必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Internet Service Provider

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
183.81.157.226 attack
Unauthorized connection attempt from IP address 183.81.157.226 on Port 445(SMB)
2020-04-01 19:39:45
183.81.157.132 attackspam
Sent mail to address hacked/leaked from Dailymotion
2019-08-18 19:01:03
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 183.81.157.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2639
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;183.81.157.140.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Mar 31 16:40:11 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
140.157.81.183.in-addr.arpa domain name pointer 140.sub-157-81-183.hanastar.net.id.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
140.157.81.183.in-addr.arpa	name = 140.sub-157-81-183.hanastar.net.id.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.219.171.43 attack
Dovecot Invalid User Login Attempt.
2020-09-11 00:04:02
106.12.45.110 attackbots
Sep 10 10:17:48 vps46666688 sshd[19570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.45.110
Sep 10 10:17:49 vps46666688 sshd[19570]: Failed password for invalid user gentry from 106.12.45.110 port 58934 ssh2
...
2020-09-10 23:56:32
5.253.27.243 attack
prod6
...
2020-09-10 23:45:55
51.38.189.181 attackbotsspam
(sshd) Failed SSH login from 51.38.189.181 (FR/France/181.ip-51-38-189.eu): 5 in the last 3600 secs
2020-09-10 23:44:11
40.83.100.166 attack
Sep 10 17:58:16 vserver sshd\[6094\]: Invalid user oracle from 40.83.100.166Sep 10 17:58:18 vserver sshd\[6094\]: Failed password for invalid user oracle from 40.83.100.166 port 59722 ssh2Sep 10 17:58:23 vserver sshd\[6097\]: Failed password for root from 40.83.100.166 port 60100 ssh2Sep 10 17:58:26 vserver sshd\[6099\]: Invalid user jenkins from 40.83.100.166
...
2020-09-11 00:17:33
218.31.99.30 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-09-10 23:56:02
101.83.34.147 attackbots
$f2bV_matches
2020-09-11 00:02:38
194.61.24.177 attackbotsspam
 TCP (SYN) 194.61.24.177:32894 -> port 22, len 52
2020-09-11 00:16:23
161.35.236.158 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-11 00:04:50
13.127.155.164 attack
Automatic report - XMLRPC Attack
2020-09-11 00:10:11
34.94.247.253 attackspam
34.94.247.253 - - [10/Sep/2020:11:35:10 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.94.247.253 - - [10/Sep/2020:11:35:11 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.94.247.253 - - [10/Sep/2020:11:35:13 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-10 23:31:18
80.82.70.214 attackspambots
(pop3d) Failed POP3 login from 80.82.70.214 (SC/Seychelles/no-reverse-dns-configured.com): 10 in the last 300 secs
2020-09-11 00:18:54
194.180.224.115 attackspam
SSH Brute Force
2020-09-11 00:03:41
217.229.25.241 attack
Chat Spam
2020-09-11 00:00:19
51.91.247.125 attackbotsspam
SmallBizIT.US 6 packets to tcp(137,1521,5984,8140,9151,9444)
2020-09-11 00:20:25

最近上报的IP列表

185.75.5.158 182.48.75.214 181.225.98.32 179.42.224.42
179.42.197.237 178.217.31.229 178.69.224.187 178.47.142.178
176.197.236.214 176.103.73.74 175.107.202.80 168.181.178.129
168.167.50.203 155.12.58.70 122.116.253.81 94.8.139.251
85.185.149.28 36.67.220.41 213.230.112.46 200.105.199.164