必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.213.204.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.213.204.123.		IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:58:12 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 123.204.213.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.204.213.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.240.201.32 attackspam
Unauthorized connection attempt from IP address 94.240.201.32 on Port 445(SMB)
2019-09-04 09:07:39
178.32.218.192 attack
Sep  4 03:36:48 www sshd\[57647\]: Invalid user jjjjj from 178.32.218.192Sep  4 03:36:50 www sshd\[57647\]: Failed password for invalid user jjjjj from 178.32.218.192 port 57926 ssh2Sep  4 03:40:26 www sshd\[57738\]: Invalid user kb from 178.32.218.192
...
2019-09-04 08:45:46
66.212.170.244 attack
Unauthorized connection attempt from IP address 66.212.170.244 on Port 445(SMB)
2019-09-04 09:00:31
96.37.188.228 attackbotsspam
Sep  3 14:33:37 localhost kernel: [1273433.941596] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=96.37.188.228 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=23472 PROTO=TCP SPT=50621 DPT=20022 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  3 14:33:37 localhost kernel: [1273433.941627] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=96.37.188.228 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=23472 PROTO=TCP SPT=50621 DPT=20022 SEQ=1924036088 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
2019-09-04 09:15:08
95.167.225.81 attackbots
Sep  3 10:42:33 sachi sshd\[4237\]: Invalid user apple from 95.167.225.81
Sep  3 10:42:33 sachi sshd\[4237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81
Sep  3 10:42:35 sachi sshd\[4237\]: Failed password for invalid user apple from 95.167.225.81 port 42912 ssh2
Sep  3 10:47:45 sachi sshd\[4722\]: Invalid user postgres from 95.167.225.81
Sep  3 10:47:45 sachi sshd\[4722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81
2019-09-04 09:19:35
221.214.54.170 attackspam
2019-09-04 09:11:03
187.188.169.123 attackspam
Sep  3 23:57:40 hcbbdb sshd\[25962\]: Invalid user uno8 from 187.188.169.123
Sep  3 23:57:40 hcbbdb sshd\[25962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
Sep  3 23:57:43 hcbbdb sshd\[25962\]: Failed password for invalid user uno8 from 187.188.169.123 port 51096 ssh2
Sep  4 00:02:32 hcbbdb sshd\[26518\]: Invalid user sftptest from 187.188.169.123
Sep  4 00:02:32 hcbbdb sshd\[26518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
2019-09-04 08:42:08
218.92.0.163 attackspam
Sep  3 23:16:32 tuxlinux sshd[19667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Sep  3 23:16:34 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
Sep  3 23:16:32 tuxlinux sshd[19667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Sep  3 23:16:34 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
Sep  3 23:16:32 tuxlinux sshd[19667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Sep  3 23:16:34 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
Sep  3 23:16:38 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
...
2019-09-04 09:03:50
139.59.236.239 attackbots
Sep  4 02:27:20 lnxmail61 sshd[14849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.236.239
Sep  4 02:27:22 lnxmail61 sshd[14849]: Failed password for invalid user master from 139.59.236.239 port 49016 ssh2
Sep  4 02:32:11 lnxmail61 sshd[15347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.236.239
2019-09-04 08:36:36
51.75.247.13 attackspam
Sep  3 20:30:06 dev0-dcfr-rnet sshd[25371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.247.13
Sep  3 20:30:08 dev0-dcfr-rnet sshd[25371]: Failed password for invalid user tomato from 51.75.247.13 port 57675 ssh2
Sep  3 20:33:53 dev0-dcfr-rnet sshd[25426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.247.13
2019-09-04 08:58:14
187.181.65.60 attackspam
Jul 16 17:33:17 Server10 sshd[29399]: Invalid user bart from 187.181.65.60 port 55677
Jul 16 17:33:17 Server10 sshd[29399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.181.65.60
Jul 16 17:33:19 Server10 sshd[29399]: Failed password for invalid user bart from 187.181.65.60 port 55677 ssh2
Aug 12 21:54:19 Server10 sshd[13061]: Invalid user testuser from 187.181.65.60 port 49453
Aug 12 21:54:19 Server10 sshd[13061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.181.65.60
Aug 12 21:54:22 Server10 sshd[13061]: Failed password for invalid user testuser from 187.181.65.60 port 49453 ssh2
2019-09-04 08:55:14
195.2.238.4 attackbotsspam
Sep  3 15:03:36 lcprod sshd\[11821\]: Invalid user postgres from 195.2.238.4
Sep  3 15:03:36 lcprod sshd\[11821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.2.238.4
Sep  3 15:03:38 lcprod sshd\[11821\]: Failed password for invalid user postgres from 195.2.238.4 port 58831 ssh2
Sep  3 15:07:40 lcprod sshd\[12210\]: Invalid user admin from 195.2.238.4
Sep  3 15:07:40 lcprod sshd\[12210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.2.238.4
2019-09-04 09:08:07
68.183.193.46 attackbots
Sep  4 00:47:07 hb sshd\[30824\]: Invalid user zs from 68.183.193.46
Sep  4 00:47:07 hb sshd\[30824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.46
Sep  4 00:47:09 hb sshd\[30824\]: Failed password for invalid user zs from 68.183.193.46 port 38158 ssh2
Sep  4 00:51:04 hb sshd\[31214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.46  user=root
Sep  4 00:51:05 hb sshd\[31214\]: Failed password for root from 68.183.193.46 port 54388 ssh2
2019-09-04 08:56:18
218.92.0.135 attackbots
web-1 [ssh] SSH Attack
2019-09-04 08:40:38
36.91.38.95 attackspam
Unauthorized connection attempt from IP address 36.91.38.95 on Port 445(SMB)
2019-09-04 09:16:46

最近上报的IP列表

93.100.137.32 154.202.107.126 191.19.21.150 80.65.66.198
104.199.111.86 160.251.43.26 50.60.155.57 180.107.192.160
172.69.205.38 45.83.66.218 179.49.61.251 120.239.109.64
178.93.21.122 187.49.13.33 120.227.145.178 42.112.127.117
111.70.2.163 182.123.245.44 42.98.37.116 175.4.217.123