必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.214.172.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.214.172.31.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012200 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 22 18:20:35 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 31.172.214.140.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 140.214.172.31.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.196.31 attackbots
Dec  4 20:27:37 ArkNodeAT sshd\[6332\]: Invalid user jet from 118.25.196.31
Dec  4 20:27:37 ArkNodeAT sshd\[6332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31
Dec  4 20:27:39 ArkNodeAT sshd\[6332\]: Failed password for invalid user jet from 118.25.196.31 port 45554 ssh2
2019-12-05 04:14:05
49.234.179.127 attack
Dec  4 20:40:39 legacy sshd[5428]: Failed password for sync from 49.234.179.127 port 47470 ssh2
Dec  4 20:46:51 legacy sshd[5766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127
Dec  4 20:46:53 legacy sshd[5766]: Failed password for invalid user bullnjaa from 49.234.179.127 port 51740 ssh2
...
2019-12-05 03:56:45
115.159.86.75 attackspambots
Dec  4 21:46:27 sauna sshd[52335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.86.75
Dec  4 21:46:29 sauna sshd[52335]: Failed password for invalid user ytooga from 115.159.86.75 port 38741 ssh2
...
2019-12-05 03:57:56
203.128.242.166 attack
2019-12-04T19:42:17.667701shield sshd\[2027\]: Invalid user furukawa from 203.128.242.166 port 36550
2019-12-04T19:42:17.672467shield sshd\[2027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166
2019-12-04T19:42:20.038234shield sshd\[2027\]: Failed password for invalid user furukawa from 203.128.242.166 port 36550 ssh2
2019-12-04T19:49:21.867853shield sshd\[4170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166  user=root
2019-12-04T19:49:23.441064shield sshd\[4170\]: Failed password for root from 203.128.242.166 port 41915 ssh2
2019-12-05 03:54:33
80.211.133.238 attack
Dec  4 20:22:58 MK-Soft-VM5 sshd[2816]: Failed password for root from 80.211.133.238 port 54098 ssh2
...
2019-12-05 03:54:04
121.183.203.60 attackspambots
Dec  4 20:27:17 vmanager6029 sshd\[19365\]: Invalid user webmaster from 121.183.203.60 port 41940
Dec  4 20:27:17 vmanager6029 sshd\[19365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.183.203.60
Dec  4 20:27:18 vmanager6029 sshd\[19365\]: Failed password for invalid user webmaster from 121.183.203.60 port 41940 ssh2
2019-12-05 04:31:57
165.227.157.168 attackspambots
Dec  4 09:38:20 tdfoods sshd\[30392\]: Invalid user aminudin from 165.227.157.168
Dec  4 09:38:20 tdfoods sshd\[30392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
Dec  4 09:38:21 tdfoods sshd\[30392\]: Failed password for invalid user aminudin from 165.227.157.168 port 41292 ssh2
Dec  4 09:43:47 tdfoods sshd\[31034\]: Invalid user mylinux from 165.227.157.168
Dec  4 09:43:47 tdfoods sshd\[31034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
2019-12-05 03:55:03
195.154.29.107 attackbotsspam
195.154.29.107 - - \[04/Dec/2019:19:37:03 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
195.154.29.107 - - \[04/Dec/2019:19:37:08 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-12-05 04:31:20
106.13.4.250 attackbotsspam
Dec  4 20:48:08 vserver sshd\[4899\]: Invalid user kaaren from 106.13.4.250Dec  4 20:48:10 vserver sshd\[4899\]: Failed password for invalid user kaaren from 106.13.4.250 port 43648 ssh2Dec  4 20:53:53 vserver sshd\[4949\]: Invalid user ident from 106.13.4.250Dec  4 20:53:55 vserver sshd\[4949\]: Failed password for invalid user ident from 106.13.4.250 port 49150 ssh2
...
2019-12-05 04:05:33
190.193.41.173 attackbots
Dec  2 18:26:32 cumulus sshd[4227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.41.173  user=backup
Dec  2 18:26:33 cumulus sshd[4227]: Failed password for backup from 190.193.41.173 port 39678 ssh2
Dec  2 18:26:34 cumulus sshd[4227]: Received disconnect from 190.193.41.173 port 39678:11: Bye Bye [preauth]
Dec  2 18:26:34 cumulus sshd[4227]: Disconnected from 190.193.41.173 port 39678 [preauth]
Dec  2 18:40:53 cumulus sshd[5022]: Invalid user cccard from 190.193.41.173 port 41206
Dec  2 18:40:53 cumulus sshd[5022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.41.173
Dec  2 18:40:54 cumulus sshd[5022]: Failed password for invalid user cccard from 190.193.41.173 port 41206 ssh2
Dec  2 18:40:55 cumulus sshd[5022]: Received disconnect from 190.193.41.173 port 41206:11: Bye Bye [preauth]
Dec  2 18:40:55 cumulus sshd[5022]: Disconnected from 190.193.41.173 port 41206 [preaut........
-------------------------------
2019-12-05 03:53:15
111.230.166.91 attackbotsspam
Dec  4 20:27:33 MK-Soft-VM5 sshd[2844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.166.91 
Dec  4 20:27:35 MK-Soft-VM5 sshd[2844]: Failed password for invalid user veroxcode from 111.230.166.91 port 40204 ssh2
...
2019-12-05 04:18:34
187.75.158.1 attackspambots
Dec  4 14:44:56 plusreed sshd[8976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.158.1  user=root
Dec  4 14:44:59 plusreed sshd[8976]: Failed password for root from 187.75.158.1 port 39002 ssh2
Dec  4 14:54:04 plusreed sshd[11332]: Invalid user shish from 187.75.158.1
...
2019-12-05 04:17:24
106.52.22.202 attack
Dec  4 21:10:34 eventyay sshd[28709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.22.202
Dec  4 21:10:36 eventyay sshd[28709]: Failed password for invalid user nancyp from 106.52.22.202 port 44848 ssh2
Dec  4 21:16:41 eventyay sshd[29005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.22.202
...
2019-12-05 04:32:19
54.39.98.253 attackspambots
Dec  4 21:06:34 meumeu sshd[701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.98.253 
Dec  4 21:06:36 meumeu sshd[701]: Failed password for invalid user melanie from 54.39.98.253 port 45560 ssh2
Dec  4 21:14:41 meumeu sshd[1874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.98.253 
...
2019-12-05 04:15:27
185.176.27.94 attackspambots
Fail2Ban Ban Triggered
2019-12-05 04:02:40

最近上报的IP列表

140.81.202.215 140.221.37.118 140.214.189.188 239.103.155.96
140.156.67.149 140.154.158.75 140.126.173.93 140.115.35.11
152.223.156.222 108.46.243.104 90.200.195.116 5.205.227.248
47.165.204.207 41.173.152.43 69.72.149.74 130.121.22.253
234.82.195.84 227.109.170.138 90.103.195.86 79.152.39.117