必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.140.121.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.140.121.12.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 05:25:27 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 12.121.140.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.121.140.159.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.181.223.106 attack
Unauthorized connection attempt from IP address 113.181.223.106 on Port 445(SMB)
2020-04-11 20:22:36
189.190.118.209 attack
Apr 10 19:33:05 h2570396 sshd[2222]: reveeclipse mapping checking getaddrinfo for dsl-189-190-118-209-dyn.prod-infinhostnameum.com.mx [189.190.118.209] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 10 19:33:08 h2570396 sshd[2222]: Failed password for invalid user licongcong from 189.190.118.209 port 52346 ssh2
Apr 10 19:33:08 h2570396 sshd[2222]: Received disconnect from 189.190.118.209: 11: Bye Bye [preauth]
Apr 10 19:46:16 h2570396 sshd[2385]: reveeclipse mapping checking getaddrinfo for dsl-189-190-118-209-dyn.prod-infinhostnameum.com.mx [189.190.118.209] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 10 19:46:19 h2570396 sshd[2385]: Failed password for invalid user trainer from 189.190.118.209 port 47314 ssh2
Apr 10 19:46:19 h2570396 sshd[2385]: Received disconnect from 189.190.118.209: 11: Bye Bye [preauth]
Apr 10 19:50:04 h2570396 sshd[2407]: reveeclipse mapping checking getaddrinfo for dsl-189-190-118-209-dyn.prod-infinhostnameum.com.mx [189.190.118.209] failed - POSSIBLE BRE........
-------------------------------
2020-04-11 20:08:01
52.164.203.103 attackbotsspam
Repeated RDP login failures. Last user: Postgres
2020-04-11 20:41:51
222.186.175.167 attack
Apr 11 20:45:08 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:12 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:16 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:16 bacztwo sshd[9602]: Failed keyboard-interactive/pam for root from 222.186.175.167 port 3110 ssh2
Apr 11 20:45:05 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:08 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:12 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:16 bacztwo sshd[9602]: error: PAM: Authentication failure for root from 222.186.175.167
Apr 11 20:45:16 bacztwo sshd[9602]: Failed keyboard-interactive/pam for root from 222.186.175.167 port 3110 ssh2
Apr 11 20:45:19 bacztwo sshd[9602]: error: PAM: Authentication fail
...
2020-04-11 20:52:38
113.125.98.206 attackspambots
Apr 11 14:07:19 ncomp sshd[8695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.98.206  user=root
Apr 11 14:07:21 ncomp sshd[8695]: Failed password for root from 113.125.98.206 port 37298 ssh2
Apr 11 14:20:36 ncomp sshd[9164]: Invalid user chris from 113.125.98.206
2020-04-11 20:53:02
212.144.5.186 attack
Apr 11 08:11:35 ny01 sshd[3235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.144.5.186
Apr 11 08:11:37 ny01 sshd[3235]: Failed password for invalid user nilam from 212.144.5.186 port 28148 ssh2
Apr 11 08:20:36 ny01 sshd[4325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.144.5.186
2020-04-11 20:53:30
51.77.226.68 attackbotsspam
Invalid user smbguest from 51.77.226.68 port 52980
2020-04-11 20:08:55
217.19.154.220 attackbotsspam
Apr 11 12:31:14 game-panel sshd[31941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.19.154.220
Apr 11 12:31:15 game-panel sshd[31941]: Failed password for invalid user trnec from 217.19.154.220 port 16340 ssh2
Apr 11 12:36:27 game-panel sshd[32189]: Failed password for root from 217.19.154.220 port 38667 ssh2
2020-04-11 20:40:12
39.40.49.72 attackspam
Apr 11 14:17:45 pl3server sshd[18305]: Invalid user oracle from 39.40.49.72
Apr 11 14:17:46 pl3server sshd[18305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.40.49.72
Apr 11 14:17:47 pl3server sshd[18305]: Failed password for invalid user oracle from 39.40.49.72 port 56387 ssh2
Apr 11 14:17:47 pl3server sshd[18305]: Connection closed by 39.40.49.72 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.40.49.72
2020-04-11 20:40:37
54.36.120.185 attackspambots
Automatic report - Port Scan Attack
2020-04-11 20:46:32
70.63.28.34 attackspambots
2020-04-11T12:17:02.049561abusebot.cloudsearch.cf sshd[18553]: Invalid user princess from 70.63.28.34 port 52800
2020-04-11T12:17:02.058155abusebot.cloudsearch.cf sshd[18553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-70-63-28-34.central.biz.rr.com
2020-04-11T12:17:02.049561abusebot.cloudsearch.cf sshd[18553]: Invalid user princess from 70.63.28.34 port 52800
2020-04-11T12:17:04.349510abusebot.cloudsearch.cf sshd[18553]: Failed password for invalid user princess from 70.63.28.34 port 52800 ssh2
2020-04-11T12:24:49.467924abusebot.cloudsearch.cf sshd[19074]: Invalid user jeremy from 70.63.28.34 port 53838
2020-04-11T12:24:49.475987abusebot.cloudsearch.cf sshd[19074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-70-63-28-34.central.biz.rr.com
2020-04-11T12:24:49.467924abusebot.cloudsearch.cf sshd[19074]: Invalid user jeremy from 70.63.28.34 port 53838
2020-04-11T12:24:51.211286abusebot.cloud
...
2020-04-11 20:30:00
54.37.151.239 attackspam
SSH Brute-Force reported by Fail2Ban
2020-04-11 20:18:17
51.91.79.232 attack
Apr 11 14:19:10 srv206 sshd[6787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-51-91-79.eu  user=root
Apr 11 14:19:11 srv206 sshd[6787]: Failed password for root from 51.91.79.232 port 42226 ssh2
Apr 11 14:24:38 srv206 sshd[6827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-51-91-79.eu  user=root
Apr 11 14:24:40 srv206 sshd[6827]: Failed password for root from 51.91.79.232 port 41066 ssh2
...
2020-04-11 20:25:17
14.29.251.33 attackbots
SSH Bruteforce attack
2020-04-11 20:24:04
117.160.141.43 attackbots
Apr 11 19:12:39 itv-usvr-01 sshd[12350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.160.141.43  user=root
Apr 11 19:12:41 itv-usvr-01 sshd[12350]: Failed password for root from 117.160.141.43 port 37782 ssh2
Apr 11 19:16:39 itv-usvr-01 sshd[12518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.160.141.43  user=root
Apr 11 19:16:42 itv-usvr-01 sshd[12518]: Failed password for root from 117.160.141.43 port 57497 ssh2
Apr 11 19:20:36 itv-usvr-01 sshd[12639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.160.141.43  user=root
Apr 11 19:20:39 itv-usvr-01 sshd[12639]: Failed password for root from 117.160.141.43 port 22959 ssh2
2020-04-11 20:49:46

最近上报的IP列表

159.139.66.70 159.139.35.79 159.143.169.129 159.14.229.78
159.139.221.212 159.140.134.235 159.139.237.120 159.14.21.92
159.14.73.118 159.142.179.16 159.139.95.136 159.140.152.117
159.138.51.199 159.139.28.182 159.14.175.133 159.145.103.35
159.14.154.169 159.14.36.120 159.14.250.128 159.14.139.231