必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kitakyushu

省份(region): Fukuoka

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): UCOM Corp.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.246.12.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64227
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;221.246.12.140.			IN	A

;; AUTHORITY SECTION:
.			3313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 13 03:33:29 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
140.12.246.221.in-addr.arpa domain name pointer 221x246x12x140.ap221.ftth.ucom.ne.jp.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
140.12.246.221.in-addr.arpa	name = 221x246x12x140.ap221.ftth.ucom.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.229.139.125 attack
Invalid user avanthi from 171.229.139.125 port 63508
2020-04-21 23:19:43
203.135.20.36 attack
$f2bV_matches
2020-04-21 23:01:54
185.74.4.110 attackbots
2020-04-21T16:45:30.355831  sshd[28349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.110  user=root
2020-04-21T16:45:32.376662  sshd[28349]: Failed password for root from 185.74.4.110 port 38163 ssh2
2020-04-21T17:09:53.871364  sshd[28583]: Invalid user test2 from 185.74.4.110 port 42894
...
2020-04-21 23:11:20
152.136.45.81 attackspam
Brute force SMTP login attempted.
...
2020-04-21 23:26:59
170.247.41.20 attackbotsspam
Invalid user admin from 170.247.41.20 port 45858
2020-04-21 23:20:29
167.99.48.123 attackbots
Apr 21 14:35:37 localhost sshd\[4556\]: Invalid user au from 167.99.48.123 port 36342
Apr 21 14:35:37 localhost sshd\[4556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.48.123
Apr 21 14:35:39 localhost sshd\[4556\]: Failed password for invalid user au from 167.99.48.123 port 36342 ssh2
...
2020-04-21 23:22:31
206.189.155.132 attackspam
SSH Authentication Attempts Exceeded
2020-04-21 23:00:56
178.88.115.126 attack
Invalid user us from 178.88.115.126 port 48890
2020-04-21 23:17:03
119.29.133.220 attackspambots
Invalid user ho from 119.29.133.220 port 57592
2020-04-21 23:39:23
157.230.245.91 attackbotsspam
'Fail2Ban'
2020-04-21 23:26:13
212.64.40.155 attackbots
Invalid user admin from 212.64.40.155 port 56570
2020-04-21 22:58:22
120.237.159.248 attackspam
Invalid user d from 120.237.159.248 port 58368
2020-04-21 23:37:13
185.98.114.69 attack
Apr 21 08:32:29 server1 sshd\[31712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.98.114.69 
Apr 21 08:32:31 server1 sshd\[31712\]: Failed password for invalid user sg from 185.98.114.69 port 39088 ssh2
Apr 21 08:36:49 server1 sshd\[931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.98.114.69  user=root
Apr 21 08:36:52 server1 sshd\[931\]: Failed password for root from 185.98.114.69 port 44786 ssh2
Apr 21 08:41:07 server1 sshd\[2722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.98.114.69  user=root
...
2020-04-21 23:11:06
171.103.158.34 attackspambots
Invalid user admin from 171.103.158.34 port 56155
2020-04-21 23:20:11
186.87.32.48 attackbots
2020-04-21T08:45:17.7089901495-001 sshd[21364]: Failed password for root from 186.87.32.48 port 44539 ssh2
2020-04-21T08:48:20.1058721495-001 sshd[21556]: Invalid user loop from 186.87.32.48 port 38573
2020-04-21T08:48:20.1139411495-001 sshd[21556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.87.32.48
2020-04-21T08:48:20.1058721495-001 sshd[21556]: Invalid user loop from 186.87.32.48 port 38573
2020-04-21T08:48:21.7042691495-001 sshd[21556]: Failed password for invalid user loop from 186.87.32.48 port 38573 ssh2
2020-04-21T08:51:25.7625851495-001 sshd[21719]: Invalid user hh from 186.87.32.48 port 60848
...
2020-04-21 23:10:30

最近上报的IP列表

182.209.204.59 24.107.102.15 23.247.98.138 154.49.185.20
70.194.111.58 198.71.7.3 145.129.71.81 82.98.245.190
181.141.115.213 124.161.66.34 128.9.247.195 112.17.87.74
76.68.130.107 125.34.114.127 134.250.70.184 54.36.148.64
32.128.86.55 85.219.192.120 35.28.5.79 27.191.243.78