必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Wuhan

省份(region): Hubei

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
219.140.55.167 attackbots
Unauthorized connection attempt detected from IP address 219.140.55.167 to port 23 [T]
2020-05-20 10:38:19
219.140.55.121 attack
Telnetd brute force attack detected by fail2ban
2020-03-20 00:18:38
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '219.140.0.0 - 219.140.255.255'

% Abuse contact for '219.140.0.0 - 219.140.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        219.140.0.0 - 219.140.255.255
netname:        CHINANET-HB-WH
country:        CN
descr:          Chinanet network in Wuhan city Hubei province
admin-c:        CHW9-AP
admin-c:        CHA1-AP
tech-c:         YH51-AP
tech-c:         WX145-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CN-CHINANET-HB
last-modified:  2008-09-04T06:53:20Z
source:         APNIC

role:           CHINANET HB ADMIN
address:        8th floor of JinGuang Building
address:        #232 of Macao Road
address:        HanKou Wuhan Hubei Province
address:        P.R.China
country:        CN
phone:          +86 27 82862199
fax-no:         +86 27 82861499
e-mail:         hbadd@189.cn
remarks:        send spam reports to hbadd@189.cn
remarks:        and abuse reports to hbadd@189.cn
remarks:        Please include detailed information and
remarks:        times in GMT+8
admin-c:        YZ83-AP
admin-c:        ZC77-AP
tech-c:         YZ83-AP
tech-c:         ZC77-AP
nic-hdl:        CHA1-AP
notify:         hbadd@189.cn
mnt-by:         MAINT-CN-CHINANET-HB
last-modified:  2013-08-06T11:09:18Z
source:         APNIC

role:           CHINANET HB WH
address:        No.1 HongShan Road Wuhan city
address:        Hubei Province P.R.China
country:        CN
phone:          +86-27-87811065
phone:          +86-27-87897599
fax-no:         +86-27-87811653
e-mail:         ip_admin_wh@public.wh.hb.cn
remarks:        send spam reports to spam_wh@public.wh.hb.cn
remarks:        and abuse reports to abuse_wh@public.wh.hb.cn
remarks:        Please include detailed information and
remarks:        times in GMT+8
admin-c:        WX145-AP
tech-c:         YH51-AP
tech-c:         WX145-AP
nic-hdl:        CHW9-AP
notify:         ip_admin_hb@public.wh.hb.cn
mnt-by:         MAINT-CN-CHINANET-HB
last-modified:  2011-12-06T00:10:59Z
source:         APNIC

person:         WANG XI
address:        No.1 Hongshan Road
address:        Wuchang, Wuhan,Hubei province
address:        P.R.China
country:        CN
phone:          +86-27-87270127
fax-no:         +86-27-87313806
e-mail:         wxi@dc.wh.hb.cn
nic-hdl:        WX145-AP
mnt-by:         MAINT-CN-CHINANET-HB
last-modified:  2008-09-04T07:29:20Z
source:         APNIC

