必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): London

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '5.226.140.0 - 5.226.140.127'

% Abuse contact for '5.226.140.0 - 5.226.140.127' is 'abuse@infrawat.ch'

inetnum:        5.226.140.0 - 5.226.140.127
netname:        INFRAWATCH
remarks:        -----------------------------------------------------
remarks:        Real time internet intelligence data
remarks:        infrawat.ch
remarks:        -----------------------------------------------------
country:        GB
geoloc:         51.494840911758295 -0.018682268947961784
org:            ORG-IL948-RIPE
admin-c:        LD7399-RIPE
tech-c:         LD7399-RIPE
status:         ASSIGNED PA
created:        2026-04-26T03:14:13Z
last-modified:  2026-04-26T03:14:13Z
source:         RIPE
mnt-by:         HYDRA-MNT

organisation:   ORG-IL948-RIPE
org-name:       Infrawatch Limited
org-type:       OTHER
address:        128 City Road
address:        London
address:        EC1V 2NX
country:        GB
abuse-c:        ACRO64026-RIPE
mnt-ref:        HYDRA-MNT
created:        2026-03-26T04:32:13Z
last-modified:  2026-04-27T01:46:41Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

person:         Lloyd Davies
address:        128 City Road
address:        London
address:        EC1V 2NX
address:        United Kingdom
phone:          +448000803330
nic-hdl:        LD7399-RIPE
created:        2026-03-26T04:34:31Z
last-modified:  2026-04-27T01:47:59Z
source:         RIPE # Filtered
mnt-by:         HYDRA-MNT

% Information related to '5.226.140.0/24AS25369'

route:          5.226.140.0/24
origin:         AS25369
mnt-by:         HYDRA-MNT
created:        2018-06-28T01:49:19Z
last-modified:  2018-06-28T01:49:19Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.226.140.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.226.140.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 17:30:48 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
109.140.226.5.in-addr.arpa domain name pointer 5-226-140-109.infrawat.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.140.226.5.in-addr.arpa	name = 5-226-140-109.infrawat.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.81.234.139 attackbots
Sep 20 05:17:33 lnxmysql61 sshd[6964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.234.139
2019-09-20 16:08:19
85.74.24.250 attack
Automatic report - Port Scan Attack
2019-09-20 15:57:48
217.182.73.148 attackspambots
Automated report - ssh fail2ban:
Sep 20 08:49:19 authentication failure 
Sep 20 08:49:21 wrong password, user=pmd, port=45116, ssh2
Sep 20 09:08:35 authentication failure
2019-09-20 15:35:16
133.242.228.107 attackbots
Invalid user system from 133.242.228.107 port 40475
2019-09-20 16:11:09
94.177.163.133 attackspambots
Sep 20 03:41:38 venus sshd\[11100\]: Invalid user goldenbrown from 94.177.163.133 port 35836
Sep 20 03:41:38 venus sshd\[11100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.163.133
Sep 20 03:41:41 venus sshd\[11100\]: Failed password for invalid user goldenbrown from 94.177.163.133 port 35836 ssh2
...
2019-09-20 16:01:12
101.224.58.215 attackspambots
Sep 19 20:34:52 tdfoods sshd\[28136\]: Invalid user user from 101.224.58.215
Sep 19 20:34:52 tdfoods sshd\[28136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.224.58.215
Sep 19 20:34:54 tdfoods sshd\[28136\]: Failed password for invalid user user from 101.224.58.215 port 38424 ssh2
Sep 19 20:34:56 tdfoods sshd\[28136\]: Failed password for invalid user user from 101.224.58.215 port 38424 ssh2
Sep 19 20:34:59 tdfoods sshd\[28136\]: Failed password for invalid user user from 101.224.58.215 port 38424 ssh2
2019-09-20 16:00:37
159.65.1.117 attack
Invalid user toor from 159.65.1.117 port 13316
2019-09-20 16:07:28
62.234.91.173 attackbotsspam
F2B jail: sshd. Time: 2019-09-20 05:09:17, Reported by: VKReport
2019-09-20 15:50:43
200.69.70.30 attack
Chat Spam
2019-09-20 16:13:01
123.122.247.106 attackbots
UTC: 2019-09-19 port: 22/tcp
2019-09-20 15:37:32
80.245.119.94 attack
[portscan] Port scan
2019-09-20 16:02:55
40.114.44.98 attack
Automated report - ssh fail2ban:
Sep 20 08:36:48 wrong password, user=root, port=57892, ssh2
Sep 20 08:41:39 authentication failure 
Sep 20 08:41:42 wrong password, user=zabbix, port=43970, ssh2
2019-09-20 15:51:14
157.245.107.180 attackbotsspam
Invalid user kalavathi from 157.245.107.180 port 32894
2019-09-20 15:47:54
45.80.65.76 attackbotsspam
Sep 20 06:54:34 site2 sshd\[64303\]: Invalid user aldikact from 45.80.65.76Sep 20 06:54:37 site2 sshd\[64303\]: Failed password for invalid user aldikact from 45.80.65.76 port 52626 ssh2Sep 20 06:59:10 site2 sshd\[64584\]: Invalid user mferjancic from 45.80.65.76Sep 20 06:59:12 site2 sshd\[64584\]: Failed password for invalid user mferjancic from 45.80.65.76 port 36684 ssh2Sep 20 07:03:47 site2 sshd\[64941\]: Invalid user admin from 45.80.65.76Sep 20 07:03:48 site2 sshd\[64941\]: Failed password for invalid user admin from 45.80.65.76 port 48986 ssh2
...
2019-09-20 15:54:06
177.69.26.97 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-20 15:54:32

最近上报的IP列表

103.173.7.219 2606:4700:10::6816:4391 39.100.77.72 31.14.254.86
195.206.182.211 188.240.59.33 2606:4700:10::6814:4823 49.86.41.75
14.207.194.172 81.19.219.233 5.226.140.74 194.50.235.150
35.93.87.168 2606:4700:10::6814:5485 2606:4700:10::6814:4472 2606:4700:10::6814:5337
2606:4700:10::ac43:2335 20.169.106.62 183.206.96.146 62.162.113.34