必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Vienna

省份(region): Vienna

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.108.249.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.108.249.140.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060401 1800 900 604800 86400

;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 05 06:55:18 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
140.249.108.80.in-addr.arpa domain name pointer 80-108-249-140.cable.dynamic.surfer.at.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.249.108.80.in-addr.arpa	name = 80-108-249-140.cable.dynamic.surfer.at.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.201.225.235 attackspam
Auto Fail2Ban report, multiple SSH login attempts.
2020-07-13 22:59:16
159.203.34.76 attackspambots
scans once in preceeding hours on the ports (in chronological order) 30675 resulting in total of 4 scans from 159.203.0.0/16 block.
2020-07-13 23:01:55
186.146.1.122 attackbotsspam
Jul 13 16:09:45 piServer sshd[19364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.146.1.122 
Jul 13 16:09:47 piServer sshd[19364]: Failed password for invalid user lass from 186.146.1.122 port 59220 ssh2
Jul 13 16:13:31 piServer sshd[19658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.146.1.122 
...
2020-07-13 22:31:12
77.51.180.40 attackbotsspam
Jul 13 12:17:10 XXXXXX sshd[27337]: Invalid user ospite from 77.51.180.40 port 60696
2020-07-13 22:31:55
124.238.113.126 attack
Port Scan
...
2020-07-13 22:57:27
148.72.212.161 attack
Jul 13 16:32:53 vps sshd[1041118]: Failed password for invalid user yw from 148.72.212.161 port 35548 ssh2
Jul 13 16:35:20 vps sshd[5752]: Invalid user test from 148.72.212.161 port 41230
Jul 13 16:35:20 vps sshd[5752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-212-161.ip.secureserver.net
Jul 13 16:35:22 vps sshd[5752]: Failed password for invalid user test from 148.72.212.161 port 41230 ssh2
Jul 13 16:37:53 vps sshd[15286]: Invalid user c from 148.72.212.161 port 46912
...
2020-07-13 22:48:51
218.92.0.208 attackspambots
Jul 13 16:59:25 server sshd[32710]: Failed password for root from 218.92.0.208 port 47182 ssh2
Jul 13 16:59:27 server sshd[32710]: Failed password for root from 218.92.0.208 port 47182 ssh2
Jul 13 16:59:29 server sshd[32710]: Failed password for root from 218.92.0.208 port 47182 ssh2
2020-07-13 23:06:48
60.12.124.205 attackbots
Probing for PHP and Oracle WebLogic vulnerabilities
2020-07-13 22:47:50
192.241.218.112 attackspambots
Port scan denied
2020-07-13 23:00:39
192.241.237.238 attackspambots
scans once in preceeding hours on the ports (in chronological order) 8022 resulting in total of 59 scans from 192.241.128.0/17 block.
2020-07-13 23:09:38
87.121.52.202 attackspam
Port scan denied
2020-07-13 22:58:20
197.47.224.224 attackbotsspam
Port scan denied
2020-07-13 22:50:53
116.106.128.12 attackbots
Port scan denied
2020-07-13 22:52:41
192.35.169.22 attack
 TCP (SYN) 192.35.169.22:41970 -> port 16992, len 44
2020-07-13 22:56:23
36.92.95.10 attack
Jul 13 14:10:26 ns382633 sshd\[24670\]: Invalid user testi from 36.92.95.10 port 31892
Jul 13 14:10:26 ns382633 sshd\[24670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10
Jul 13 14:10:28 ns382633 sshd\[24670\]: Failed password for invalid user testi from 36.92.95.10 port 31892 ssh2
Jul 13 14:22:17 ns382633 sshd\[26525\]: Invalid user rb from 36.92.95.10 port 36258
Jul 13 14:22:17 ns382633 sshd\[26525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10
2020-07-13 22:43:07

最近上报的IP列表

219.116.25.0 41.75.218.89 190.133.161.247 72.219.178.86
176.109.227.58 105.223.197.198 155.144.58.186 37.41.166.114
51.179.203.171 222.247.56.127 171.239.237.156 177.149.40.15
36.42.244.102 128.15.108.125 174.231.28.131 93.168.1.136
114.237.183.43 31.147.140.104 80.67.93.88 177.189.67.4