必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.234.90.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.234.90.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:47:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 113.90.234.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.90.234.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
158.255.23.146 attackbots
2019-07-06 18:10:18 H=(158-255-23-146.lir.beskydnet.cz) [158.255.23.146]:56903 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-06 18:10:18 H=(158-255-23-146.lir.beskydnet.cz) [158.255.23.146]:56903 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-06 18:10:19 H=(158-255-23-146.lir.beskydnet.cz) [158.255.23.146]:56903 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-07-07 10:27:46
58.57.34.124 attackbots
Jul  6 15:52:07 josie sshd[3675]: Invalid user icinga from 58.57.34.124
Jul  6 15:52:07 josie sshd[3675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.34.124 
Jul  6 15:52:09 josie sshd[3675]: Failed password for invalid user icinga from 58.57.34.124 port 37258 ssh2
Jul  6 15:52:09 josie sshd[3678]: Received disconnect from 58.57.34.124: 11: Bye Bye
Jul  6 15:59:55 josie sshd[8461]: Invalid user webmaster from 58.57.34.124
Jul  6 15:59:55 josie sshd[8461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.34.124 
Jul  6 15:59:57 josie sshd[8461]: Failed password for invalid user webmaster from 58.57.34.124 port 40758 ssh2
Jul  6 15:59:57 josie sshd[8464]: Received disconnect from 58.57.34.124: 11: Bye Bye
Jul  6 16:02:41 josie sshd[9917]: Invalid user eddie from 58.57.34.124
Jul  6 16:02:41 josie sshd[9917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=........
-------------------------------
2019-07-07 10:43:37
13.67.88.233 attackbots
web-1 [ssh] SSH Attack
2019-07-07 10:37:15
81.22.45.25 attackbotsspam
9001/tcp 9000/tcp 9004/tcp...
[2019-06-29/07-06]12pkt,5pt.(tcp)
2019-07-07 10:34:42
46.105.181.209 attack
Jul  7 04:31:51 mail sshd\[14227\]: Invalid user info from 46.105.181.209 port 42732
Jul  7 04:31:51 mail sshd\[14227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.181.209
Jul  7 04:31:53 mail sshd\[14227\]: Failed password for invalid user info from 46.105.181.209 port 42732 ssh2
Jul  7 04:34:00 mail sshd\[14506\]: Invalid user resolve from 46.105.181.209 port 40306
Jul  7 04:34:00 mail sshd\[14506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.181.209
2019-07-07 10:40:45
92.118.37.43 attackbots
Jul  7 03:27:15 h2177944 kernel: \[787174.186667\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18594 PROTO=TCP SPT=49067 DPT=4080 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:30:49 h2177944 kernel: \[787387.911022\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=57960 PROTO=TCP SPT=49067 DPT=4656 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:31:32 h2177944 kernel: \[787431.555923\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=28293 PROTO=TCP SPT=49067 DPT=5682 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:34:55 h2177944 kernel: \[787634.514990\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=58586 PROTO=TCP SPT=49067 DPT=5213 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:39:32 h2177944 kernel: \[787910.809881\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TO
2019-07-07 10:36:47
200.71.222.24 attackspambots
firewall-block, port(s): 445/tcp
2019-07-07 10:28:46
51.15.219.185 attackspambots
Jul  7 01:24:36 ***** sshd[21711]: Invalid user indu from 51.15.219.185 port 56184
2019-07-07 10:16:20
134.209.188.245 attackbotsspam
990/tcp 4567/tcp 5060/udp...
[2019-05-23/07-06]87pkt,66pt.(tcp),2pt.(udp)
2019-07-07 10:24:00
209.17.96.218 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-07 10:21:01
93.104.210.236 attackspambots
Automatic report - Web App Attack
2019-07-07 10:36:16
111.45.123.117 attack
ssh default account attempted login
2019-07-07 10:08:39
107.170.201.70 attack
Port scan: Attack repeated for 24 hours
2019-07-07 09:56:35
185.173.35.33 attackspam
5289/tcp 47808/udp 5906/tcp...
[2019-05-06/07-06]80pkt,42pt.(tcp),8pt.(udp)
2019-07-07 10:15:16
75.31.93.181 attack
Jul  7 00:46:04 ***** sshd[21680]: Invalid user william from 75.31.93.181 port 16188
2019-07-07 10:39:06

最近上报的IP列表

188.155.42.247 192.22.86.91 118.192.119.159 199.73.35.88
199.14.251.73 65.108.184.138 233.240.120.102 63.218.165.115
78.160.82.246 84.194.90.150 215.104.60.3 162.142.122.231
166.81.88.123 142.192.233.239 146.11.87.161 244.35.204.167
240.54.230.248 151.138.1.8 108.241.98.42 200.51.7.129