必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.56.5.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.56.5.138.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022701 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 28 03:52:10 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 138.5.56.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.5.56.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.162.176.206 attackspambots
Invalid user avanthi from 14.162.176.206 port 56731
2020-07-24 03:39:49
183.103.115.2 attack
Jul 23 18:42:38 [host] sshd[1490]: Invalid user ei
Jul 23 18:42:38 [host] sshd[1490]: pam_unix(sshd:a
Jul 23 18:42:40 [host] sshd[1490]: Failed password
2020-07-24 03:44:36
39.156.9.133 attackbots
Invalid user bing from 39.156.9.133 port 42134
2020-07-24 03:38:58
122.51.186.145 attackbotsspam
Jul 23 18:00:24 piServer sshd[1642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.145 
Jul 23 18:00:26 piServer sshd[1642]: Failed password for invalid user uftp from 122.51.186.145 port 33016 ssh2
Jul 23 18:04:04 piServer sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.145 
...
2020-07-24 03:13:56
185.123.164.54 attack
SSH Brute-Force attacks
2020-07-24 03:44:11
124.196.11.2 attack
Jul 22 09:37:56 nxxxxxxx sshd[7972]: Invalid user user from 124.196.11.2
Jul 22 09:37:56 nxxxxxxx sshd[7972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.196.11.2 
Jul 22 09:37:58 nxxxxxxx sshd[7972]: Failed password for invalid user user from 124.196.11.2 port 12088 ssh2
Jul 22 09:37:59 nxxxxxxx sshd[7972]: Received disconnect from 124.196.11.2: 11: Bye Bye [preauth]
Jul 22 09:42:28 nxxxxxxx sshd[8503]: Invalid user ding from 124.196.11.2
Jul 22 09:42:28 nxxxxxxx sshd[8503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.196.11.2 
Jul 22 09:42:30 nxxxxxxx sshd[8503]: Failed password for invalid user ding from 124.196.11.2 port 39722 ssh2
Jul 22 09:42:31 nxxxxxxx sshd[8503]: Received disconnect from 124.196.11.2: 11: Bye Bye [preauth]
Jul 22 09:47:06 nxxxxxxx sshd[9105]: Invalid user ubuntu from 124.196.11.2
Jul 22 09:47:06 nxxxxxxx sshd[9105]: pam_unix(sshd:auth): authenticatio........
-------------------------------
2020-07-24 03:12:44
182.61.11.3 attackspam
Jul 23 20:58:21  sshd\[27959\]: Invalid user magento_user from 182.61.11.3Jul 23 20:58:23  sshd\[27959\]: Failed password for invalid user magento_user from 182.61.11.3 port 38284 ssh2
...
2020-07-24 03:45:35
171.220.242.90 attackbotsspam
Invalid user drr from 171.220.242.90 port 36842
2020-07-24 03:08:22
51.91.109.220 attackbots
2020-07-23T10:22:58.033189mail.thespaminator.com sshd[26514]: Invalid user bn from 51.91.109.220 port 49616
2020-07-23T10:23:02.337186mail.thespaminator.com sshd[26514]: Failed password for invalid user bn from 51.91.109.220 port 49616 ssh2
...
2020-07-24 03:19:12
190.66.3.92 attack
2020-07-23T18:46:21.037400shield sshd\[24734\]: Invalid user linux from 190.66.3.92 port 47132
2020-07-23T18:46:21.043744shield sshd\[24734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.66.3.92
2020-07-23T18:46:22.946424shield sshd\[24734\]: Failed password for invalid user linux from 190.66.3.92 port 47132 ssh2
2020-07-23T18:56:03.904141shield sshd\[27540\]: Invalid user hahn from 190.66.3.92 port 60888
2020-07-23T18:56:03.910829shield sshd\[27540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.66.3.92
2020-07-24 03:24:50
49.233.180.38 attackbotsspam
SSH Brute-Forcing (server2)
2020-07-24 03:21:04
80.241.44.238 attackspam
2020-07-23 21:03:02,788 fail2ban.actions: WARNING [ssh] Ban 80.241.44.238
2020-07-24 03:34:47
64.225.64.215 attackspam
Jul 23 16:33:58 h2427292 sshd\[28982\]: Invalid user sdtdserver from 64.225.64.215
Jul 23 16:34:00 h2427292 sshd\[28982\]: Failed password for invalid user sdtdserver from 64.225.64.215 port 50492 ssh2
Jul 23 16:43:21 h2427292 sshd\[4518\]: Invalid user rd from 64.225.64.215
...
2020-07-24 03:35:13
118.24.82.81 attack
Jul 23 20:44:20 *hidden* sshd[56678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.82.81 Jul 23 20:44:22 *hidden* sshd[56678]: Failed password for invalid user danilo from 118.24.82.81 port 49187 ssh2 Jul 23 20:54:07 *hidden* sshd[58111]: Invalid user lyq from 118.24.82.81 port 40493
2020-07-24 03:16:04
139.198.122.19 attack
$f2bV_matches
2020-07-24 03:30:20

最近上报的IP列表

160.210.251.226 85.204.37.166 197.4.223.183 153.228.151.24
187.25.255.237 104.248.230.222 166.250.90.223 181.84.71.122
245.35.198.36 173.22.67.196 184.155.176.1 128.38.193.123
191.255.74.213 84.10.23.247 125.65.136.129 53.22.68.108
4.8.207.201 212.90.149.62 91.145.91.237 109.143.58.206