必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.151.21.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.151.21.140.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:46:50 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
140.21.151.216.in-addr.arpa domain name pointer 216.151.21.140.fasternetwork.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.21.151.216.in-addr.arpa	name = 216.151.21.140.fasternetwork.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.162.242.157 attackspam
139.162.242.157 - - [07/Jun/2020:15:31:25 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.162.242.157 - - [07/Jun/2020:15:31:25 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.162.242.157 - - [07/Jun/2020:15:33:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.162.242.157 - - [07/Jun/2020:15:33:30 +0200] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.162.242.157 - - [07/Jun/2020:15:40:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.162.242.157 - - [07/Jun/2020:15:40:48 +0200] "POST /wp-login.php HTTP/1.1" 200 1790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/
...
2020-06-08 00:01:29
93.99.134.46 attack
Jun  5 17:02:20 mail.srvfarm.net postfix/smtps/smtpd[3138301]: warning: unknown[93.99.134.46]: SASL PLAIN authentication failed: 
Jun  5 17:02:20 mail.srvfarm.net postfix/smtps/smtpd[3138301]: lost connection after AUTH from unknown[93.99.134.46]
Jun  5 17:03:28 mail.srvfarm.net postfix/smtps/smtpd[3138301]: warning: unknown[93.99.134.46]: SASL PLAIN authentication failed: 
Jun  5 17:03:28 mail.srvfarm.net postfix/smtps/smtpd[3138301]: lost connection after AUTH from unknown[93.99.134.46]
Jun  5 17:10:44 mail.srvfarm.net postfix/smtpd[3150167]: warning: unknown[93.99.134.46]: SASL PLAIN authentication failed: 
Jun  5 17:10:44 mail.srvfarm.net postfix/smtpd[3150167]: lost connection after AUTH from unknown[93.99.134.46]
2020-06-08 00:15:13
5.145.101.137 attackspambots
Jun  5 19:42:24 mail.srvfarm.net webmin[3197225]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:26 mail.srvfarm.net webmin[3197228]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:28 mail.srvfarm.net webmin[3197231]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:31 mail.srvfarm.net webmin[3197236]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:36 mail.srvfarm.net webmin[3197239]: Non-existent login as oracle from 5.145.101.137
2020-06-07 23:48:43
220.128.159.121 attackbotsspam
Jun  7 15:25:08 root sshd[26030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-128-159-121.hinet-ip.hinet.net  user=root
Jun  7 15:25:11 root sshd[26030]: Failed password for root from 220.128.159.121 port 58336 ssh2
...
2020-06-07 23:55:50
216.126.231.15 attackbotsspam
Bruteforce detected by fail2ban
2020-06-08 00:00:29
40.76.40.241 attackbotsspam
Jun  5 18:48:28 websrv1.derweidener.de postfix/smtps/smtpd[3105956]: lost connection after CONNECT from unknown[40.76.40.241]
Jun  5 18:48:29 websrv1.derweidener.de postfix/smtps/smtpd[3105956]: NOQUEUE: reject: RCPT from unknown[40.76.40.241]: 554 5.7.1 : Client host rejected: Access denied; from= to= proto=SMTP helo=<50us-03.domain>
Jun  5 18:48:29 websrv1.derweidener.de postfix/submission/smtpd[3105961]: lost connection after CONNECT from unknown[40.76.40.241]
Jun  5 18:48:30 websrv1.derweidener.de postfix/submission/smtpd[3105961]: NOQUEUE: reject: RCPT from unknown[40.76.40.241]: 554 5.7.1 : Client host rejected: Access denied; from= to= proto=ESMTP helo=<50us-03.domain>
Jun  5 18:48:31 websrv1.derweidener.de postfix/submission/smtpd[3105961]: lost connection after RCPT from unknown[40.76.40.241]
Jun  5 18:48:31 websrv1.derweidener.de postfix/smtps/smtpd[3105956]: lost connec
2020-06-07 23:48:04
45.162.20.60 attackbotsspam
Jun  5 17:43:24 mail.srvfarm.net postfix/smtpd[3156526]: warning: unknown[45.162.20.60]: SASL PLAIN authentication failed: 
Jun  5 17:43:25 mail.srvfarm.net postfix/smtpd[3156526]: lost connection after AUTH from unknown[45.162.20.60]
Jun  5 17:43:40 mail.srvfarm.net postfix/smtpd[3156527]: warning: unknown[45.162.20.60]: SASL PLAIN authentication failed: 
Jun  5 17:43:41 mail.srvfarm.net postfix/smtpd[3156527]: lost connection after AUTH from unknown[45.162.20.60]
Jun  5 17:46:18 mail.srvfarm.net postfix/smtps/smtpd[3154996]: warning: unknown[45.162.20.60]: SASL PLAIN authentication failed:
2020-06-08 00:20:37
217.182.94.110 attackbots
Jun  7 14:03:06 haigwepa sshd[16614]: Failed password for root from 217.182.94.110 port 36060 ssh2
...
