必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.120.198.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.120.198.140.		IN	A

;; AUTHORITY SECTION:
.			336	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 06:23:01 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 140.198.120.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.198.120.159.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.245.34.59 attack
Port scan: Attack repeated for 24 hours
2020-06-08 01:13:37
78.8.160.171 attack
Jun  5 16:04:50 mail.srvfarm.net postfix/smtps/smtpd[3115649]: warning: unknown[78.8.160.171]: SASL PLAIN authentication failed: 
Jun  5 16:04:50 mail.srvfarm.net postfix/smtps/smtpd[3115649]: lost connection after AUTH from unknown[78.8.160.171]
Jun  5 16:05:15 mail.srvfarm.net postfix/smtps/smtpd[3115650]: warning: unknown[78.8.160.171]: SASL PLAIN authentication failed: 
Jun  5 16:05:15 mail.srvfarm.net postfix/smtps/smtpd[3115650]: lost connection after AUTH from unknown[78.8.160.171]
Jun  5 16:06:18 mail.srvfarm.net postfix/smtpd[3114094]: warning: unknown[78.8.160.171]: SASL PLAIN authentication failed:
2020-06-08 00:52:37
85.239.35.161 attack
Jun  7 19:23:49 server2 sshd\[5795\]: Invalid user  from 85.239.35.161
Jun  7 19:23:50 server2 sshd\[5794\]: Invalid user  from 85.239.35.161
Jun  7 19:23:55 server2 sshd\[5798\]: Invalid user  from 85.239.35.161
Jun  7 19:23:55 server2 sshd\[5799\]: Invalid user admin from 85.239.35.161
Jun  7 19:23:57 server2 sshd\[5817\]: Invalid user user from 85.239.35.161
Jun  7 19:23:58 server2 sshd\[5797\]: Invalid user admin from 85.239.35.161
2020-06-08 00:37:07
142.93.226.80 attackbotsspam
ssh brute force
2020-06-08 00:31:48
45.162.21.217 attackbots
Jun  5 15:47:04 mail.srvfarm.net postfix/smtpd[3113570]: warning: unknown[45.162.21.217]: SASL PLAIN authentication failed: 
Jun  5 15:47:05 mail.srvfarm.net postfix/smtpd[3113570]: lost connection after AUTH from unknown[45.162.21.217]
Jun  5 15:49:32 mail.srvfarm.net postfix/smtpd[3113438]: warning: unknown[45.162.21.217]: SASL PLAIN authentication failed: 
Jun  5 15:49:32 mail.srvfarm.net postfix/smtpd[3113438]: lost connection after AUTH from unknown[45.162.21.217]
Jun  5 15:51:14 mail.srvfarm.net postfix/smtps/smtpd[3115646]: warning: unknown[45.162.21.217]: SASL PLAIN authentication failed:
2020-06-08 00:55:08
92.63.196.3 attackbotsspam
[MK-VM5] Blocked by UFW
2020-06-08 00:37:44
94.25.171.5 attackspambots
Jun  5 15:17:19 web02.srvfarm.net pure-ftpd: (?@94.25.171.5) [WARNING] Authentication failed for user [admin]
Jun  5 15:17:26 web02.srvfarm.net pure-ftpd: (?@94.25.171.5) [WARNING] Authentication failed for user [admin]
Jun  5 15:17:33 web02.srvfarm.net pure-ftpd: (?@94.25.171.5) [WARNING] Authentication failed for user [admin]
Jun  5 15:17:41 web02.srvfarm.net pure-ftpd: (?@94.25.171.5) [WARNING] Authentication failed for user [admin]
Jun  5 15:17:46 web02.srvfarm.net pure-ftpd: (?@94.25.171.5) [WARNING] Authentication failed for user [admin]
2020-06-08 01:01:11
183.83.78.180 attack
Jun  7 16:49:09 Ubuntu-1404-trusty-64-minimal sshd\[20280\]: Invalid user admin from 183.83.78.180
Jun  7 16:49:09 Ubuntu-1404-trusty-64-minimal sshd\[20280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.83.78.180
Jun  7 16:49:11 Ubuntu-1404-trusty-64-minimal sshd\[20280\]: Failed password for invalid user admin from 183.83.78.180 port 37045 ssh2
Jun  7 18:09:35 Ubuntu-1404-trusty-64-minimal sshd\[3134\]: Invalid user admin from 183.83.78.180
Jun  7 18:09:35 Ubuntu-1404-trusty-64-minimal sshd\[3134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.83.78.180
2020-06-08 01:14:31
117.50.40.157 attack
