必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.82.112.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.82.112.30.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:14:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
30.112.82.140.in-addr.arpa domain name pointer lb-140-82-112-30-iad.github.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.112.82.140.in-addr.arpa	name = lb-140-82-112-30-iad.github.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.137 attack
May 22 01:45:50 NPSTNNYC01T sshd[551]: Failed password for root from 222.186.42.137 port 18098 ssh2
May 22 01:45:59 NPSTNNYC01T sshd[557]: Failed password for root from 222.186.42.137 port 58911 ssh2
May 22 01:46:01 NPSTNNYC01T sshd[557]: Failed password for root from 222.186.42.137 port 58911 ssh2
...
2020-05-22 13:48:40
165.22.70.101 attackbots
Port scan denied
2020-05-22 13:50:01
103.89.85.41 attack
May 22 08:02:31 pkdns2 sshd\[36513\]: Invalid user msa from 103.89.85.41May 22 08:02:33 pkdns2 sshd\[36513\]: Failed password for invalid user msa from 103.89.85.41 port 41808 ssh2May 22 08:06:31 pkdns2 sshd\[36676\]: Invalid user qkj from 103.89.85.41May 22 08:06:33 pkdns2 sshd\[36676\]: Failed password for invalid user qkj from 103.89.85.41 port 37388 ssh2May 22 08:10:34 pkdns2 sshd\[36843\]: Invalid user pob from 103.89.85.41May 22 08:10:35 pkdns2 sshd\[36843\]: Failed password for invalid user pob from 103.89.85.41 port 32978 ssh2
...
2020-05-22 14:06:55
42.118.204.112 attack
May 22 06:39:48 debian-2gb-nbg1-2 kernel: \[12381207.050075\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=42.118.204.112 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=18930 PROTO=TCP SPT=2691 DPT=23 WINDOW=4507 RES=0x00 SYN URGP=0
2020-05-22 13:56:40
122.116.156.165 attackspambots
[MK-VM4] Blocked by UFW
2020-05-22 14:18:11
49.233.70.228 attackspam
$f2bV_matches
2020-05-22 13:43:43
45.95.168.175 attackbots
May 22 05:56:42 server-01 sshd[17884]: Invalid user admin from 45.95.168.175 port 57362
May 22 05:56:43 server-01 sshd[17886]: Invalid user admin from 45.95.168.175 port 57758
May 22 05:56:43 server-01 sshd[17888]: Invalid user ubuntu from 45.95.168.175 port 58152
...
2020-05-22 13:59:29
195.54.167.9 attack
May 22 07:14:34 debian-2gb-nbg1-2 kernel: \[12383293.204596\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.9 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=12074 PROTO=TCP SPT=52666 DPT=43849 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-22 13:51:45
111.229.57.3 attackbotsspam
May 22 07:59:31 nextcloud sshd\[24952\]: Invalid user cln from 111.229.57.3
May 22 07:59:31 nextcloud sshd\[24952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.57.3
May 22 07:59:32 nextcloud sshd\[24952\]: Failed password for invalid user cln from 111.229.57.3 port 57338 ssh2
2020-05-22 14:10:47
134.175.129.58 attack
Invalid user jcs from 134.175.129.58 port 36997
2020-05-22 14:20:50
49.234.182.55 attack
May 22 06:14:44 h2779839 sshd[26387]: Invalid user tfb from 49.234.182.55 port 33674
May 22 06:14:44 h2779839 sshd[26387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.182.55
May 22 06:14:44 h2779839 sshd[26387]: Invalid user tfb from 49.234.182.55 port 33674
May 22 06:14:46 h2779839 sshd[26387]: Failed password for invalid user tfb from 49.234.182.55 port 33674 ssh2
May 22 06:19:14 h2779839 sshd[26440]: Invalid user bqe from 49.234.182.55 port 58262
May 22 06:19:14 h2779839 sshd[26440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.182.55
May 22 06:19:14 h2779839 sshd[26440]: Invalid user bqe from 49.234.182.55 port 58262
May 22 06:19:16 h2779839 sshd[26440]: Failed password for invalid user bqe from 49.234.182.55 port 58262 ssh2
May 22 06:23:53 h2779839 sshd[26498]: Invalid user gao from 49.234.182.55 port 54618
...
2020-05-22 14:12:42
111.231.94.138 attackspambots
May 22 08:06:40 ns382633 sshd\[29961\]: Invalid user sbv from 111.231.94.138 port 35466
May 22 08:06:40 ns382633 sshd\[29961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.94.138
May 22 08:06:42 ns382633 sshd\[29961\]: Failed password for invalid user sbv from 111.231.94.138 port 35466 ssh2
May 22 08:13:40 ns382633 sshd\[31222\]: Invalid user ofa from 111.231.94.138 port 47642
May 22 08:13:40 ns382633 sshd\[31222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.94.138
2020-05-22 14:14:52
51.68.72.174 attackspambots
Port scan on 2 port(s): 139 445
2020-05-22 14:21:43
5.135.164.201 attack
2020-05-22T08:57:35.790127afi-git.jinr.ru sshd[29331]: Invalid user eqj from 5.135.164.201 port 38298
2020-05-22T08:57:35.793472afi-git.jinr.ru sshd[29331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3317498.ip-5-135-164.eu
2020-05-22T08:57:35.790127afi-git.jinr.ru sshd[29331]: Invalid user eqj from 5.135.164.201 port 38298
2020-05-22T08:57:38.390811afi-git.jinr.ru sshd[29331]: Failed password for invalid user eqj from 5.135.164.201 port 38298 ssh2
2020-05-22T09:00:52.759812afi-git.jinr.ru sshd[30229]: Invalid user wnr from 5.135.164.201 port 43500
...
2020-05-22 14:04:21
110.43.50.203 attackbots
May 22 07:55:06 server sshd[58332]: Failed password for invalid user ucu from 110.43.50.203 port 34274 ssh2
May 22 08:01:02 server sshd[63440]: Failed password for invalid user tlz from 110.43.50.203 port 64755 ssh2
May 22 08:04:52 server sshd[1358]: Failed password for invalid user ajk from 110.43.50.203 port 22532 ssh2
2020-05-22 14:22:40

最近上报的IP列表

140.82.113.29 140.82.10.52 140.82.113.30 140.78.3.160
140.82.114.29 140.82.113.3 140.82.114.30 140.82.12.116
140.82.15.127 140.82.15.116 140.82.13.249 140.82.15.224
140.82.19.106 140.82.169.31 140.82.21.59 140.82.2.201
140.82.169.36 140.82.4.69 140.82.22.76 140.82.19.171