必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.213.140.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.213.140.149.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010601 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 01:58:32 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
149.140.213.194.in-addr.arpa domain name pointer evry-owned-address-194_213_140_x.hidden-host.evry.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.140.213.194.in-addr.arpa	name = evry-owned-address-194_213_140_x.hidden-host.evry.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
156.221.177.214 attackspambots
Automatic report - Port Scan Attack
2019-07-16 14:59:35
200.33.90.106 attackspambots
Automatic report - Port Scan Attack
2019-07-16 14:41:40
218.92.0.141 attackbots
Jul 16 03:32:40 eventyay sshd[13242]: Failed password for root from 218.92.0.141 port 14718 ssh2
Jul 16 03:32:55 eventyay sshd[13242]: error: maximum authentication attempts exceeded for root from 218.92.0.141 port 14718 ssh2 [preauth]
Jul 16 03:33:00 eventyay sshd[13246]: Failed password for root from 218.92.0.141 port 21792 ssh2
...
2019-07-16 15:17:47
51.68.139.151 attackbots
2019-07-16T01:34:03.579915abusebot-3.cloudsearch.cf sshd\[2992\]: Invalid user admin from 51.68.139.151 port 41064
2019-07-16 14:40:26
51.254.129.128 attackbots
Jul 16 08:04:42 core01 sshd\[11383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.128  user=root
Jul 16 08:04:44 core01 sshd\[11383\]: Failed password for root from 51.254.129.128 port 47913 ssh2
...
2019-07-16 14:32:27
92.86.179.186 attack
2019-07-16T06:08:07.689625abusebot.cloudsearch.cf sshd\[30392\]: Invalid user bitnami from 92.86.179.186 port 47918
2019-07-16 14:37:36
46.101.88.10 attackspambots
Jul 16 05:29:37 unicornsoft sshd\[970\]: Invalid user jester from 46.101.88.10
Jul 16 05:29:37 unicornsoft sshd\[970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.88.10
Jul 16 05:29:39 unicornsoft sshd\[970\]: Failed password for invalid user jester from 46.101.88.10 port 25110 ssh2
2019-07-16 15:08:57
216.86.54.194 attackbotsspam
Brute force attempt
2019-07-16 14:32:56
110.136.219.140 attackspam
19/7/15@21:33:17: FAIL: Alarm-Intrusion address from=110.136.219.140
...
2019-07-16 15:09:25
199.168.218.130 attackbots
Brute force attempt
2019-07-16 15:19:32
51.219.27.136 attackspambots
Brute force attempt
2019-07-16 15:02:56
59.47.120.39 attack
Telnet Server BruteForce Attack
2019-07-16 14:39:23
200.117.87.108 attack
Unauthorised access (Jul 16) SRC=200.117.87.108 LEN=40 TTL=49 ID=57436 TCP DPT=23 WINDOW=8689 SYN 
Unauthorised access (Jul 16) SRC=200.117.87.108 LEN=40 TTL=49 ID=57436 TCP DPT=23 WINDOW=8689 SYN
2019-07-16 14:43:51
185.220.101.6 attack
Bot net vulnerabilities attack. Ip involved:
46.165.245.154
195.206.105.217
199.249.230.106
162.247.74.7
171.25.193.78
185.129.62.62
185.220.101.6
192.42.116.15
192.42.116.16
195.176.3.19
195.176.3.23
23.140.160.28
5.34.181.35
51.15.117.50
51.15.125.181
64.113.32.29
95.216.145.1
2019-07-16 14:55:12
41.228.12.149 attackbots
2019-07-16T04:58:54.772617abusebot-4.cloudsearch.cf sshd\[27006\]: Invalid user master from 41.228.12.149 port 34160
2019-07-16 14:30:51

最近上报的IP列表

238.172.143.147 213.208.84.109 52.15.73.90 224.62.161.16
194.108.50.81 157.100.192.43 162.131.219.2 254.82.187.25
34.97.78.195 103.244.213.105 225.153.85.220 223.116.111.128
94.182.111.188 70.76.34.6 195.228.247.164 196.112.19.127
201.205.167.223 221.4.14.204 59.151.113.141 46.19.140.204