必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.140.108.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.140.108.215.		IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 05:31:30 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 215.108.140.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.108.140.159.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.122.42.244 attack
Sep 11 22:45:35 sshgateway sshd\[26487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.42.244  user=root
Sep 11 22:45:37 sshgateway sshd\[26487\]: Failed password for root from 182.122.42.244 port 39034 ssh2
Sep 11 22:51:24 sshgateway sshd\[27572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.42.244  user=root
2020-09-13 00:18:23
115.99.186.91 attackbots
DATE:2020-09-11 18:51:26, IP:115.99.186.91, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-13 00:39:00
49.249.239.198 attack
...
2020-09-13 00:31:03
138.197.151.177 attackspambots
138.197.151.177 - - [11/Sep/2020:18:52:57 +0200] "HEAD / HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
2020-09-13 00:24:57
185.39.11.105 attack
 TCP (SYN) 185.39.11.105:56780 -> port 81, len 44
2020-09-13 00:42:39
45.129.33.16 attack
 TCP (SYN) 45.129.33.16:44771 -> port 17832, len 44
2020-09-13 00:44:17
179.84.140.196 attackspam
(sshd) Failed SSH login from 179.84.140.196 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 11 12:53:05 server2 sshd[23980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.84.140.196  user=root
Sep 11 12:53:07 server2 sshd[23980]: Failed password for root from 179.84.140.196 port 26418 ssh2
Sep 11 12:53:09 server2 sshd[24014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.84.140.196  user=root
Sep 11 12:53:10 server2 sshd[24014]: Failed password for root from 179.84.140.196 port 26419 ssh2
Sep 11 12:53:14 server2 sshd[24599]: Invalid user ubnt from 179.84.140.196
2020-09-13 00:16:37
206.189.198.237 attack
SSH Login Bruteforce
2020-09-13 00:41:05
152.136.105.190 attackbotsspam
Sep 12 05:51:49 web1 sshd\[32725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.105.190  user=root
Sep 12 05:51:51 web1 sshd\[32725\]: Failed password for root from 152.136.105.190 port 50284 ssh2
Sep 12 05:55:01 web1 sshd\[521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.105.190  user=root
Sep 12 05:55:02 web1 sshd\[521\]: Failed password for root from 152.136.105.190 port 54654 ssh2
Sep 12 05:58:10 web1 sshd\[770\]: Invalid user jenkins from 152.136.105.190
Sep 12 05:58:10 web1 sshd\[770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.105.190
2020-09-13 00:11:50
45.95.168.118 attackspam
[f2b] sshd bruteforce, retries: 1
2020-09-13 00:20:37
212.237.42.236 attack
6x Failed Password
2020-09-13 00:06:04
64.225.25.59 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-13 00:44:41
51.83.45.65 attackbots
51.83.45.65 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 12 17:10:44 server sshd[10554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.188.20.5  user=root
Sep 12 17:10:46 server sshd[10554]: Failed password for root from 118.188.20.5 port 59112 ssh2
Sep 12 17:09:29 server sshd[10260]: Failed password for root from 80.245.106.242 port 47732 ssh2
Sep 12 17:27:55 server sshd[12817]: Failed password for root from 51.83.45.65 port 45548 ssh2
Sep 12 17:19:12 server sshd[11722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.144  user=root
Sep 12 17:19:14 server sshd[11722]: Failed password for root from 106.12.181.144 port 56750 ssh2

IP Addresses Blocked:

118.188.20.5 (CN/China/-)
80.245.106.242 (HK/Hong Kong/-)
2020-09-13 00:28:34
182.75.139.26 attackspam
5x Failed Password
2020-09-13 00:47:59
42.233.250.167 attack
Sep 12 17:50:16 fhem-rasp sshd[10855]: User games from 42.233.250.167 not allowed because not listed in AllowUsers
...
2020-09-13 00:29:20

最近上报的IP列表

109.110.173.166 159.140.56.160 159.140.127.193 159.14.43.137
159.14.177.187 159.14.77.90 159.138.91.51 159.138.89.213
159.139.179.218 159.14.81.166 159.138.156.123 159.14.15.241
159.138.125.29 159.138.13.121 159.139.4.30 159.139.225.126
159.138.130.63 159.138.94.93 159.139.207.179 159.139.119.178