必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.99.91.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.99.91.116.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111800 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 18 20:29:29 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 116.91.99.140.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.91.99.140.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.171.160.226 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 21-09-2019 22:35:19.
2019-09-22 06:16:39
94.230.120.39 attackspam
Connection by 94.230.120.39 on port: 8000 got caught by honeypot at 9/21/2019 2:35:57 PM
2019-09-22 05:48:10
41.78.221.106 attackbots
Sep 21 21:35:48 anodpoucpklekan sshd[84621]: Invalid user mb from 41.78.221.106 port 36696
...
2019-09-22 05:51:47
45.64.11.3 attackspam
Sep 21 11:50:04 tdfoods sshd\[22668\]: Invalid user odroid from 45.64.11.3
Sep 21 11:50:04 tdfoods sshd\[22668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.11.3
Sep 21 11:50:06 tdfoods sshd\[22668\]: Failed password for invalid user odroid from 45.64.11.3 port 53450 ssh2
Sep 21 11:55:01 tdfoods sshd\[23112\]: Invalid user deutsche from 45.64.11.3
Sep 21 11:55:01 tdfoods sshd\[23112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.11.3
2019-09-22 06:00:38
51.77.137.211 attack
Sep 21 23:39:38 rotator sshd\[9236\]: Invalid user fq from 51.77.137.211Sep 21 23:39:40 rotator sshd\[9236\]: Failed password for invalid user fq from 51.77.137.211 port 49920 ssh2Sep 21 23:44:55 rotator sshd\[10027\]: Invalid user nero17 from 51.77.137.211Sep 21 23:44:57 rotator sshd\[10027\]: Failed password for invalid user nero17 from 51.77.137.211 port 49016 ssh2Sep 21 23:48:14 rotator sshd\[10805\]: Invalid user sbrown from 51.77.137.211Sep 21 23:48:16 rotator sshd\[10805\]: Failed password for invalid user sbrown from 51.77.137.211 port 33730 ssh2
...
2019-09-22 05:59:43
66.70.189.209 attackspambots
Sep 21 11:48:03 eddieflores sshd\[22592\]: Invalid user NeXT from 66.70.189.209
Sep 21 11:48:03 eddieflores sshd\[22592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.ip-66-70-189.net
Sep 21 11:48:05 eddieflores sshd\[22592\]: Failed password for invalid user NeXT from 66.70.189.209 port 49330 ssh2
Sep 21 11:52:24 eddieflores sshd\[23016\]: Invalid user arc from 66.70.189.209
Sep 21 11:52:24 eddieflores sshd\[23016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.ip-66-70-189.net
2019-09-22 06:01:50
51.38.176.147 attackspambots
2019-09-21T21:35:58.923594abusebot-6.cloudsearch.cf sshd\[21191\]: Invalid user a4abroad from 51.38.176.147 port 53941
2019-09-22 05:43:21
188.213.165.47 attackbots
Invalid user castis from 188.213.165.47 port 49292
2019-09-22 06:07:18
121.33.247.107 attack
Too many connections or unauthorized access detected from Oscar banned ip
2019-09-22 05:56:14
45.80.65.76 attack
Sep 21 23:31:14 OPSO sshd\[3825\]: Invalid user teamspeak2 from 45.80.65.76 port 53210
Sep 21 23:31:14 OPSO sshd\[3825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.76
Sep 21 23:31:17 OPSO sshd\[3825\]: Failed password for invalid user teamspeak2 from 45.80.65.76 port 53210 ssh2
Sep 21 23:35:54 OPSO sshd\[4605\]: Invalid user nobody1 from 45.80.65.76 port 37246
Sep 21 23:35:54 OPSO sshd\[4605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.76
2019-09-22 05:45:36
23.123.85.16 attackspambots
Sep 21 23:31:46 OPSO sshd\[3880\]: Invalid user webadmin from 23.123.85.16 port 47178
Sep 21 23:31:46 OPSO sshd\[3880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.123.85.16
Sep 21 23:31:48 OPSO sshd\[3880\]: Failed password for invalid user webadmin from 23.123.85.16 port 47178 ssh2
Sep 21 23:35:47 OPSO sshd\[4535\]: Invalid user rabbitmq from 23.123.85.16 port 33078
Sep 21 23:35:47 OPSO sshd\[4535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.123.85.16
2019-09-22 05:51:24
129.204.109.127 attackbotsspam
Sep 21 14:48:32 vpn01 sshd\[577\]: Invalid user login from 129.204.109.127
Sep 21 14:48:32 vpn01 sshd\[577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.109.127
Sep 21 14:48:34 vpn01 sshd\[577\]: Failed password for invalid user login from 129.204.109.127 port 35114 ssh2
2019-09-22 05:37:43
94.191.48.165 attackbotsspam
Sep 21 23:32:22 markkoudstaal sshd[882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.48.165
Sep 21 23:32:24 markkoudstaal sshd[882]: Failed password for invalid user etownsley from 94.191.48.165 port 36646 ssh2
Sep 21 23:35:54 markkoudstaal sshd[1169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.48.165
2019-09-22 05:48:23
106.241.16.119 attackspambots
Invalid user rfielding from 106.241.16.119 port 48528
2019-09-22 06:03:18
128.199.108.108 attackbotsspam
Sep 21 23:26:41 vps691689 sshd[28869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.108.108
Sep 21 23:26:43 vps691689 sshd[28869]: Failed password for invalid user devteam from 128.199.108.108 port 55524 ssh2
...
2019-09-22 05:37:22

最近上报的IP列表

5.192.102.126 6.143.124.91 230.183.200.57 70.242.41.113
127.180.225.46 176.63.27.168 200.121.27.40 94.63.67.17
191.56.92.92 87.205.74.139 103.123.98.91 169.116.65.200
103.220.38.230 50.119.15.58 62.9.94.85 99.62.210.157
240.185.57.196 67.186.107.62 6.103.237.22 187.178.66.197