必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.91.149.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.91.149.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:08:27 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 140.149.91.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.149.91.194.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.192.71.245 attackspambots
Dec  8 13:26:48 sachi sshd\[29118\]: Invalid user mima0123 from 85.192.71.245
Dec  8 13:26:48 sachi sshd\[29118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43013099.xtec.cat
Dec  8 13:26:49 sachi sshd\[29118\]: Failed password for invalid user mima0123 from 85.192.71.245 port 34524 ssh2
Dec  8 13:32:19 sachi sshd\[29619\]: Invalid user withhold from 85.192.71.245
Dec  8 13:32:19 sachi sshd\[29619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43013099.xtec.cat
2019-12-09 07:37:47
51.68.198.113 attackspam
Dec  8 23:25:04 game-panel sshd[21205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113
Dec  8 23:25:07 game-panel sshd[21205]: Failed password for invalid user neda from 51.68.198.113 port 38788 ssh2
Dec  8 23:30:12 game-panel sshd[21500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113
2019-12-09 07:40:23
134.209.156.57 attackspam
Dec  8 13:13:39 php1 sshd\[30674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.156.57  user=root
Dec  8 13:13:41 php1 sshd\[30674\]: Failed password for root from 134.209.156.57 port 46510 ssh2
Dec  8 13:21:35 php1 sshd\[31864\]: Invalid user asterisk from 134.209.156.57
Dec  8 13:21:35 php1 sshd\[31864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.156.57
Dec  8 13:21:37 php1 sshd\[31864\]: Failed password for invalid user asterisk from 134.209.156.57 port 54966 ssh2
2019-12-09 07:33:24
124.251.110.148 attack
Dec  8 03:43:01 server sshd\[13737\]: Failed password for invalid user qj from 124.251.110.148 port 34540 ssh2
Dec  9 01:55:06 server sshd\[7324\]: Invalid user doug from 124.251.110.148
Dec  9 01:55:06 server sshd\[7324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 
Dec  9 01:55:08 server sshd\[7324\]: Failed password for invalid user doug from 124.251.110.148 port 46098 ssh2
Dec  9 02:09:50 server sshd\[11326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148  user=root
...
2019-12-09 07:46:52
5.23.44.246 attack
Dec  8 13:53:22 web1 sshd\[8484\]: Invalid user guest from 5.23.44.246
Dec  8 13:53:22 web1 sshd\[8484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.23.44.246
Dec  8 13:53:24 web1 sshd\[8484\]: Failed password for invalid user guest from 5.23.44.246 port 33689 ssh2
Dec  8 13:59:24 web1 sshd\[9173\]: Invalid user test from 5.23.44.246
Dec  8 13:59:24 web1 sshd\[9173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.23.44.246
2019-12-09 07:59:31
118.25.126.117 attackbots
Dec  9 01:58:55 hosting sshd[6284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.126.117  user=root
Dec  9 01:58:57 hosting sshd[6284]: Failed password for root from 118.25.126.117 port 42822 ssh2
...
2019-12-09 08:08:29
104.236.72.187 attack
2019-12-08T23:56:45.194861shield sshd\[3221\]: Invalid user pond from 104.236.72.187 port 36563
2019-12-08T23:56:45.199255shield sshd\[3221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.72.187
2019-12-08T23:56:47.463486shield sshd\[3221\]: Failed password for invalid user pond from 104.236.72.187 port 36563 ssh2
2019-12-09T00:02:03.408243shield sshd\[4936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.72.187  user=root
2019-12-09T00:02:05.654813shield sshd\[4936\]: Failed password for root from 104.236.72.187 port 41063 ssh2
2019-12-09 08:07:49
185.140.132.19 attackspam
[portscan] Port scan
2019-12-09 08:01:41
134.209.97.228 attack
Dec  9 00:11:50 meumeu sshd[15712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.228 
Dec  9 00:11:51 meumeu sshd[15712]: Failed password for invalid user siegurd from 134.209.97.228 port 53432 ssh2
Dec  9 00:17:51 meumeu sshd[19936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.228 
...
2019-12-09 07:31:33
220.164.2.138 attack
$f2bV_matches
2019-12-09 07:49:07
118.25.125.189 attack
Dec  8 13:29:48 php1 sshd\[17271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.125.189  user=root
Dec  8 13:29:50 php1 sshd\[17271\]: Failed password for root from 118.25.125.189 port 49586 ssh2
Dec  8 13:35:11 php1 sshd\[17784\]: Invalid user bitnami from 118.25.125.189
Dec  8 13:35:11 php1 sshd\[17784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.125.189
Dec  8 13:35:14 php1 sshd\[17784\]: Failed password for invalid user bitnami from 118.25.125.189 port 51002 ssh2
2019-12-09 07:36:34
51.38.186.47 attackspambots
Dec  8 18:14:18 linuxvps sshd\[29041\]: Invalid user wwwadmin from 51.38.186.47
Dec  8 18:14:18 linuxvps sshd\[29041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
Dec  8 18:14:20 linuxvps sshd\[29041\]: Failed password for invalid user wwwadmin from 51.38.186.47 port 42718 ssh2
Dec  8 18:19:16 linuxvps sshd\[32454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47  user=root
Dec  8 18:19:19 linuxvps sshd\[32454\]: Failed password for root from 51.38.186.47 port 51332 ssh2
2019-12-09 07:30:58
14.215.165.131 attackbots
Dec  9 00:29:56 legacy sshd[30187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.165.131
Dec  9 00:29:58 legacy sshd[30187]: Failed password for invalid user bridgit from 14.215.165.131 port 50524 ssh2
Dec  9 00:36:16 legacy sshd[30625]: Failed password for root from 14.215.165.131 port 56192 ssh2
...
2019-12-09 07:55:30
106.12.26.160 attackbots
Dec  9 00:24:31 localhost sshd\[11285\]: Invalid user mysql from 106.12.26.160 port 41982
Dec  9 00:24:31 localhost sshd\[11285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.26.160
Dec  9 00:24:33 localhost sshd\[11285\]: Failed password for invalid user mysql from 106.12.26.160 port 41982 ssh2
2019-12-09 07:39:10
139.155.55.30 attack
Dec  8 13:48:33 tdfoods sshd\[2333\]: Invalid user hiong from 139.155.55.30
Dec  8 13:48:33 tdfoods sshd\[2333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.55.30
Dec  8 13:48:35 tdfoods sshd\[2333\]: Failed password for invalid user hiong from 139.155.55.30 port 37146 ssh2
Dec  8 13:55:04 tdfoods sshd\[3001\]: Invalid user alcaraz from 139.155.55.30
Dec  8 13:55:04 tdfoods sshd\[3001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.55.30
2019-12-09 07:56:51

最近上报的IP列表

205.137.217.36 62.244.187.136 231.5.92.146 174.80.122.158
221.16.65.226 132.143.183.207 4.86.211.137 42.235.67.112
155.120.204.235 93.9.39.151 31.176.174.155 203.46.228.140
218.245.194.206 78.213.88.40 78.77.10.115 66.80.113.5
254.5.53.12 193.85.35.166 27.234.65.48 163.56.21.121