Jun  7 15:11:58 home sshd[30941]: Failed password for root from 117.50.40.157 port 56530 ssh2
Jun  7 15:15:43 home sshd[31293]: Failed password for root from 117.50.40.157 port 38882 ssh2
...
2020-06-08 01:03:22
167.71.209.2 attackbotsspam
Jun  7 11:44:35 ws22vmsma01 sshd[101305]: Failed password for root from 167.71.209.2 port 56506 ssh2
...
2020-06-08 00:38:44
91.205.128.170 attack
Jun  7 03:11:00 php1 sshd\[5557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.128.170  user=root
Jun  7 03:11:02 php1 sshd\[5557\]: Failed password for root from 91.205.128.170 port 57522 ssh2
Jun  7 03:14:41 php1 sshd\[5821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.128.170  user=root
Jun  7 03:14:43 php1 sshd\[5821\]: Failed password for root from 91.205.128.170 port 60432 ssh2
Jun  7 03:18:23 php1 sshd\[6095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.128.170  user=root
2020-06-08 01:07:36
111.229.31.144 attack
Jun  7 18:31:23 fhem-rasp sshd[3420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.31.144  user=root
Jun  7 18:31:25 fhem-rasp sshd[3420]: Failed password for root from 111.229.31.144 port 54358 ssh2
...
2020-06-08 00:36:34
185.124.184.176 attackspambots
Jun  5 15:15:27 mail.srvfarm.net postfix/smtpd[3095777]: warning: unknown[185.124.184.176]: SASL PLAIN authentication failed: 
Jun  5 15:15:27 mail.srvfarm.net postfix/smtpd[3095777]: lost connection after AUTH from unknown[185.124.184.176]
Jun  5 15:22:11 mail.srvfarm.net postfix/smtps/smtpd[3108780]: warning: unknown[185.124.184.176]: SASL PLAIN authentication failed: 
Jun  5 15:22:11 mail.srvfarm.net postfix/smtps/smtpd[3108780]: lost connection after AUTH from unknown[185.124.184.176]
Jun  5 15:24:54 mail.srvfarm.net postfix/smtps/smtpd[3109500]: warning: unknown[185.124.184.176]: SASL PLAIN authentication failed:
2020-06-08 00:58:39
113.200.60.74 attackbots
2020-06-07T12:31:29.545152abusebot-7.cloudsearch.cf sshd[25981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74  user=root
2020-06-07T12:31:31.455925abusebot-7.cloudsearch.cf sshd[25981]: Failed password for root from 113.200.60.74 port 35305 ssh2
2020-06-07T12:34:26.868647abusebot-7.cloudsearch.cf sshd[26237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74  user=root
2020-06-07T12:34:28.744091abusebot-7.cloudsearch.cf sshd[26237]: Failed password for root from 113.200.60.74 port 54142 ssh2
2020-06-07T12:37:15.063499abusebot-7.cloudsearch.cf sshd[26447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74  user=root
2020-06-07T12:37:17.475491abusebot-7.cloudsearch.cf sshd[26447]: Failed password for root from 113.200.60.74 port 44746 ssh2
2020-06-07T12:40:03.951311abusebot-7.cloudsearch.cf sshd[26600]: pam_unix(sshd:auth): authe
...
2020-06-08 00:34:41
94.74.134.190 attackbotsspam
Jun  6 03:23:13 mail.srvfarm.net postfix/smtps/smtpd[3484883]: warning: unknown[94.74.134.190]: SASL PLAIN authentication failed: 
Jun  6 03:23:13 mail.srvfarm.net postfix/smtps/smtpd[3484883]: lost connection after AUTH from unknown[94.74.134.190]
Jun  6 03:27:01 mail.srvfarm.net postfix/smtpd[3483002]: warning: unknown[94.74.134.190]: SASL PLAIN authentication failed: 
Jun  6 03:27:01 mail.srvfarm.net postfix/smtpd[3483002]: lost connection after AUTH from unknown[94.74.134.190]
Jun  6 03:29:54 mail.srvfarm.net postfix/smtps/smtpd[3498473]: warning: unknown[94.74.134.190]: SASL PLAIN authentication failed:
2020-06-08 00:59:57

最近上报的IP列表

159.120.108.237 159.121.33.16 159.121.223.163 159.130.227.127
159.12.94.131 159.120.119.63 159.120.73.226 159.120.174.93
159.121.1.249 159.130.101.252 159.12.92.167 159.120.231.221
159.121.236.151 159.120.48.201 159.120.159.13 159.120.247.17
159.120.161.241 159.121.119.76 159.130.200.105 159.120.240.56