必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Türkiye

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.140.144.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.140.144.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:44:29 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
5.144.140.193.in-addr.arpa domain name pointer v005-hastane-otomasyon.cumhuriyet.edu.tr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.144.140.193.in-addr.arpa	name = v005-hastane-otomasyon.cumhuriyet.edu.tr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
137.74.100.41 attackspambots
Jun  1 23:32:56 lamijardin sshd[29330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.100.41  user=r.r
Jun  1 23:32:59 lamijardin sshd[29330]: Failed password for r.r from 137.74.100.41 port 50734 ssh2
Jun  1 23:32:59 lamijardin sshd[29330]: Received disconnect from 137.74.100.41 port 50734:11: Bye Bye [preauth]
Jun  1 23:32:59 lamijardin sshd[29330]: Disconnected from 137.74.100.41 port 50734 [preauth]
Jun  1 23:42:00 lamijardin sshd[29417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.100.41  user=r.r
Jun  1 23:42:02 lamijardin sshd[29417]: Failed password for r.r from 137.74.100.41 port 38800 ssh2
Jun  1 23:42:02 lamijardin sshd[29417]: Received disconnect from 137.74.100.41 port 38800:11: Bye Bye [preauth]
Jun  1 23:42:02 lamijardin sshd[29417]: Disconnected from 137.74.100.41 port 38800 [preauth]
Jun  1 23:45:23 lamijardin sshd[29463]: pam_unix(sshd:auth): authenticat........
-------------------------------
2020-06-04 21:06:39
222.186.169.192 attack
2020-06-04T15:05:14.204278vps751288.ovh.net sshd\[13167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-06-04T15:05:16.136006vps751288.ovh.net sshd\[13167\]: Failed password for root from 222.186.169.192 port 15334 ssh2
2020-06-04T15:05:19.067517vps751288.ovh.net sshd\[13167\]: Failed password for root from 222.186.169.192 port 15334 ssh2
2020-06-04T15:05:22.933462vps751288.ovh.net sshd\[13167\]: Failed password for root from 222.186.169.192 port 15334 ssh2
2020-06-04T15:05:25.825826vps751288.ovh.net sshd\[13167\]: Failed password for root from 222.186.169.192 port 15334 ssh2
2020-06-04 21:07:30
220.134.129.176 attack
Unauthorised access (Jun  4) SRC=220.134.129.176 LEN=40 TTL=44 ID=50513 TCP DPT=8080 WINDOW=55328 SYN
2020-06-04 21:17:30
196.1.203.158 attackspambots
20/6/4@08:29:04: FAIL: Alarm-Network address from=196.1.203.158
...
2020-06-04 21:10:56
95.138.169.136 attackbots
Jun  2 07:09:20 UTC__SANYALnet-Labs__cac14 sshd[20533]: Connection from 95.138.169.136 port 60184 on 64.137.176.112 port 22
Jun  2 07:09:20 UTC__SANYALnet-Labs__cac14 sshd[20533]: User r.r from 95.138.169.136 not allowed because not listed in AllowUsers
Jun  2 07:09:20 UTC__SANYALnet-Labs__cac14 sshd[20533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.138.169.136  user=r.r
Jun  2 07:09:22 UTC__SANYALnet-Labs__cac14 sshd[20533]: Failed password for invalid user r.r from 95.138.169.136 port 60184 ssh2
Jun  2 07:09:23 UTC__SANYALnet-Labs__cac14 sshd[20533]: Received disconnect from 95.138.169.136: 11: Bye Bye [preauth]
Jun  2 07:24:03 UTC__SANYALnet-Labs__cac14 sshd[23001]: Connection from 95.138.169.136 port 51318 on 64.137.176.112 port 22
Jun  2 07:24:04 UTC__SANYALnet-Labs__cac14 sshd[23001]: User r.r from 95.138.169.136 not allowed because not listed in AllowUsers
Jun  2 07:24:04 UTC__SANYALnet-Labs__cac14 sshd[23001]: pam........
-------------------------------
2020-06-04 21:41:59
185.56.153.236 attackbots
Jun  4 14:58:14 eventyay sshd[27504]: Failed password for root from 185.56.153.236 port 34316 ssh2
