必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.39.140.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.39.140.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 18:34:07 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 164.140.39.244.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.140.39.244.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
131.72.222.165 attackspambots
(Nov 28)  LEN=52 TOS=0x10 PREC=0x40 TTL=107 ID=14502 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 28)  LEN=52 TOS=0x10 PREC=0x40 TTL=108 ID=12300 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 28)  LEN=52 TOS=0x10 PREC=0x40 TTL=110 ID=2192 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 28)  LEN=52 TOS=0x10 PREC=0x40 TTL=110 ID=29757 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 27)  LEN=52 TOS=0x10 PREC=0x40 TTL=108 ID=2467 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 27)  LEN=52 TOS=0x10 PREC=0x40 TTL=110 ID=19223 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 27)  LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=25896 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 27)  LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=125 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 26)  LEN=52 TOS=0x10 PREC=0x40 TTL=108 ID=1622 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 25)  LEN=52 TOS=0x10 PREC=0x40 TTL=110 ID=29118 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 25)  LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=17766 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 25)  LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=30876 DF TC...
2019-11-28 15:59:44
51.91.212.81 attackspambots
Fail2Ban Ban Triggered
2019-11-28 15:19:59
159.90.82.120 attack
Lines containing failures of 159.90.82.120
Nov 26 17:30:12 shared11 sshd[21889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.90.82.120  user=www-data
Nov 26 17:30:13 shared11 sshd[21889]: Failed password for www-data from 159.90.82.120 port 19277 ssh2
Nov 26 17:30:13 shared11 sshd[21889]: Received disconnect from 159.90.82.120 port 19277:11: Bye Bye [preauth]
Nov 26 17:30:13 shared11 sshd[21889]: Disconnected from authenticating user www-data 159.90.82.120 port 19277 [preauth]
Nov 26 18:09:50 shared11 sshd[1832]: Invalid user smulowicz from 159.90.82.120 port 28141
Nov 26 18:09:50 shared11 sshd[1832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.90.82.120
Nov 26 18:09:52 shared11 sshd[1832]: Failed password for invalid user smulowicz from 159.90.82.120 port 28141 ssh2
Nov 26 18:09:52 shared11 sshd[1832]: Received disconnect from 159.90.82.120 port 28141:11: Bye Bye [preauth]
No........
------------------------------
2019-11-28 15:34:06
62.234.152.218 attack
Nov 28 02:09:16 linuxvps sshd\[45757\]: Invalid user is from 62.234.152.218
Nov 28 02:09:16 linuxvps sshd\[45757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218
Nov 28 02:09:18 linuxvps sshd\[45757\]: Failed password for invalid user is from 62.234.152.218 port 47919 ssh2
Nov 28 02:17:18 linuxvps sshd\[50369\]: Invalid user saidin from 62.234.152.218
Nov 28 02:17:18 linuxvps sshd\[50369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218
2019-11-28 15:22:11
218.92.0.148 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Failed password for root from 218.92.0.148 port 38540 ssh2
Failed password for root from 218.92.0.148 port 38540 ssh2
Failed password for root from 218.92.0.148 port 38540 ssh2
Failed password for root from 218.92.0.148 port 38540 ssh2
2019-11-28 16:05:05
202.179.31.78 attackbots
Port Scan 1433
2019-11-28 16:04:09
172.81.212.111 attack
Nov 28 07:43:50 localhost sshd\[21532\]: Invalid user lujack from 172.81.212.111
Nov 28 07:43:50 localhost sshd\[21532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.212.111
Nov 28 07:43:52 localhost sshd\[21532\]: Failed password for invalid user lujack from 172.81.212.111 port 33240 ssh2
Nov 28 07:50:57 localhost sshd\[21963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.212.111  user=root
Nov 28 07:50:59 localhost sshd\[21963\]: Failed password for root from 172.81.212.111 port 39782 ssh2
...