person:         Ying Hai
nic-hdl:        YH51-AP
e-mail:         yhai@dc.wh.hb.cn
address:        No.1 HongShan Road
address:        Wuhan Hubei province
address:        P.R.China
phone:          +86-27-87811065
fax-no:         +86-27-87811653
country:        CN
mnt-by:         MAINT-NEW
last-modified:  2008-09-04T07:29:39Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.140.5.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.140.5.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 11:41:05 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 111.5.140.219.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.5.140.219.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.59.207.71 attackspam
*Port Scan* detected from 194.59.207.71 (DE/Germany/v22019078782694098.megasrv.de). 4 hits in the last 165 seconds
2019-08-20 06:16:46
134.175.109.23 attackspam
2019-08-19T22:07:27.680884abusebot-5.cloudsearch.cf sshd\[27036\]: Invalid user git from 134.175.109.23 port 43010
2019-08-20 06:26:35
209.59.140.225 attackspam
209.59.140.225 - - \[19/Aug/2019:21:52:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.59.140.225 - - \[19/Aug/2019:21:52:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-08-20 06:25:03
167.99.200.84 attackspam
Aug 19 22:39:06 andromeda sshd\[18118\]: Invalid user scaner from 167.99.200.84 port 43828
Aug 19 22:39:06 andromeda sshd\[18118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.200.84
Aug 19 22:39:07 andromeda sshd\[18118\]: Failed password for invalid user scaner from 167.99.200.84 port 43828 ssh2
2019-08-20 06:11:47
206.189.127.6 attack
Aug 19 22:31:10 game-panel sshd[13880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.127.6
Aug 19 22:31:11 game-panel sshd[13880]: Failed password for invalid user admin from 206.189.127.6 port 55834 ssh2
Aug 19 22:35:08 game-panel sshd[14038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.127.6
2019-08-20 06:37:05
69.50.136.58 attack
[Mon Aug 19 18:42:01 2019 GMT] GoogleReminder  [], Subject: New messages xxxx Fine
2019-08-20 06:07:37
136.228.161.66 attackspam
Aug 19 22:57:16 dev0-dcde-rnet sshd[4719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
Aug 19 22:57:18 dev0-dcde-rnet sshd[4719]: Failed password for invalid user deploy from 136.228.161.66 port 55100 ssh2
Aug 19 23:02:31 dev0-dcde-rnet sshd[4746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
2019-08-20 06:33:38
202.122.23.70 attackspam
Invalid user pankaj from 202.122.23.70 port 17696
2019-08-20 06:09:08
159.65.63.39 attack
*Port Scan* detected from 159.65.63.39 (GB/United Kingdom/-). 4 hits in the last 275 seconds
2019-08-20 06:23:11
188.166.163.92 attackbots
Aug 19 12:25:12 web9 sshd\[17855\]: Invalid user import from 188.166.163.92
Aug 19 12:25:12 web9 sshd\[17855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.163.92
Aug 19 12:25:15 web9 sshd\[17855\]: Failed password for invalid user import from 188.166.163.92 port 38586 ssh2
Aug 19 12:29:02 web9 sshd\[18691\]: Invalid user captive from 188.166.163.92
Aug 19 12:29:02 web9 sshd\[18691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.163.92
2019-08-20 06:43:43
83.171.107.216 attackbotsspam
Aug 19 19:56:52 MK-Soft-VM5 sshd\[19600\]: Invalid user ubuntu from 83.171.107.216 port 41992
Aug 19 19:56:52 MK-Soft-VM5 sshd\[19600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.171.107.216
Aug 19 19:56:54 MK-Soft-VM5 sshd\[19600\]: Failed password for invalid user ubuntu from 83.171.107.216 port 41992 ssh2
...
2019-08-20 06:05:50
88.247.110.88 attackbots
SSH Brute-Forcing (ownc)
2019-08-20 06:30:51
165.22.143.139 attack
*Port Scan* detected from 165.22.143.139 (US/United States/-). 4 hits in the last 70 seconds
2019-08-20 06:22:22
117.196.229.58 attack
fail2ban honeypot
2019-08-20 06:33:03
106.13.15.122 attackspambots
Aug 19 21:57:15 fr01 sshd[1483]: Invalid user derek from 106.13.15.122
Aug 19 21:57:15 fr01 sshd[1483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.122
Aug 19 21:57:15 fr01 sshd[1483]: Invalid user derek from 106.13.15.122
Aug 19 21:57:17 fr01 sshd[1483]: Failed password for invalid user derek from 106.13.15.122 port 50504 ssh2
...
2019-08-20 06:42:19

最近上报的IP列表

2606:4700:10::ac43:2808 113.213.4.84 36.101.150.151 2606:4700:10::6816:1406
121.237.149.167 2606:4700:10::6814:8384 2606:4700:10::6814:4750 2606:4700:10::6814:7363
2606:4700:10::6816:2511 103.82.228.55 240e:454:412c:1355:2c44:c2ff:fe1d:4e6f 66.132.195.92
178.128.114.205 45.207.221.17 111.33.154.219 103.152.175.227
2606:4700:10::ac43:2566 2606:4700:10::ac43:1684 2606:4700:10::ac43:181e 2606:4700:10::ac43:1900