必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Manhattan

省份(region): New York

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.26.140.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.26.140.234.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050200 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 20:08:45 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
234.140.26.214.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 234.140.26.214.in-addr.arpa.: No answer

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.152.159.11 attackspam
Automatic report - SSH Brute-Force Attack
2019-09-17 19:30:53
40.77.167.45 attackbots
Automatic report - Banned IP Access
2019-09-17 19:43:21
125.26.54.149 attackbots
Unauthorized connection attempt from IP address 125.26.54.149 on Port 445(SMB)
2019-09-17 19:20:30
193.112.74.137 attack
Sep 17 11:18:46 nextcloud sshd\[29571\]: Invalid user zabbix from 193.112.74.137
Sep 17 11:18:46 nextcloud sshd\[29571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.74.137
Sep 17 11:18:48 nextcloud sshd\[29571\]: Failed password for invalid user zabbix from 193.112.74.137 port 48634 ssh2
...
2019-09-17 19:44:18
92.118.37.74 attack
Sep 17 13:35:02 mc1 kernel: \[ 6571.484128\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19146 PROTO=TCP SPT=46525 DPT=50951 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 17 13:35:14 mc1 kernel: \[ 6583.911315\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=36810 PROTO=TCP SPT=46525 DPT=31122 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 17 13:36:25 mc1 kernel: \[ 6654.769498\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=53385 PROTO=TCP SPT=46525 DPT=12953 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-17 19:50:16
178.150.216.229 attackbotsspam
Sep 16 23:25:14 sachi sshd\[22884\]: Invalid user gauthier from 178.150.216.229
Sep 16 23:25:14 sachi sshd\[22884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
Sep 16 23:25:16 sachi sshd\[22884\]: Failed password for invalid user gauthier from 178.150.216.229 port 38888 ssh2
Sep 16 23:29:50 sachi sshd\[23226\]: Invalid user advent from 178.150.216.229
Sep 16 23:29:50 sachi sshd\[23226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
2019-09-17 19:27:44
180.251.172.240 attackspambots
Unauthorized connection attempt from IP address 180.251.172.240 on Port 445(SMB)
2019-09-17 19:21:10
103.242.56.63 attack
Unauthorized connection attempt from IP address 103.242.56.63 on Port 445(SMB)
2019-09-17 18:50:14
123.16.233.214 attackspambots
Unauthorized connection attempt from IP address 123.16.233.214 on Port 445(SMB)
2019-09-17 18:46:26
113.53.248.2 attack
Unauthorized connection attempt from IP address 113.53.248.2 on Port 445(SMB)
2019-09-17 19:41:11
115.236.100.114 attackbots
Sep 16 22:38:50 friendsofhawaii sshd\[24920\]: Invalid user test from 115.236.100.114
Sep 16 22:38:50 friendsofhawaii sshd\[24920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.100.114
Sep 16 22:38:52 friendsofhawaii sshd\[24920\]: Failed password for invalid user test from 115.236.100.114 port 2273 ssh2
Sep 16 22:42:38 friendsofhawaii sshd\[25435\]: Invalid user jesus from 115.236.100.114
Sep 16 22:42:38 friendsofhawaii sshd\[25435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.100.114
2019-09-17 19:37:59
14.253.91.18 attackbotsspam
Unauthorized connection attempt from IP address 14.253.91.18 on Port 445(SMB)
2019-09-17 18:46:45
14.228.247.223 attackbotsspam
Sep 17 03:33:12 MK-Soft-VM3 sshd\[24347\]: Invalid user admin from 14.228.247.223 port 52191
Sep 17 03:33:12 MK-Soft-VM3 sshd\[24347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.228.247.223
Sep 17 03:33:14 MK-Soft-VM3 sshd\[24347\]: Failed password for invalid user admin from 14.228.247.223 port 52191 ssh2
...
2019-09-17 18:55:25
183.88.214.195 attack
Unauthorized connection attempt from IP address 183.88.214.195 on Port 445(SMB)
2019-09-17 19:26:07
14.246.39.84 attackbots
Autoban   14.246.39.84 AUTH/CONNECT
2019-09-17 19:08:58

最近上报的IP列表

210.106.137.130 43.254.240.150 45.238.122.127 152.136.14.79
14.241.241.41 51.15.145.149 4.151.225.123 39.157.241.51
222.12.37.66 75.123.215.152 45.138.72.78 143.241.31.191
128.199.208.62 229.197.232.217 81.138.117.169 154.104.185.200
14.237.221.18 159.225.155.61 37.245.206.82 185.195.26.61