2019-11-28 15:37:46
183.136.179.83 botsattack
七牛云暴力爬取啊。。刚设置了cdn就以每秒钟十几条的速度爬取同一个网址
180.163.190.214 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96836 "-" "Q-uc-client"
183.136.179.83 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96601 "-" "Q-uc-client"
180.163.190.193 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 94116 "-" "Q-uc-client"
180.163.190.236 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96704 "-" "Fusion-fuc-client"
180.163.190.236 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 89865 "-" "Q-uc-client"
183.136.179.87 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 94388 "-" "Fusion-fuc-client"
183.136.179.81 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96824 "-" "Q-uc-client"
183.136.179.77 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 95687 "-" "Q-uc-client"
183.136.179.87 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96255 "-" "Q-uc-client"
183.136.179.87 - - [28/Nov/2019:15:54:52 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 95982 "-" "Q-uc-client"
180.163.190.214 - - [28/Nov/2019:15:54:53 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 93070 "-" "Q-uc-client"
183.136.179.73 - - [28/Nov/2019:15:54:53 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 57097 "-" "Q-uc-client"
183.136.179.70 - - [28/Nov/2019:15:54:53 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 44809 "-" "Q-uc-client"
2019-11-28 15:56:30
222.186.42.4 attack
2019-11-28T08:04:32.737161hub.schaetter.us sshd\[16122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2019-11-28T08:04:34.474976hub.schaetter.us sshd\[16122\]: Failed password for root from 222.186.42.4 port 11774 ssh2
2019-11-28T08:04:37.506913hub.schaetter.us sshd\[16122\]: Failed password for root from 222.186.42.4 port 11774 ssh2
2019-11-28T08:04:40.285182hub.schaetter.us sshd\[16122\]: Failed password for root from 222.186.42.4 port 11774 ssh2
2019-11-28T08:04:43.798331hub.schaetter.us sshd\[16122\]: Failed password for root from 222.186.42.4 port 11774 ssh2
...
2019-11-28 16:06:27
178.128.144.128 attackspam
Nov 28 07:29:38 sso sshd[25945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.128
Nov 28 07:29:40 sso sshd[25945]: Failed password for invalid user test from 178.128.144.128 port 56110 ssh2
...
2019-11-28 15:28:18
222.186.175.167 attackbotsspam
Nov 28 08:34:24 MK-Soft-Root2 sshd[3891]: Failed password for root from 222.186.175.167 port 8070 ssh2
Nov 28 08:34:29 MK-Soft-Root2 sshd[3891]: Failed password for root from 222.186.175.167 port 8070 ssh2
...
2019-11-28 15:34:39
61.161.155.100 attack
Port Scan 1433
2019-11-28 15:58:32
112.186.77.90 attackspambots
2019-11-28T07:13:20.477884abusebot-5.cloudsearch.cf sshd\[21957\]: Invalid user rakesh from 112.186.77.90 port 54298
2019-11-28 15:28:35
222.186.175.155 attackspambots
Nov 27 21:55:17 sachi sshd\[21132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Nov 27 21:55:19 sachi sshd\[21132\]: Failed password for root from 222.186.175.155 port 62142 ssh2
Nov 27 21:55:36 sachi sshd\[21156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Nov 27 21:55:38 sachi sshd\[21156\]: Failed password for root from 222.186.175.155 port 29546 ssh2
Nov 27 21:55:41 sachi sshd\[21156\]: Failed password for root from 222.186.175.155 port 29546 ssh2
2019-11-28 15:57:10
103.114.107.203 attackbotsspam
Nov 28 13:29:00 lcl-usvr-02 sshd[16028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.107.203  user=root
Nov 28 13:29:01 lcl-usvr-02 sshd[16028]: Failed password for root from 103.114.107.203 port 54125 ssh2
Nov 28 13:29:01 lcl-usvr-02 sshd[16028]: error: Received disconnect from 103.114.107.203 port 54125:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Nov 28 13:29:00 lcl-usvr-02 sshd[16028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.107.203  user=root
Nov 28 13:29:01 lcl-usvr-02 sshd[16028]: Failed password for root from 103.114.107.203 port 54125 ssh2
Nov 28 13:29:01 lcl-usvr-02 sshd[16028]: error: Received disconnect from 103.114.107.203 port 54125:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2019-11-28 15:55:48

最近上报的IP列表

234.211.71.160 165.164.116.61 179.166.80.118 55.202.253.80
200.24.106.105 205.153.188.71 108.120.153.69 26.26.124.78
157.12.2.142 12.98.116.65 240.139.151.8 223.94.112.230
203.115.89.244 184.28.93.247 185.80.35.20 200.171.43.239
43.13.1.224 168.123.175.135 22.169.206.110 75.91.196.110