必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.246.104.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.246.104.220.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 19:57:35 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 220.104.246.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.104.246.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.16.178.4 attackbotsspam
" "
2020-08-11 00:03:42
45.119.41.58 attack
1 attempts against mh-modsecurity-ban on drop
2020-08-11 00:21:15
74.6.132.234 attack
Email Subject: 'Greetings,'
2020-08-10 23:52:45
129.211.66.195 attackspambots
Aug 10 16:44:01 journals sshd\[63162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.66.195  user=root
Aug 10 16:44:04 journals sshd\[63162\]: Failed password for root from 129.211.66.195 port 47512 ssh2
Aug 10 16:47:43 journals sshd\[63512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.66.195  user=root
Aug 10 16:47:44 journals sshd\[63512\]: Failed password for root from 129.211.66.195 port 58056 ssh2
Aug 10 16:51:09 journals sshd\[63898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.66.195  user=root
...
2020-08-11 00:03:00
93.108.242.140 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 00:06:43
35.189.172.158 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 23:53:19
167.71.229.18 attackbots
familiengesundheitszentrum-fulda.de 167.71.229.18 [10/Aug/2020:14:05:23 +0200] "POST /wp-login.php HTTP/1.1" 200 6078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
familiengesundheitszentrum-fulda.de 167.71.229.18 [10/Aug/2020:14:05:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4119 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-11 00:17:40
101.78.229.4 attackbots
Aug 10 16:35:57 myvps sshd[28030]: Failed password for root from 101.78.229.4 port 38738 ssh2
Aug 10 16:52:12 myvps sshd[6035]: Failed password for root from 101.78.229.4 port 32962 ssh2
...
2020-08-11 00:01:31
156.96.61.98 attackspam
Email Subject: 'Congratulations info@l-bg.deYou are the Winne'
2020-08-10 23:54:52
108.58.38.70 attack
Aug 10 14:00:44 h2065291 sshd[5279]: Invalid user admin from 108.58.38.70
Aug 10 14:00:46 h2065291 sshd[5279]: Failed password for invalid user admin from 108.58.38.70 port 59596 ssh2
Aug 10 14:00:46 h2065291 sshd[5279]: Received disconnect from 108.58.38.70: 11: Bye Bye [preauth]
Aug 10 14:00:47 h2065291 sshd[5281]: Invalid user admin from 108.58.38.70
Aug 10 14:00:49 h2065291 sshd[5281]: Failed password for invalid user admin from 108.58.38.70 port 59664 ssh2
Aug 10 14:00:49 h2065291 sshd[5281]: Received disconnect from 108.58.38.70: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=108.58.38.70
2020-08-11 00:07:57
46.172.226.56 attackbots
Aug 10 13:53:40 *** sshd[28180]: Invalid user admin from 46.172.226.56
Aug 10 13:53:40 *** sshd[28180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.172.226.56 
Aug 10 13:53:42 *** sshd[28180]: Failed password for invalid user admin from 46.172.226.56 port 52795 ssh2
Aug 10 13:53:42 *** sshd[28180]: Received disconnect from 46.172.226.56: 11: Bye Bye [preauth]
Aug 10 13:53:42 *** sshd[28182]: Invalid user admin from 46.172.226.56
Aug 10 13:53:42 *** sshd[28182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.172.226.56 
Aug 10 13:53:44 *** sshd[28182]: Failed password for invalid user admin from 46.172.226.56 port 52862 ssh2
Aug 10 13:53:44 *** sshd[28182]: Received disconnect from 46.172.226.56: 11: Bye Bye [preauth]
Aug 10 13:53:45 *** sshd[28184]: Invalid user admin from 46.172.226.56
Aug 10 13:53:45 *** sshd[28184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu........
-------------------------------
2020-08-11 00:01:47
179.108.240.119 attackspam
Aug 10 13:47:05 mail.srvfarm.net postfix/smtpd[1652469]: warning: unknown[179.108.240.119]: SASL PLAIN authentication failed: 
Aug 10 13:47:06 mail.srvfarm.net postfix/smtpd[1652469]: lost connection after AUTH from unknown[179.108.240.119]
Aug 10 13:49:43 mail.srvfarm.net postfix/smtpd[1653291]: warning: unknown[179.108.240.119]: SASL PLAIN authentication failed: 
Aug 10 13:49:44 mail.srvfarm.net postfix/smtpd[1653291]: lost connection after AUTH from unknown[179.108.240.119]
Aug 10 13:53:47 mail.srvfarm.net postfix/smtpd[1653890]: warning: unknown[179.108.240.119]: SASL PLAIN authentication failed:
2020-08-10 23:56:13
42.159.80.91 attackspam
2020-08-08 23:42:32 server sshd[4296]: Failed password for invalid user root from 42.159.80.91 port 1344 ssh2
2020-08-11 00:09:36
171.38.217.7 attack
 TCP (SYN) 171.38.217.7:42080 -> port 23, len 44
2020-08-10 23:51:55
109.164.5.222 attackbotsspam
Aug 10 13:53:52 mail.srvfarm.net postfix/smtpd[1653886]: warning: unknown[109.164.5.222]: SASL PLAIN authentication failed: 
Aug 10 13:53:52 mail.srvfarm.net postfix/smtpd[1653886]: lost connection after AUTH from unknown[109.164.5.222]
Aug 10 13:56:57 mail.srvfarm.net postfix/smtps/smtpd[1652474]: warning: unknown[109.164.5.222]: SASL PLAIN authentication failed: 
Aug 10 13:56:57 mail.srvfarm.net postfix/smtps/smtpd[1652474]: lost connection after AUTH from unknown[109.164.5.222]
Aug 10 14:01:41 mail.srvfarm.net postfix/smtps/smtpd[1657860]: warning: unknown[109.164.5.222]: SASL PLAIN authentication failed:
2020-08-10 23:57:54

最近上报的IP列表

222.206.223.166 15.125.170.113 70.114.248.150 212.173.76.72
151.137.2.7 46.135.94.41 103.193.206.154 185.158.21.53
168.57.107.84 198.152.242.18 96.240.124.22 94.185.12.199
221.108.219.190 119.235.231.211 174.3.168.254 24.4.171.97
59.183.79.51 204.74.76.85 115.99.234.237 61.138.105.221