必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.213.140.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.213.140.12.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:52:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
12.140.213.189.in-addr.arpa domain name pointer 189-213-140-12.static.axtel.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.140.213.189.in-addr.arpa	name = 189-213-140-12.static.axtel.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.249.237.226 attackspam
Oct 16 10:54:12 php1 sshd\[20445\]: Invalid user -,0m from 49.249.237.226
Oct 16 10:54:12 php1 sshd\[20445\]: Failed password for invalid user -,0m from 49.249.237.226 port 56046 ssh2
Oct 16 10:57:28 php1 sshd\[20893\]: Invalid user worldwideweb from 49.249.237.226
Oct 16 10:57:28 php1 sshd\[20893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.237.226
Oct 16 10:57:30 php1 sshd\[20893\]: Failed password for invalid user worldwideweb from 49.249.237.226 port 39688 ssh2
2019-10-17 05:08:38
45.76.67.218 attack
Port Scan
2019-10-17 04:38:12
61.153.210.66 attackspam
DATE:2019-10-16 21:27:21, IP:61.153.210.66, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-10-17 05:11:17
80.211.169.93 attackspambots
Oct 16 23:02:40 meumeu sshd[27532]: Failed password for root from 80.211.169.93 port 36928 ssh2
Oct 16 23:06:30 meumeu sshd[28056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.169.93 
Oct 16 23:06:32 meumeu sshd[28056]: Failed password for invalid user betsy from 80.211.169.93 port 48432 ssh2
...
2019-10-17 05:09:25
117.211.69.109 attackspambots
Oct 16 22:17:16 server3 sshd[10092]: Invalid user pi from 117.211.69.109
Oct 16 22:17:16 server3 sshd[10093]: Invalid user pi from 117.211.69.109
Oct 16 22:17:16 server3 sshd[10092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.69.109
Oct 16 22:17:16 server3 sshd[10093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.69.109


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.211.69.109
2019-10-17 05:03:46
103.27.207.240 attack
Automatic report - Banned IP Access
2019-10-17 04:49:14
178.128.25.171 attackspam
Oct 16 10:44:32 hanapaa sshd\[27474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.25.171  user=root
Oct 16 10:44:34 hanapaa sshd\[27474\]: Failed password for root from 178.128.25.171 port 43376 ssh2
Oct 16 10:48:31 hanapaa sshd\[27787\]: Invalid user pos from 178.128.25.171
Oct 16 10:48:31 hanapaa sshd\[27787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.25.171
Oct 16 10:48:32 hanapaa sshd\[27787\]: Failed password for invalid user pos from 178.128.25.171 port 55028 ssh2
2019-10-17 05:02:11
80.93.187.117 attackbots
2019-10-16T20:54:50.845383mail.arvenenaske.de sshd[12487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.93.187.117  user=r.r
2019-10-16T20:54:52.487100mail.arvenenaske.de sshd[12487]: Failed password for r.r from 80.93.187.117 port 59956 ssh2
2019-10-16T20:54:55.638958mail.arvenenaske.de sshd[12489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.93.187.117  user=r.r
2019-10-16T20:54:57.636199mail.arvenenaske.de sshd[12489]: Failed password for r.r from 80.93.187.117 port 58858 ssh2
2019-10-16T20:55:01.775940mail.arvenenaske.de sshd[12491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.93.187.117  user=r.r
2019-10-16T20:55:03.261688mail.arvenenaske.de sshd[12491]: Failed password for r.r from 80.93.187.117 port 57768 ssh2
2019-10-16T20:55:08.359827mail.arvenenaske.de sshd[12493]: Invalid user r.r123 from 80.93.187.117 port 56682
2019-10-1........
------------------------------
2019-10-17 04:44:53
218.16.57.57 attackspam
Brute force attempt
2019-10-17 04:50:53
185.17.41.198 attack
Oct 16 21:28:17 MK-Soft-VM7 sshd[21271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.41.198 
Oct 16 21:28:19 MK-Soft-VM7 sshd[21271]: Failed password for invalid user buildbot from 185.17.41.198 port 34100 ssh2
...
2019-10-17 04:34:19
121.142.111.98 attackbotsspam
Oct 16 16:15:11 Tower sshd[42184]: Connection from 121.142.111.98 port 45694 on 192.168.10.220 port 22
Oct 16 16:15:27 Tower sshd[42184]: Invalid user rakesh from 121.142.111.98 port 45694
Oct 16 16:15:27 Tower sshd[42184]: error: Could not get shadow information for NOUSER
Oct 16 16:15:27 Tower sshd[42184]: Failed password for invalid user rakesh from 121.142.111.98 port 45694 ssh2
Oct 16 16:15:27 Tower sshd[42184]: Received disconnect from 121.142.111.98 port 45694:11: Bye Bye [preauth]
Oct 16 16:15:27 Tower sshd[42184]: Disconnected from invalid user rakesh 121.142.111.98 port 45694 [preauth]
2019-10-17 04:52:37
94.23.5.135 attackbotsspam
Oct 16 21:27:23 [host] sshd[7987]: Invalid user admin from 94.23.5.135
Oct 16 21:27:23 [host] sshd[7987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.5.135
Oct 16 21:27:26 [host] sshd[7987]: Failed password for invalid user admin from 94.23.5.135 port 57876 ssh2
2019-10-17 05:06:49
118.89.48.251 attackbots
Oct 16 17:30:12 firewall sshd[31869]: Invalid user passw0rd from 118.89.48.251
Oct 16 17:30:13 firewall sshd[31869]: Failed password for invalid user passw0rd from 118.89.48.251 port 55620 ssh2
Oct 16 17:34:20 firewall sshd[31947]: Invalid user 123456 from 118.89.48.251
...
2019-10-17 05:02:58
157.230.163.6 attackbots
Oct 16 22:51:56 server sshd\[9604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6  user=root
Oct 16 22:51:58 server sshd\[9604\]: Failed password for root from 157.230.163.6 port 58126 ssh2
Oct 16 23:01:52 server sshd\[12438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6  user=root
Oct 16 23:01:55 server sshd\[12438\]: Failed password for root from 157.230.163.6 port 47280 ssh2
Oct 16 23:05:34 server sshd\[13525\]: Invalid user HoloBot from 157.230.163.6
...
2019-10-17 04:35:51
222.186.180.223 attackbots
2019-10-16T22:37:44.3996471240 sshd\[16623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
2019-10-16T22:37:46.6268731240 sshd\[16623\]: Failed password for root from 222.186.180.223 port 10306 ssh2
2019-10-16T22:37:50.6135271240 sshd\[16623\]: Failed password for root from 222.186.180.223 port 10306 ssh2
...
2019-10-17 04:44:29

最近上报的IP列表

189.213.14.58 189.213.142.111 189.213.145.183 189.213.145.80
189.213.146.17 189.213.147.185 189.213.147.58 189.213.149.130
189.213.147.212 189.213.15.193 189.213.150.103 189.213.150.162
189.213.150.59 189.213.150.200 189.213.15.159 189.213.158.211
189.213.160.233 189.213.160.82 189.213.160.222 189.213.164.173