必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.31.125.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.31.125.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 21:12:25 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 61.125.31.140.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 140.31.125.61.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.189 attack
May  3 05:49:12 PorscheCustomer sshd[26737]: Failed password for root from 112.85.42.189 port 12828 ssh2
May  3 05:51:19 PorscheCustomer sshd[26787]: Failed password for root from 112.85.42.189 port 18442 ssh2
...
2020-05-03 12:00:52
103.16.223.243 attackspambots
May  3 06:48:49 pkdns2 sshd\[7776\]: Invalid user alfred from 103.16.223.243May  3 06:48:52 pkdns2 sshd\[7776\]: Failed password for invalid user alfred from 103.16.223.243 port 44785 ssh2May  3 06:53:04 pkdns2 sshd\[8009\]: Invalid user xbmc from 103.16.223.243May  3 06:53:06 pkdns2 sshd\[8009\]: Failed password for invalid user xbmc from 103.16.223.243 port 49748 ssh2May  3 06:57:24 pkdns2 sshd\[8179\]: Invalid user donatas from 103.16.223.243May  3 06:57:26 pkdns2 sshd\[8179\]: Failed password for invalid user donatas from 103.16.223.243 port 54683 ssh2
...
2020-05-03 12:01:55
106.246.250.202 attackspambots
2020-05-03T03:52:11.326767abusebot-6.cloudsearch.cf sshd[10168]: Invalid user syed from 106.246.250.202 port 49594
2020-05-03T03:52:11.335620abusebot-6.cloudsearch.cf sshd[10168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.250.202
2020-05-03T03:52:11.326767abusebot-6.cloudsearch.cf sshd[10168]: Invalid user syed from 106.246.250.202 port 49594
2020-05-03T03:52:13.264204abusebot-6.cloudsearch.cf sshd[10168]: Failed password for invalid user syed from 106.246.250.202 port 49594 ssh2
2020-05-03T03:57:29.316260abusebot-6.cloudsearch.cf sshd[10750]: Invalid user test from 106.246.250.202 port 10262
2020-05-03T03:57:29.322892abusebot-6.cloudsearch.cf sshd[10750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.250.202
2020-05-03T03:57:29.316260abusebot-6.cloudsearch.cf sshd[10750]: Invalid user test from 106.246.250.202 port 10262
2020-05-03T03:57:31.241313abusebot-6.cloudsearch.cf sshd[10750
...
2020-05-03 12:01:21
54.38.188.118 attack
2020-05-02T23:34:33.9971921495-001 sshd[5025]: Invalid user deploy from 54.38.188.118 port 35570
2020-05-02T23:34:36.1285831495-001 sshd[5025]: Failed password for invalid user deploy from 54.38.188.118 port 35570 ssh2
2020-05-02T23:39:51.0311301495-001 sshd[5229]: Invalid user ltl from 54.38.188.118 port 37934
2020-05-02T23:39:51.0347741495-001 sshd[5229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.ip-54-38-188.eu
2020-05-02T23:39:51.0311301495-001 sshd[5229]: Invalid user ltl from 54.38.188.118 port 37934
2020-05-02T23:39:52.8118681495-001 sshd[5229]: Failed password for invalid user ltl from 54.38.188.118 port 37934 ssh2
...
2020-05-03 12:08:47
92.50.249.92 attackbotsspam
2020-05-03T03:49:23.025428abusebot-7.cloudsearch.cf sshd[21064]: Invalid user an from 92.50.249.92 port 46554
2020-05-03T03:49:23.032268abusebot-7.cloudsearch.cf sshd[21064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.92
2020-05-03T03:49:23.025428abusebot-7.cloudsearch.cf sshd[21064]: Invalid user an from 92.50.249.92 port 46554
2020-05-03T03:49:25.231789abusebot-7.cloudsearch.cf sshd[21064]: Failed password for invalid user an from 92.50.249.92 port 46554 ssh2
2020-05-03T03:56:29.552171abusebot-7.cloudsearch.cf sshd[21412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.92  user=root
2020-05-03T03:56:31.566159abusebot-7.cloudsearch.cf sshd[21412]: Failed password for root from 92.50.249.92 port 58768 ssh2
2020-05-03T03:59:22.819174abusebot-7.cloudsearch.cf sshd[21608]: Invalid user vdr from 92.50.249.92 port 51978
...
2020-05-03 12:30:41
87.103.120.250 attack
Invalid user frappe from 87.103.120.250 port 34078
2020-05-03 08:45:52
103.90.231.179 attackbots
srv02 Mass scanning activity detected Target: 25327  ..
2020-05-03 12:20:14
34.80.223.251 attackspambots
k+ssh-bruteforce
2020-05-03 08:43:42
77.52.185.59 attackbots
" "
2020-05-03 12:18:48
115.79.138.163 attackspambots
May  3 01:09:54 dns1 sshd[5262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.138.163 
May  3 01:09:57 dns1 sshd[5262]: Failed password for invalid user visitante from 115.79.138.163 port 44785 ssh2
May  3 01:13:05 dns1 sshd[5514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.138.163
2020-05-03 12:29:00
218.55.177.7 attackspambots
May  2 18:04:13 web1 sshd\[3301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.55.177.7  user=root
May  2 18:04:16 web1 sshd\[3301\]: Failed password for root from 218.55.177.7 port 7486 ssh2
May  2 18:08:22 web1 sshd\[3704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.55.177.7  user=root
May  2 18:08:25 web1 sshd\[3704\]: Failed password for root from 218.55.177.7 port 42252 ssh2
May  2 18:12:35 web1 sshd\[4175\]: Invalid user admin1 from 218.55.177.7
May  2 18:12:35 web1 sshd\[4175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.55.177.7
2020-05-03 12:28:06
77.88.5.51 attack
Malicious brute force vulnerability hacking attacks
2020-05-03 12:04:05
222.186.175.169 attackspam
May  3 04:06:30 hcbbdb sshd\[14822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
May  3 04:06:31 hcbbdb sshd\[14822\]: Failed password for root from 222.186.175.169 port 58412 ssh2
May  3 04:06:47 hcbbdb sshd\[14845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
May  3 04:06:49 hcbbdb sshd\[14845\]: Failed password for root from 222.186.175.169 port 53408 ssh2
May  3 04:07:05 hcbbdb sshd\[14845\]: Failed password for root from 222.186.175.169 port 53408 ssh2
2020-05-03 12:09:17
185.176.27.246 attackspambots
05/03/2020-06:28:07.915246 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-03 12:28:28
105.145.34.154 attack
May  3 04:57:13 ms-srv sshd[24473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.145.34.154
May  3 04:57:16 ms-srv sshd[24473]: Failed password for invalid user chris from 105.145.34.154 port 58738 ssh2
2020-05-03 12:10:57

最近上报的IP列表

12.95.47.157 212.58.102.136 134.145.132.74 21.1.141.238
138.248.24.42 229.99.167.2 189.253.29.123 3.71.173.142
247.110.197.130 66.211.29.82 146.30.203.148 49.29.129.81
231.59.19.32 163.249.166.242 131.12.54.32 20.165.34.59
92.34.167.155 184.53.252.200 38.95.155.94 187.25.225.104