必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.4.179.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.4.179.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:11:45 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 214.179.4.140.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 140.4.179.214.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.109.53.141 attackbots
Unauthorized connection attempt from IP address 78.109.53.141 on Port 445(SMB)
2020-08-18 01:39:41
191.32.227.84 attackspambots
Unauthorized connection attempt from IP address 191.32.227.84 on Port 445(SMB)
2020-08-18 01:40:47
58.27.207.210 attackbotsspam
SSH Brute-Force Attack
2020-08-18 01:58:20
91.121.164.188 attackbotsspam
Aug 17 14:15:24 vpn01 sshd[9444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.164.188
Aug 17 14:15:26 vpn01 sshd[9444]: Failed password for invalid user vnc from 91.121.164.188 port 51014 ssh2
...
2020-08-18 01:51:16
106.12.217.176 attackspambots
Aug 17 14:01:49 mout sshd[7084]: Invalid user jxs from 106.12.217.176 port 53640
Aug 17 14:01:51 mout sshd[7084]: Failed password for invalid user jxs from 106.12.217.176 port 53640 ssh2
Aug 17 14:01:52 mout sshd[7084]: Disconnected from invalid user jxs 106.12.217.176 port 53640 [preauth]
2020-08-18 02:12:13
51.148.120.167 attackbotsspam
Aug 17 15:06:25 CT3029 sshd[13439]: Invalid user els from 51.148.120.167 port 50748
Aug 17 15:06:25 CT3029 sshd[13439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.148.120.167
Aug 17 15:06:28 CT3029 sshd[13439]: Failed password for invalid user els from 51.148.120.167 port 50748 ssh2
Aug 17 15:06:28 CT3029 sshd[13439]: Received disconnect from 51.148.120.167 port 50748:11: Bye Bye [preauth]
Aug 17 15:06:28 CT3029 sshd[13439]: Disconnected from 51.148.120.167 port 50748 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.148.120.167
2020-08-18 01:58:51
106.54.48.208 attackspambots
Aug 17 15:03:26 ws12vmsma01 sshd[16607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.208 
Aug 17 15:03:26 ws12vmsma01 sshd[16607]: Invalid user vero from 106.54.48.208
Aug 17 15:03:29 ws12vmsma01 sshd[16607]: Failed password for invalid user vero from 106.54.48.208 port 57652 ssh2
...
2020-08-18 02:07:35
51.68.224.53 attack
2020-08-17T13:34:16.5287901495-001 sshd[37877]: Invalid user rv from 51.68.224.53 port 44314
2020-08-17T13:34:18.7376121495-001 sshd[37877]: Failed password for invalid user rv from 51.68.224.53 port 44314 ssh2
2020-08-17T13:36:25.4703631495-001 sshd[37958]: Invalid user armenia from 51.68.224.53 port 57710
2020-08-17T13:36:25.4736051495-001 sshd[37958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=53.ip-51-68-224.eu
2020-08-17T13:36:25.4703631495-001 sshd[37958]: Invalid user armenia from 51.68.224.53 port 57710
2020-08-17T13:36:27.5011191495-001 sshd[37958]: Failed password for invalid user armenia from 51.68.224.53 port 57710 ssh2
...
2020-08-18 01:59:05
117.5.146.61 attackspambots
1597665722 - 08/17/2020 14:02:02 Host: 117.5.146.61/117.5.146.61 Port: 445 TCP Blocked
2020-08-18 02:00:59
185.220.101.216 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-08-18 01:56:10
200.44.50.155 attackbots
Aug 17 14:37:43 root sshd[25076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155 
Aug 17 14:37:45 root sshd[25076]: Failed password for invalid user uuuu from 200.44.50.155 port 42332 ssh2
Aug 17 14:46:18 root sshd[26222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155 
...
2020-08-18 01:44:32
46.101.139.73 attack
xmlrpc attack
2020-08-18 02:03:07
165.227.63.187 attackbotsspam
digitalocdean shit / http://firstmailer.info/firstmailer/link.php?M=
2020-08-18 01:49:42
211.80.102.182 attack
Aug 17 19:33:00 ip106 sshd[23434]: Failed password for root from 211.80.102.182 port 53305 ssh2
...
2020-08-18 02:03:32
180.250.108.133 attackbotsspam
2020-08-17T17:27:19.445149vps1033 sshd[12598]: Failed password for invalid user andrzej from 180.250.108.133 port 48932 ssh2
2020-08-17T17:28:59.659833vps1033 sshd[16103]: Invalid user wordpress from 180.250.108.133 port 45724
2020-08-17T17:28:59.663004vps1033 sshd[16103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.108.133
2020-08-17T17:28:59.659833vps1033 sshd[16103]: Invalid user wordpress from 180.250.108.133 port 45724
2020-08-17T17:29:02.017147vps1033 sshd[16103]: Failed password for invalid user wordpress from 180.250.108.133 port 45724 ssh2
...
2020-08-18 01:43:35

最近上报的IP列表

72.47.23.134 65.178.135.90 254.14.206.76 57.231.41.226
188.22.105.72 198.46.58.236 54.174.47.77 138.217.110.165
44.210.158.185 189.200.52.17 97.58.53.22 149.251.53.29
144.234.189.29 189.125.252.201 228.140.193.249 215.174.14.100
195.9.89.135 240.124.100.73 122.124.236.169 3.57.117.7