 sshd\[32046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133
Oct  2 19:47:42 vtv3 sshd\[5082\]: Invalid user vision from 198.211.110.133 port 36524
Oct  2 19:47:42 vtv3 sshd\[5082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133
Oct  2 19:47:44 vtv3 sshd\[5082\]: Failed password for invalid user vision from 198.211.110.133 port 36524 ssh2
Oct  2 19:51:28 vtv3 sshd\[7009\]: Invalid user ionut from 198.211.110.133 port 48288
Oct  2 19:51:28 vtv3 ssh
2019-10-03 07:22:59
112.169.9.150 attack
SSH Brute-Force reported by Fail2Ban
2019-10-03 07:02:30
103.69.20.35 attack
postfix (unknown user, SPF fail or relay access denied)
2019-10-03 07:01:17
101.66.45.145 attackspam
Unauthorised access (Oct  3) SRC=101.66.45.145 LEN=40 TTL=49 ID=62700 TCP DPT=8080 WINDOW=60204 SYN 
Unauthorised access (Oct  2) SRC=101.66.45.145 LEN=40 TTL=49 ID=2815 TCP DPT=8080 WINDOW=60204 SYN 
Unauthorised access (Oct  2) SRC=101.66.45.145 LEN=40 TTL=49 ID=32452 TCP DPT=8080 WINDOW=35148 SYN 
Unauthorised access (Oct  2) SRC=101.66.45.145 LEN=40 TTL=49 ID=35199 TCP DPT=8080 WINDOW=26838 SYN 
Unauthorised access (Oct  2) SRC=101.66.45.145 LEN=40 TTL=49 ID=36633 TCP DPT=8080 WINDOW=60204 SYN 
Unauthorised access (Oct  1) SRC=101.66.45.145 LEN=40 TTL=49 ID=42260 TCP DPT=8080 WINDOW=35148 SYN
2019-10-03 06:57:33
176.122.122.198 attackbotsspam
SPAM Delivery Attempt
2019-10-03 06:57:05
159.65.149.131 attackbotsspam
Oct  3 01:19:34 taivassalofi sshd[133045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.149.131
Oct  3 01:19:36 taivassalofi sshd[133045]: Failed password for invalid user nagios from 159.65.149.131 port 46971 ssh2
...
2019-10-03 06:55:18
183.13.121.102 attackbots
Oct  3 01:39:21 www sshd\[203859\]: Invalid user ubuntu from 183.13.121.102
Oct  3 01:39:21 www sshd\[203859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.121.102
Oct  3 01:39:24 www sshd\[203859\]: Failed password for invalid user ubuntu from 183.13.121.102 port 6084 ssh2
...
2019-10-03 06:51:06
46.105.31.249 attackbotsspam
Automatic report - Banned IP Access
2019-10-03 07:16:01
194.152.206.93 attackbotsspam
Oct  2 13:04:52 kapalua sshd\[16901\]: Invalid user user0 from 194.152.206.93
Oct  2 13:04:52 kapalua sshd\[16901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
Oct  2 13:04:54 kapalua sshd\[16901\]: Failed password for invalid user user0 from 194.152.206.93 port 34514 ssh2
Oct  2 13:10:12 kapalua sshd\[17560\]: Invalid user zhr from 194.152.206.93
Oct  2 13:10:12 kapalua sshd\[17560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
2019-10-03 07:12:35
79.180.110.112 attackbots
Oct  3 00:13:22 markkoudstaal sshd[27353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.180.110.112
Oct  3 00:13:24 markkoudstaal sshd[27353]: Failed password for invalid user renault from 79.180.110.112 port 34254 ssh2
Oct  3 00:22:36 markkoudstaal sshd[28188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.180.110.112
2019-10-03 07:16:53
106.52.230.77 attackspam
Oct  2 23:39:57 OPSO sshd\[11154\]: Invalid user 123qwe from 106.52.230.77 port 38920
Oct  2 23:39:57 OPSO sshd\[11154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.230.77
Oct  2 23:39:59 OPSO sshd\[11154\]: Failed password for invalid user 123qwe from 106.52.230.77 port 38920 ssh2
Oct  2 23:43:04 OPSO sshd\[11869\]: Invalid user sqlsrv from 106.52.230.77 port 37258
Oct  2 23:43:04 OPSO sshd\[11869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.230.77
2019-10-03 06:59:47
106.12.103.98 attack
Oct  2 23:03:28 apollo sshd\[13085\]: Invalid user ubuntu12 from 106.12.103.98Oct  2 23:03:30 apollo sshd\[13085\]: Failed password for invalid user ubuntu12 from 106.12.103.98 port 54698 ssh2Oct  2 23:27:49 apollo sshd\[13213\]: Failed password for root from 106.12.103.98 port 35266 ssh2
...
2019-10-03 06:55:50
182.61.175.71 attack
Oct  3 00:23:15 MK-Soft-Root1 sshd[5856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.71 
Oct  3 00:23:16 MK-Soft-Root1 sshd[5856]: Failed password for invalid user temp from 182.61.175.71 port 54642 ssh2
...
2019-10-03 07:14:01
181.229.124.194 attackbotsspam
Oct  3 03:52:29 gw1 sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.229.124.194
Oct  3 03:52:32 gw1 sshd[2408]: Failed password for invalid user gx from 181.229.124.194 port 52914 ssh2
...
2019-10-03 07:03:57
103.48.232.123 attack
Oct  2 19:09:46 plusreed sshd[9185]: Invalid user administrator from 103.48.232.123
...
2019-10-03 07:25:15

最近上报的IP列表

140.213.214.213 140.237.128.174 140.237.128.166 140.237.129.175
140.237.14.62 140.237.129.179 140.237.13.80 140.237.129.177
140.237.13.77 140.237.129.166 140.237.129.187 140.237.28.215
140.237.15.7 140.237.28.99 140.237.29.44 140.237.30.24
140.237.30.140 140.238.12.226 140.237.31.140 140.237.6.48