必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.214.109.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.214.109.106.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 181 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:11:50 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 106.109.214.140.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 106.109.214.140.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.0.32.231 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:17.
2019-10-09 15:00:28
104.248.3.54 attackbotsspam
*Port Scan* detected from 104.248.3.54 (US/United States/-). 4 hits in the last 255 seconds
2019-10-09 15:18:36
153.36.242.143 attackspam
Oct  9 14:01:00 webhost01 sshd[11036]: Failed password for root from 153.36.242.143 port 64831 ssh2
Oct  9 14:01:02 webhost01 sshd[11036]: Failed password for root from 153.36.242.143 port 64831 ssh2
...
2019-10-09 15:04:15
213.110.7.255 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:19.
2019-10-09 14:55:11
164.77.77.251 attack
Jul 24 14:41:38 server sshd\[214821\]: Invalid user waldo from 164.77.77.251
Jul 24 14:41:38 server sshd\[214821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.77.251
Jul 24 14:41:40 server sshd\[214821\]: Failed password for invalid user waldo from 164.77.77.251 port 48192 ssh2
...
2019-10-09 15:14:28
62.210.101.81 attack
Oct  9 08:51:22 localhost sshd\[7349\]: Invalid user Passw0rt!234 from 62.210.101.81 port 48274
Oct  9 08:51:22 localhost sshd\[7349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.101.81
Oct  9 08:51:24 localhost sshd\[7349\]: Failed password for invalid user Passw0rt!234 from 62.210.101.81 port 48274 ssh2
2019-10-09 15:02:55
159.253.146.19 attackspambots
Oct  9 08:39:13 mail kernel: [316400.173266] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=159.253.146.19 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=52 ID=4341 DF PROTO=TCP SPT=49157 DPT=993 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2019-10-09 14:53:35
125.167.223.65 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:17.
2019-10-09 14:59:26
165.22.180.2 attackbotsspam
Jul  5 07:18:46 server sshd\[171239\]: Invalid user stan from 165.22.180.2
Jul  5 07:18:46 server sshd\[171239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.180.2
Jul  5 07:18:47 server sshd\[171239\]: Failed password for invalid user stan from 165.22.180.2 port 47838 ssh2
...
2019-10-09 15:05:18
164.163.99.10 attackspambots
May 18 20:36:07 server sshd\[195685\]: Invalid user anastacia from 164.163.99.10
May 18 20:36:07 server sshd\[195685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.99.10
May 18 20:36:08 server sshd\[195685\]: Failed password for invalid user anastacia from 164.163.99.10 port 46792 ssh2
...
2019-10-09 15:18:10
129.28.188.115 attackspambots
Oct  9 06:09:18 MK-Soft-VM5 sshd[11849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.188.115 
Oct  9 06:09:20 MK-Soft-VM5 sshd[11849]: Failed password for invalid user Pa55w0rd2018 from 129.28.188.115 port 60176 ssh2
...
2019-10-09 15:16:59
165.22.248.215 attack
Jul  1 15:35:03 server sshd\[102235\]: Invalid user cvs from 165.22.248.215
Jul  1 15:35:03 server sshd\[102235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.248.215
Jul  1 15:35:05 server sshd\[102235\]: Failed password for invalid user cvs from 165.22.248.215 port 47980 ssh2
...
2019-10-09 14:53:00
185.36.81.231 attackbots
Oct  9 04:24:00 heicom postfix/smtpd\[2770\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  9 04:52:26 heicom postfix/smtpd\[3485\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  9 05:20:59 heicom postfix/smtpd\[3664\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  9 05:49:33 heicom postfix/smtpd\[5094\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  9 06:18:08 heicom postfix/smtpd\[5935\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-09 14:58:31
46.38.144.202 attackspambots
Oct  9 08:37:14 webserver postfix/smtpd\[31388\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 08:39:29 webserver postfix/smtpd\[31388\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 08:41:56 webserver postfix/smtpd\[31388\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 08:44:24 webserver postfix/smtpd\[31388\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 08:46:59 webserver postfix/smtpd\[31388\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-09 14:50:16
110.137.185.98 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 09-10-2019 04:55:16.
2019-10-09 15:01:57

最近上报的IP列表

64.81.50.103 62.118.239.222 32.188.225.115 48.23.89.105
50.154.208.107 162.182.232.102 114.244.178.196 209.241.140.96
210.161.110.89 134.83.246.99 39.25.225.46 28.251.248.146
30.123.108.141 228.109.76.18 52.83.91.241 162.153.195.148
195.66.197.40 138.28.183.68 143.215.243.195 190.44.164.18