必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.32.150.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.32.150.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:16:36 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 95.150.32.140.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 140.32.150.95.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.180.128.134 attackbots
Automatic report - Banned IP Access
2020-01-02 22:49:57
60.191.52.254 attack
Unauthorized connection attempt detected from IP address 60.191.52.254 to port 9999
2020-01-02 22:37:47
200.29.232.154 attack
Unauthorized connection attempt detected from IP address 200.29.232.154 to port 445
2020-01-02 22:59:36
212.200.36.219 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-01-02 23:20:42
54.38.36.210 attackspambots
Jan  2 15:49:40 mail sshd[25060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210 
Jan  2 15:49:42 mail sshd[25060]: Failed password for invalid user schreiberg from 54.38.36.210 port 58294 ssh2
Jan  2 15:53:42 mail sshd[25622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210
2020-01-02 23:13:32
213.136.89.204 attackbots
Jan  2 15:58:28 mout sshd[11592]: Invalid user uo from 213.136.89.204 port 38000
2020-01-02 23:06:38
103.52.16.35 attackbots
ssh failed login
2020-01-02 23:14:42
206.81.8.14 attackspambots
Jan  2 16:17:30 mout sshd[17623]: Invalid user ockerse from 206.81.8.14 port 54014
2020-01-02 23:19:22
222.186.175.220 attackspam
Jan  2 15:58:08 legacy sshd[25357]: Failed password for root from 222.186.175.220 port 48670 ssh2
Jan  2 15:58:21 legacy sshd[25357]: error: maximum authentication attempts exceeded for root from 222.186.175.220 port 48670 ssh2 [preauth]
Jan  2 15:58:28 legacy sshd[25366]: Failed password for root from 222.186.175.220 port 57302 ssh2
...
2020-01-02 23:06:10
69.30.225.114 attack
Unauthorized connection attempt detected from IP address 69.30.225.114 to port 3389
2020-01-02 22:36:46
125.234.236.142 attack
3389/tcp 445/tcp...
[2019-11-12/2020-01-02]9pkt,2pt.(tcp)
2020-01-02 22:58:07
222.186.30.218 attack
Unauthorized connection attempt detected from IP address 222.186.30.218 to port 22
2020-01-02 22:56:54
1.52.147.48 attackbots
Unauthorized connection attempt detected from IP address 1.52.147.48 to port 23
2020-01-02 22:43:03
117.254.186.98 attackbotsspam
Jan  2 11:23:12 amit sshd\[31564\]: Invalid user guest from 117.254.186.98
Jan  2 11:23:12 amit sshd\[31564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.186.98
Jan  2 11:23:14 amit sshd\[31564\]: Failed password for invalid user guest from 117.254.186.98 port 59130 ssh2
...
2020-01-02 22:55:39
5.9.70.72 attackspambots
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2020-01-02 23:07:29

最近上报的IP列表

205.227.220.22 138.153.132.186 179.202.150.67 161.225.87.199
42.8.206.134 218.226.225.161 221.207.238.239 253.24.100.61
137.109.36.156 31.94.143.139 122.83.41.1 14.123.237.27
52.27.0.158 87.161.3.58 76.197.125.157 218.211.152.229
35.87.186.147 173.234.244.101 226.250.80.217 48.231.67.207