必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.130.241.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.130.241.140.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 14:10:33 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
140.241.130.194.in-addr.arpa domain name pointer host140.globebyte.co.uk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.241.130.194.in-addr.arpa	name = host140.globebyte.co.uk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.66.168.81 attackbotsspam
SSH_attack
2020-05-04 03:05:29
101.198.180.207 attackbotsspam
May  3 18:16:27 vmd48417 sshd[6478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.198.180.207
2020-05-04 03:19:40
141.101.77.131 attackbotsspam
Wordpress XMLRPC attack
2020-05-04 03:03:56
36.74.64.74 attack
Unauthorised access (May  3) SRC=36.74.64.74 LEN=52 TTL=118 ID=27390 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-04 03:17:13
106.52.200.132 attack
May  2 22:58:37 our-server-hostname sshd[4296]: Invalid user down from 106.52.200.132
May  2 22:58:37 our-server-hostname sshd[4296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.132 
May  2 22:58:39 our-server-hostname sshd[4296]: Failed password for invalid user down from 106.52.200.132 port 54892 ssh2
May  2 23:15:08 our-server-hostname sshd[7033]: Invalid user alusero from 106.52.200.132
May  2 23:15:08 our-server-hostname sshd[7033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.132 
May  2 23:15:09 our-server-hostname sshd[7033]: Failed password for invalid user alusero from 106.52.200.132 port 54842 ssh2
May  2 23:18:34 our-server-hostname sshd[7595]: Invalid user unhostnameek from 106.52.200.132
May  2 23:18:34 our-server-hostname sshd[7595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.132 


........
-----------------------------------------
2020-05-04 03:06:10
41.210.158.136 attack
port scan and connect, tcp 23 (telnet)
2020-05-04 03:29:21
36.110.111.51 attack
sshd
2020-05-04 03:21:36
101.89.201.250 attackbotsspam
May  3 21:29:27 DAAP sshd[5462]: Invalid user hao from 101.89.201.250 port 45030
May  3 21:29:27 DAAP sshd[5462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.201.250
May  3 21:29:27 DAAP sshd[5462]: Invalid user hao from 101.89.201.250 port 45030
May  3 21:29:29 DAAP sshd[5462]: Failed password for invalid user hao from 101.89.201.250 port 45030 ssh2
May  3 21:31:32 DAAP sshd[5516]: Invalid user mcc from 101.89.201.250 port 42004
...
2020-05-04 03:38:10
102.89.3.11 attackbotsspam
1588507600 - 05/03/2020 14:06:40 Host: 102.89.3.11/102.89.3.11 Port: 445 TCP Blocked
2020-05-04 03:09:19
178.128.144.14 attack
May  3 21:13:30 mellenthin sshd[7836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.14  user=root
May  3 21:13:33 mellenthin sshd[7836]: Failed password for invalid user root from 178.128.144.14 port 33082 ssh2
2020-05-04 03:35:55
193.31.24.113 attackspam
05/03/2020-18:58:49.581990 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2020-05-04 03:16:19
140.246.245.144 attackspam
May  3 15:15:12 prox sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.245.144 
May  3 15:15:15 prox sshd[25306]: Failed password for invalid user postgre from 140.246.245.144 port 53786 ssh2
2020-05-04 03:27:17
122.51.17.106 attack
2020-05-03T07:42:00.6109451495-001 sshd[18343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106  user=root
2020-05-03T07:42:02.0646151495-001 sshd[18343]: Failed password for root from 122.51.17.106 port 46794 ssh2
2020-05-03T07:45:16.2811721495-001 sshd[18469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106  user=root
2020-05-03T07:45:18.9788631495-001 sshd[18469]: Failed password for root from 122.51.17.106 port 55310 ssh2
2020-05-03T07:48:37.2979561495-001 sshd[18563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.17.106  user=root
2020-05-03T07:48:39.2534571495-001 sshd[18563]: Failed password for root from 122.51.17.106 port 35604 ssh2
...
2020-05-04 03:27:38
110.243.252.96 attackbotsspam
Unauthorised access (May  3) SRC=110.243.252.96 LEN=40 TTL=45 ID=41139 TCP DPT=23 WINDOW=25789 SYN
2020-05-04 03:33:45
185.176.27.34 attackspam
05/03/2020-15:15:59.282688 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-04 03:39:07

最近上报的IP列表

2.137.241.160 194.1.222.66 24.15.211.155 73.1.101.22
196.90.70.9 170.122.63.175 246.254.140.166 146.3.216.161
119.236.73.241 4.172.160.155 56.86.25.101 164.240.168.192
131.234.3.26 238.92.68.138 216.239.246.197 117.152.206.58
31.222.73.175 108.193.223.161 202.214.88.132 197.184.100.200