必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.11.140.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.11.140.226.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:47:23 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
226.140.11.52.in-addr.arpa domain name pointer ec2-52-11-140-226.us-west-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
226.140.11.52.in-addr.arpa	name = ec2-52-11-140-226.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.6.97.138 attack
Unauthorized connection attempt detected from IP address 117.6.97.138 to port 2220 [J]
2020-01-13 05:49:20
128.199.204.26 attack
Unauthorized connection attempt detected from IP address 128.199.204.26 to port 2220 [J]
2020-01-13 05:35:09
103.81.156.8 attackbots
2020-01-12T21:41:53.777944shield sshd\[5470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.8  user=root
2020-01-12T21:41:55.674121shield sshd\[5470\]: Failed password for root from 103.81.156.8 port 47848 ssh2
2020-01-12T21:45:37.564818shield sshd\[6978\]: Invalid user anthony from 103.81.156.8 port 49470
2020-01-12T21:45:37.569053shield sshd\[6978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.156.8
2020-01-12T21:45:39.550513shield sshd\[6978\]: Failed password for invalid user anthony from 103.81.156.8 port 49470 ssh2
2020-01-13 05:50:02
190.41.173.219 attackbotsspam
2020-01-12T21:33:34.383890shield sshd\[2499\]: Invalid user mx from 190.41.173.219 port 54640
2020-01-12T21:33:34.387702shield sshd\[2499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.41.173.219
2020-01-12T21:33:36.114224shield sshd\[2499\]: Failed password for invalid user mx from 190.41.173.219 port 54640 ssh2
2020-01-12T21:39:04.394262shield sshd\[4526\]: Invalid user adrien from 190.41.173.219 port 40839
2020-01-12T21:39:04.398938shield sshd\[4526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.41.173.219
2020-01-13 05:48:22
66.175.238.223 attackspambots
Unauthorized connection attempt detected from IP address 66.175.238.223 to port 2220 [J]
2020-01-13 05:47:38
103.51.176.219 attackbotsspam
Unauthorized connection attempt detected from IP address 103.51.176.219 to port 23 [J]
2020-01-13 05:21:07
219.142.140.2 attackspambots
Unauthorized connection attempt detected from IP address 219.142.140.2 to port 2220 [J]
2020-01-13 06:02:04
222.186.180.6 attack
SSH Login Bruteforce
2020-01-13 05:46:54
88.225.215.178 attackbots
Unauthorized connection attempt detected from IP address 88.225.215.178 to port 23 [J]
2020-01-13 05:23:07
222.186.30.114 attackbotsspam
01/12/2020-16:54:22.346032 222.186.30.114 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-13 05:59:56
45.11.226.186 attackspam
Unauthorized connection attempt detected from IP address 45.11.226.186 to port 23 [J]
2020-01-13 05:28:01
116.85.41.190 attackspam
Jan 12 22:27:23 cp sshd[1230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.41.190
Jan 12 22:27:25 cp sshd[1230]: Failed password for invalid user abe from 116.85.41.190 port 51028 ssh2
Jan 12 22:29:39 cp sshd[2332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.41.190
2020-01-13 05:30:49
84.1.28.157 attackbots
Unauthorized connection attempt detected from IP address 84.1.28.157 to port 2220 [J]
2020-01-13 06:03:02
222.186.42.4 attackspambots
2020-01-12T16:29:00.058172xentho-1 sshd[497155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2020-01-12T16:29:02.172735xentho-1 sshd[497155]: Failed password for root from 222.186.42.4 port 32794 ssh2
2020-01-12T16:29:06.483195xentho-1 sshd[497155]: Failed password for root from 222.186.42.4 port 32794 ssh2
2020-01-12T16:29:00.058172xentho-1 sshd[497155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2020-01-12T16:29:02.172735xentho-1 sshd[497155]: Failed password for root from 222.186.42.4 port 32794 ssh2
2020-01-12T16:29:06.483195xentho-1 sshd[497155]: Failed password for root from 222.186.42.4 port 32794 ssh2
2020-01-12T16:29:00.058172xentho-1 sshd[497155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2020-01-12T16:29:02.172735xentho-1 sshd[497155]: Failed password for root from 222.18
...
2020-01-13 05:29:57
140.246.207.140 attackbots
$f2bV_matches
2020-01-13 05:42:40

最近上报的IP列表

63.77.47.79 220.43.143.31 20.15.24.210 18.77.15.165
253.171.249.84 140.108.204.218 119.177.19.1 6.78.195.175
66.39.136.155 5.221.181.234 64.144.177.70 250.1.56.213
203.90.97.206 169.224.119.227 174.44.21.210 19.196.104.101
15.139.125.215 29.52.122.191 5.173.186.123 197.200.87.90