必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mexico

运营商(isp): Alestra Comunicacion S de RL de CV

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Unauthorized connection attempt detected from IP address 201.140.131.50 to port 445
2020-07-09 08:01:52
attackspam
20/2/20@11:05:37: FAIL: Alarm-Network address from=201.140.131.50
20/2/20@11:05:37: FAIL: Alarm-Network address from=201.140.131.50
...
2020-02-21 03:21:28
attack
Unauthorized connection attempt from IP address 201.140.131.50 on Port 445(SMB)
2019-09-10 04:29:32
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.140.131.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2087
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.140.131.50.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090902 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 10 04:29:25 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
50.131.140.201.in-addr.arpa domain name pointer tj-201-140-131-50.gtel.net.mx.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
50.131.140.201.in-addr.arpa	name = tj-201-140-131-50.gtel.net.mx.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.28.154.44 attackbotsspam
xmlrpc attack
2019-06-22 04:48:36
210.57.215.106 attackbotsspam
445/tcp 445/tcp 445/tcp
[2019-06-21]3pkt
2019-06-22 04:47:28
191.37.128.83 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:39:09
31.14.85.9 attack
Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1"
2019-06-22 04:49:11
2.182.171.83 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:03:50
193.169.255.102 attack
Request: "GET /cr.php HTTP/1.1"
2019-06-22 04:24:12
193.112.27.92 attackbots
Jun 21 23:09:08 yabzik sshd[19175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92
Jun 21 23:09:10 yabzik sshd[19175]: Failed password for invalid user kun from 193.112.27.92 port 52516 ssh2
Jun 21 23:10:36 yabzik sshd[19779]: Failed password for root from 193.112.27.92 port 37838 ssh2
2019-06-22 04:40:01
58.140.223.27 attackbots
20 attempts against mh-ssh on sonic.magehost.pro
2019-06-22 04:47:00
80.24.191.81 attackbots
Request: "GET /manager/html HTTP/1.1" Request: "GET /manager/html HTTP/1.1"
2019-06-22 04:50:51
2.179.210.79 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:59:10
31.44.78.103 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 04:55:46
199.249.230.69 attack
Request: "GET /wp-content/plugins/css-ready-selectors/file.php HTTP/1.1" Request: "GET /res.php HTTP/1.1" Request: "GET /01.php HTTP/1.1" Request: "GET /wp-content/plugins/qetf0.php HTTP/1.1" Request: "GET /wp-content/plugins/server.php HTTP/1.1" Request: "GET /Dwsonv.php HTTP/1.1" Request: "GET /bak.php?login=canshu HTTP/1.1" Request: "GET /wp-content/aw.php HTTP/1.1" Request: "GET /wp-content/plugins/options.php HTTP/1.1" Request: "GET /wp-content/batman.php HTTP/1.1" Request: "GET /date.php HTTP/1.1" Request: "GET /xkl.php HTTP/1.1" Request: "GET /wp-cofigs.php HTTP/1.1" Request: "GET /error_log.php?kudax=w00tz HTTP/1.1" Request: "GET /xyz.php HTTP/1.1" Request: "GET /res.php HTTP/1.1" Request: "GET /res.php HTTP/1.1" Request: "GET /01.php HTTP/1.1" Request: "GET /01.php HTTP/1.1" Request: "GET /Dwsonv.php HTTP/1.1" Request: "GET /Dwsonv.php HTTP/1.1" Request: "GET /bak.php?login=canshu HTTP/1.1" Request: "GET /bak.php?login=canshu HTTP/1.1" Request: "GET /date.php HTTP/1.1" Request: "GET /date.php HTTP/1.
2019-06-22 04:34:36
128.201.217.102 attack
utm - spam
2019-06-22 04:42:51
117.223.162.42 attack
23/tcp
[2019-06-21]1pkt
2019-06-22 04:51:49
92.119.237.3 attackbots
NAME : ISANET-Customers1 CIDR : 92.119.236.0/23 DDoS attack Albania - block certain countries :) IP: 92.119.237.3  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 04:18:17

最近上报的IP列表

150.84.96.213 175.174.211.186 140.94.53.246 106.206.83.102
252.161.230.2 136.134.8.10 217.255.74.141 114.232.106.183
178.207.198.19 43.230.166.3 220.130.245.31 171.4.75.217
1.11.48.171 66.78.232.178 81.215.61.36 62.170.123.65
219.100.211.181 24.15.101.96 75.59.146.154 212.189.169.166