Jun  4 15:01:58 eventyay sshd[27743]: Failed password for root from 185.56.153.236 port 45748 ssh2
...
2020-06-04 21:17:46
159.65.154.48 attack
Jun  4 15:12:33 minden010 sshd[3411]: Failed password for root from 159.65.154.48 port 40622 ssh2
Jun  4 15:16:36 minden010 sshd[4990]: Failed password for root from 159.65.154.48 port 43564 ssh2
...
2020-06-04 21:33:00
222.186.175.215 attackspambots
Jun  4 15:04:26 minden010 sshd[31313]: Failed password for root from 222.186.175.215 port 29350 ssh2
Jun  4 15:04:37 minden010 sshd[31313]: Failed password for root from 222.186.175.215 port 29350 ssh2
Jun  4 15:04:40 minden010 sshd[31313]: Failed password for root from 222.186.175.215 port 29350 ssh2
Jun  4 15:04:40 minden010 sshd[31313]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 29350 ssh2 [preauth]
...
2020-06-04 21:22:41
13.210.177.21 attackspam
Fail2Ban Ban Triggered
2020-06-04 21:32:43
129.226.133.168 attackspam
Jun  4 12:04:52 marvibiene sshd[37672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.133.168  user=root
Jun  4 12:04:54 marvibiene sshd[37672]: Failed password for root from 129.226.133.168 port 38270 ssh2
Jun  4 12:08:34 marvibiene sshd[37702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.133.168  user=root
Jun  4 12:08:36 marvibiene sshd[37702]: Failed password for root from 129.226.133.168 port 35300 ssh2
...
2020-06-04 21:36:19
165.84.180.36 attack
Jun  4 09:03:19 NPSTNNYC01T sshd[23916]: Failed password for root from 165.84.180.36 port 40750 ssh2
Jun  4 09:06:58 NPSTNNYC01T sshd[24251]: Failed password for root from 165.84.180.36 port 42990 ssh2
...
2020-06-04 21:12:08
122.51.82.22 attackspam
SSH bruteforce
2020-06-04 21:17:05
211.140.196.90 attackbotsspam
Jun  4 14:45:16 home sshd[17238]: Failed password for root from 211.140.196.90 port 60298 ssh2
Jun  4 14:50:12 home sshd[17745]: Failed password for root from 211.140.196.90 port 59931 ssh2
...
2020-06-04 21:13:54
159.65.134.146 attackbots
Lines containing failures of 159.65.134.146
Jun  2 07:53:20 ris sshd[11634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.134.146  user=r.r
Jun  2 07:53:23 ris sshd[11634]: Failed password for r.r from 159.65.134.146 port 53970 ssh2
Jun  2 07:53:24 ris sshd[11634]: Received disconnect from 159.65.134.146 port 53970:11: Bye Bye [preauth]
Jun  2 07:53:24 ris sshd[11634]: Disconnected from authenticating user r.r 159.65.134.146 port 53970 [preauth]
Jun  2 07:57:08 ris sshd[12296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.134.146  user=r.r
Jun  2 07:57:10 ris sshd[12296]: Failed password for r.r from 159.65.134.146 port 49426 ssh2
Jun  2 07:57:12 ris sshd[12296]: Received disconnect from 159.65.134.146 port 49426:11: Bye Bye [preauth]
Jun  2 07:57:12 ris sshd[12296]: Disconnected from authenticating user r.r 159.65.134.146 port 49426 [preauth]


........
-----------------------------------------------
https://w
2020-06-04 21:35:34
186.234.80.227 attackbotsspam
186.234.80.227 - - [04/Jun/2020:14:08:21 +0200] "GET /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
186.234.80.227 - - [04/Jun/2020:14:08:23 +0200] "POST /wp-login.php HTTP/1.1" 200 7007 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
186.234.80.227 - - [04/Jun/2020:14:08:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-04 21:45:02

最近上报的IP列表

53.213.119.48 254.196.103.64 13.127.83.91 137.92.45.82
126.165.114.194 23.27.22.150 223.89.249.65 43.34.127.170
32.227.212.104 63.26.114.131 188.58.226.226 7.2.0.146
236.45.199.235 74.163.67.185 114.2.184.144 193.189.227.33
55.141.157.71 49.187.218.12 8.234.176.92 140.74.209.137