必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.55.218.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.55.218.112.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121600 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 16 16:10:36 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 112.218.55.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.218.55.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.15.79.194 attack
Unauthorized connection attempt detected from IP address 51.15.79.194 to port 2220 [J]
2020-02-05 03:27:37
134.209.18.238 attackbotsspam
2019-05-07 16:57:29 1hO1X7-0000Lh-Ns SMTP connection from material.boroujerdico.com \(pinch.cambostack.icu\) \[134.209.18.238\]:46058 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 16:58:33 1hO1Y9-0000NF-D4 SMTP connection from material.boroujerdico.com \(exciting.cambostack.icu\) \[134.209.18.238\]:45849 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 16:59:14 1hO1Yo-0000OF-1u SMTP connection from material.boroujerdico.com \(carriage.cambostack.icu\) \[134.209.18.238\]:47169 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 03:31:56
58.186.113.110 attackbots
Feb  4 14:48:52 grey postfix/smtpd\[17116\]: NOQUEUE: reject: RCPT from unknown\[58.186.113.110\]: 554 5.7.1 Service unavailable\; Client host \[58.186.113.110\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?58.186.113.110\; from=\ to=\ proto=ESMTP helo=\<\[58.186.113.110\]\>
...
2020-02-05 03:17:16
222.186.30.35 attackspambots
Feb  4 20:41:19 MK-Soft-VM5 sshd[3432]: Failed password for root from 222.186.30.35 port 64612 ssh2
Feb  4 20:41:22 MK-Soft-VM5 sshd[3432]: Failed password for root from 222.186.30.35 port 64612 ssh2
...
2020-02-05 03:41:50
134.209.27.20 attackspam
2019-05-08 03:51:24 H=\(calorific.markprecisions.icu\) \[134.209.27.20\]:36261 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-05-08 03:51:24 H=\(calorific.markprecisions.icu\) \[134.209.27.20\]:36261 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-05-08 03:52:09 H=\(calorific.markprecisions.icu\) \[134.209.27.20\]:44353 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-05-08 03:52:09 H=\(calorific.markprecisions.icu\) \[134.209.27.20\]:44353 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 03:20:37
132.148.157.66 attack
Web App Attack
2020-02-05 03:19:58
80.66.81.143 attackbotsspam
2020-02-04 20:18:02 dovecot_login authenticator failed for \(host143.at-sib.ru.\) \[80.66.81.143\]: 535 Incorrect authentication data \(set_id=forum@darkrp.com\)
2020-02-04 20:18:12 dovecot_login authenticator failed for \(host143.at-sib.ru.\) \[80.66.81.143\]: 535 Incorrect authentication data
2020-02-04 20:18:22 dovecot_login authenticator failed for \(host143.at-sib.ru.\) \[80.66.81.143\]: 535 Incorrect authentication data
2020-02-04 20:18:30 dovecot_login authenticator failed for \(host143.at-sib.ru.\) \[80.66.81.143\]: 535 Incorrect authentication data
2020-02-04 20:18:46 dovecot_login authenticator failed for \(host143.at-sib.ru.\) \[80.66.81.143\]: 535 Incorrect authentication data
...
2020-02-05 03:23:37
24.2.205.235 attackspambots
Unauthorized connection attempt detected from IP address 24.2.205.235 to port 2220 [J]
2020-02-05 03:43:28
172.69.68.163 attackbots
SQL injection:/newsites/free/pierre/search/searchSVI.php?continentName=EU+%27-6863+union+all+select+1,CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1%23&country=276+&prj_typ=all&startdate=&enddate=&from=&page=1&searchSubmission=Recherche
2020-02-05 03:32:47
84.229.158.138 attackspam
Unauthorized connection attempt detected from IP address 84.229.158.138 to port 23 [J]
2020-02-05 03:18:38
49.88.112.112 attackbotsspam
February 04 2020, 19:17:00 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-02-05 03:21:41
140.143.246.53 attackbots
Feb  3 19:16:46 server sshd\[5697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.246.53  user=root
Feb  3 19:16:48 server sshd\[5697\]: Failed password for root from 140.143.246.53 port 45452 ssh2
Feb  3 19:24:47 server sshd\[7320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.246.53  user=root
Feb  3 19:24:49 server sshd\[7320\]: Failed password for root from 140.143.246.53 port 53948 ssh2
Feb  4 17:32:41 server sshd\[28357\]: Invalid user fb from 140.143.246.53
Feb  4 17:32:41 server sshd\[28357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.246.53 
...
2020-02-05 03:20:52
79.142.225.38 attack
Feb  4 19:22:43 mout sshd[3409]: Invalid user chef from 79.142.225.38 port 39280
2020-02-05 03:35:00
183.60.141.171 attackbots
Unauthorised access (Feb  4) SRC=183.60.141.171 LEN=40 TTL=52 ID=11656 TCP DPT=23 WINDOW=1024 SYN 
Unauthorised access (Feb  3) SRC=183.60.141.171 LEN=40 TTL=52 ID=19802 TCP DPT=21 WINDOW=1024 SYN
2020-02-05 03:50:03
192.223.125.20 attackspam
Feb  4 14:48:07 grey postfix/smtpd\[27051\]: NOQUEUE: reject: RCPT from unknown\[192.223.125.20\]: 554 5.7.1 Service unavailable\; Client host \[192.223.125.20\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=192.223.125.20\; from=\ to=\ proto=ESMTP helo=\<\[192.223.125.20\]\>
...
2020-02-05 03:48:25

最近上报的IP列表

141.221.162.13 140.63.178.180 140.255.228.90 151.217.28.82
111.150.190.109 140.10.94.112 14.80.134.233 109.42.179.157
151.110.40.250 151.110.216.55 151.132.8.96 249.150.38.15
249.111.0.98 14.162.3.253 187.212.4.27 249.64.236.60
249.91.100.174 139.96.118.202 249.91.245.46 249.123.169.170