2020-06-07 23:53:31
51.116.226.94 attack
Jun  7 05:48:27 web01.agentur-b-2.de postfix/smtps/smtpd[928455]: warning: unknown[51.116.226.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 05:50:11 web01.agentur-b-2.de postfix/smtps/smtpd[928851]: warning: unknown[51.116.226.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 05:51:42 web01.agentur-b-2.de postfix/smtps/smtpd[928851]: warning: unknown[51.116.226.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 05:53:13 web01.agentur-b-2.de postfix/smtps/smtpd[928851]: warning: unknown[51.116.226.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 05:54:44 web01.agentur-b-2.de postfix/smtps/smtpd[928851]: warning: unknown[51.116.226.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-07 23:46:51
164.132.47.139 attackspambots
SSH Brute-Force attacks
2020-06-07 23:50:02
139.59.66.245 attackbots
(sshd) Failed SSH login from 139.59.66.245 (IN/India/-): 5 in the last 3600 secs
2020-06-07 23:49:06
14.32.43.65 attackspam
Brute-force attempt banned
2020-06-08 00:03:53
210.16.88.171 attackspam
Jun  5 16:29:51 mail.srvfarm.net postfix/smtpd[3132026]: warning: unknown[210.16.88.171]: SASL PLAIN authentication failed: 
Jun  5 16:29:52 mail.srvfarm.net postfix/smtpd[3132026]: lost connection after AUTH from unknown[210.16.88.171]
Jun  5 16:36:23 mail.srvfarm.net postfix/smtpd[3132025]: warning: unknown[210.16.88.171]: SASL PLAIN authentication failed: 
Jun  5 16:36:24 mail.srvfarm.net postfix/smtpd[3132025]: lost connection after AUTH from unknown[210.16.88.171]
Jun  5 16:38:03 mail.srvfarm.net postfix/smtpd[3129285]: warning: unknown[210.16.88.171]: SASL PLAIN authentication failed:
2020-06-08 00:06:45
195.158.227.51 attackbotsspam
Jun  6 09:27:09 mail.srvfarm.net postfix/smtpd[3608955]: warning: unknown[195.158.227.51]: SASL PLAIN authentication failed: 
Jun  6 09:27:09 mail.srvfarm.net postfix/smtpd[3608955]: lost connection after AUTH from unknown[195.158.227.51]
Jun  6 09:33:25 mail.srvfarm.net postfix/smtps/smtpd[3611041]: warning: unknown[195.158.227.51]: SASL PLAIN authentication failed: 
Jun  6 09:33:25 mail.srvfarm.net postfix/smtps/smtpd[3611041]: lost connection after AUTH from unknown[195.158.227.51]
Jun  6 09:36:54 mail.srvfarm.net postfix/smtps/smtpd[3611034]: warning: unknown[195.158.227.51]: SASL PLAIN authentication failed:
2020-06-08 00:08:13
46.41.135.161 attack
Jun  4 20:06:44 fwweb01 sshd[1668]: Failed password for r.r from 46.41.135.161 port 37932 ssh2
Jun  4 20:06:44 fwweb01 sshd[1668]: Received disconnect from 46.41.135.161: 11: Bye Bye [preauth]
Jun  4 20:19:59 fwweb01 sshd[14995]: reveeclipse mapping checking getaddrinfo for rhino.deemiser.com [46.41.135.161] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  4 20:19:59 fwweb01 sshd[14995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.41.135.161  user=r.r
Jun  4 20:20:01 fwweb01 sshd[14995]: Failed password for r.r from 46.41.135.161 port 54194 ssh2
Jun  4 20:20:01 fwweb01 sshd[14995]: Received disconnect from 46.41.135.161: 11: Bye Bye [preauth]
Jun  4 20:23:32 fwweb01 sshd[19150]: reveeclipse mapping checking getaddrinfo for rhino.deemiser.com [46.41.135.161] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  4 20:23:32 fwweb01 sshd[19150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.41.135.161  u........
-------------------------------
2020-06-07 23:54:50

最近上报的IP列表

216.151.27.202 216.151.7.139 216.151.27.203 216.152.138.228
216.151.9.49 216.152.96.177 216.152.96.222 216.154.14.5
216.154.194.30 216.152.96.66 216.154.220.47 216.155.128.242
216.155.135.29 216.155.135.231 216.155.156.110 216.157.108.97
216.155.128.67 216.155.157.158 216.157.34.147 216.155.69.183