必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.196.137.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;178.196.137.140.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 23:50:48 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
140.137.196.178.in-addr.arpa domain name pointer 140.137.196.178.dynamic.cust.swisscom.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.137.196.178.in-addr.arpa	name = 140.137.196.178.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.5.48 attackspam
Jun  7 21:18:40 ns sshd[32570]: Connection from 106.12.5.48 port 60184 on 134.119.36.27 port 22
Jun  7 21:18:43 ns sshd[32570]: User r.r from 106.12.5.48 not allowed because not listed in AllowUsers
Jun  7 21:18:43 ns sshd[32570]: Failed password for invalid user r.r from 106.12.5.48 port 60184 ssh2
Jun  7 21:18:44 ns sshd[32570]: Received disconnect from 106.12.5.48 port 60184:11: Bye Bye [preauth]
Jun  7 21:18:44 ns sshd[32570]: Disconnected from 106.12.5.48 port 60184 [preauth]
Jun  7 21:33:17 ns sshd[26781]: Connection from 106.12.5.48 port 41362 on 134.119.36.27 port 22
Jun  7 21:33:21 ns sshd[26781]: User r.r from 106.12.5.48 not allowed because not listed in AllowUsers
Jun  7 21:33:21 ns sshd[26781]: Failed password for invalid user r.r from 106.12.5.48 port 41362 ssh2
Jun  7 21:33:21 ns sshd[26781]: Received disconnect from 106.12.5.48 port 41362:11: Bye Bye [preauth]
Jun  7 21:33:21 ns sshd[26781]: Disconnected from 106.12.5.48 port 41362 [preauth]
Jun  7 21:37........
-------------------------------
2020-06-08 08:34:39
51.178.41.60 attack
Jun  8 08:52:10 gw1 sshd[30224]: Failed password for root from 51.178.41.60 port 37069 ssh2
...
2020-06-08 12:16:54
189.213.162.85 attackbots
23/tcp 23/tcp 23/tcp...
[2020-06-08]4pkt,1pt.(tcp)
2020-06-08 12:08:47
148.70.154.10 attackspambots
Jun  8 06:08:24 piServer sshd[7013]: Failed password for root from 148.70.154.10 port 60268 ssh2
Jun  8 06:12:31 piServer sshd[7498]: Failed password for root from 148.70.154.10 port 34264 ssh2
...
2020-06-08 12:21:42
37.49.226.181 attack
Triggered by Fail2Ban at Ares web server
2020-06-08 12:22:35
79.124.62.86 attackbots
06/07/2020-20:14:51.005838 79.124.62.86 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-08 08:33:07
39.42.2.123 attack
Automatic report - Port Scan Attack
2020-06-08 12:21:19
61.5.36.72 attack
445/tcp
[2020-06-08]1pkt
2020-06-08 12:25:21
222.186.31.166 attackbots
06/07/2020-20:31:39.165166 222.186.31.166 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-08 08:35:31
146.56.6.114 attackbots
08.06.2020 05:55:34 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-06-08 12:03:27
118.69.182.145 attackspam
445/tcp
[2020-06-08]1pkt
2020-06-08 12:14:51
113.174.56.196 attack
8080/tcp
[2020-06-08]1pkt
2020-06-08 12:09:57
139.59.10.121 attackspam
139.59.10.121 - - [08/Jun/2020:05:55:09 +0200] "GET /wp-login.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.10.121 - - [08/Jun/2020:05:55:10 +0200] "GET /wp-login.php HTTP/1.1" 404 56 "http://sys.netpixeldesign.net/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-08 12:25:36
222.211.143.236 attack
445/tcp
[2020-06-08]1pkt
2020-06-08 12:23:33
222.186.30.112 attackspam
Jun  8 06:26:07 abendstille sshd\[15096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Jun  8 06:26:09 abendstille sshd\[15096\]: Failed password for root from 222.186.30.112 port 64340 ssh2
Jun  8 06:26:12 abendstille sshd\[15096\]: Failed password for root from 222.186.30.112 port 64340 ssh2
Jun  8 06:26:14 abendstille sshd\[15096\]: Failed password for root from 222.186.30.112 port 64340 ssh2
Jun  8 06:26:16 abendstille sshd\[15327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
...
2020-06-08 12:27:30

最近上报的IP列表

148.95.183.204 203.80.183.189 135.205.68.49 106.81.25.103
55.153.238.5 130.224.205.1 181.49.6.63 47.196.193.116
130.0.189.38 88.9.29.242 162.95.17.5 130.215.67.45
133.224.72.216 244.249.7.19 157.110.203.186 50.90.116.96
81.144.20.27 47.131.27.134 126.174.54.252 19.238.38.139