必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.140.114.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.140.114.137.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 11:23:09 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 137.114.140.83.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 137.114.140.83.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.120.6.60 attackbotsspam
Brute force attack targeting wordpress (admin) access
2019-07-18 06:13:31
80.237.79.94 attack
[portscan] Port scan
2019-07-18 06:04:14
41.45.209.39 attack
DATE:2019-07-17 18:27:50, IP:41.45.209.39, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-18 06:01:19
192.99.36.76 attackbots
Jul 17 22:49:57 localhost sshd\[4149\]: Invalid user admin from 192.99.36.76 port 60268
Jul 17 22:49:57 localhost sshd\[4149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.36.76
...
2019-07-18 05:55:19
202.91.86.100 attack
Jul 17 13:40:17 vtv3 sshd\[10305\]: Invalid user juan from 202.91.86.100 port 40316
Jul 17 13:40:17 vtv3 sshd\[10305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.91.86.100
Jul 17 13:40:19 vtv3 sshd\[10305\]: Failed password for invalid user juan from 202.91.86.100 port 40316 ssh2
Jul 17 13:46:17 vtv3 sshd\[13317\]: Invalid user daniel from 202.91.86.100 port 38862
Jul 17 13:46:17 vtv3 sshd\[13317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.91.86.100
Jul 17 13:57:23 vtv3 sshd\[19018\]: Invalid user william from 202.91.86.100 port 35910
Jul 17 13:57:23 vtv3 sshd\[19018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.91.86.100
Jul 17 13:57:25 vtv3 sshd\[19018\]: Failed password for invalid user william from 202.91.86.100 port 35910 ssh2
Jul 17 14:03:08 vtv3 sshd\[21950\]: Invalid user carter from 202.91.86.100 port 34432
Jul 17 14:03:08 vtv3 sshd\[21950\]: p
2019-07-18 05:47:58
206.189.33.131 attack
Jul 17 13:32:00 s02-markstaller sshd[5365]: Invalid user facai from 206.189.33.131
Jul 17 13:32:01 s02-markstaller sshd[5365]: Failed password for invalid user facai from 206.189.33.131 port 57368 ssh2
Jul 17 13:37:43 s02-markstaller sshd[5532]: Invalid user amir from 206.189.33.131
Jul 17 13:37:46 s02-markstaller sshd[5532]: Failed password for invalid user amir from 206.189.33.131 port 56428 ssh2
Jul 17 13:43:18 s02-markstaller sshd[5735]: Invalid user amanda from 206.189.33.131
Jul 17 13:43:21 s02-markstaller sshd[5735]: Failed password for invalid user amanda from 206.189.33.131 port 55476 ssh2
Jul 17 13:49:04 s02-markstaller sshd[5899]: Invalid user luo from 206.189.33.131
Jul 17 13:49:06 s02-markstaller sshd[5899]: Failed password for invalid user luo from 206.189.33.131 port 54528 ssh2
Jul 17 13:54:42 s02-markstaller sshd[6046]: Invalid user dusan from 206.189.33.131
Jul 17 13:54:45 s02-markstaller sshd[6046]: Failed password for invalid user dusan from 206.189.33........
------------------------------
2019-07-18 05:38:09
37.120.33.30 attack
Lines containing failures of 37.120.33.30
Jul 17 11:59:06 MAKserver05 sshd[17234]: Invalid user tariq from 37.120.33.30 port 59041
Jul 17 11:59:06 MAKserver05 sshd[17234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.33.30 
Jul 17 11:59:08 MAKserver05 sshd[17234]: Failed password for invalid user tariq from 37.120.33.30 port 59041 ssh2
Jul 17 11:59:08 MAKserver05 sshd[17234]: Received disconnect from 37.120.33.30 port 59041:11: Bye Bye [preauth]
Jul 17 11:59:08 MAKserver05 sshd[17234]: Disconnected from invalid user tariq 37.120.33.30 port 59041 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.120.33.30
2019-07-18 05:39:41
206.189.166.172 attackbots
Invalid user iolanda from 206.189.166.172 port 36960
2019-07-18 05:41:08
138.0.189.233 attackbotsspam
Currently 8 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 8 different usernames and wrong password:
2019-07-17T10:20:34+02:00 x@x
2019-07-12T10:26:36+02:00 x@x
2019-07-11T00:23:15+02:00 x@x
2019-07-10T21:42:38+02:00 x@x
2019-07-07T21:51:45+02:00 x@x
2019-07-01T21:55:34+02:00 x@x
2019-06-30T00:13:01+02:00 x@x
2019-06-23T08:14:33+02:00 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.0.189.233
2019-07-18 06:02:30
180.160.113.221 attackbots
20 attempts against mh-ssh on lb-us.softwarelicense4u.com
2019-07-18 06:05:34
104.206.128.62 attackbots
Honeypot attack, port: 23, PTR: 62-128.206.104.serverhubrdns.in-addr.arpa.
2019-07-18 06:14:11
168.195.47.174 attack
Currently 7 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 6 different usernames and wrong password:
2019-07-17T05:43:10+02:00 x@x
2019-07-17T04:06:06+02:00 x@x
2019-07-10T22:14:45+02:00 x@x
2019-07-06T13:40:51+02:00 x@x
2019-07-06T10:45:30+02:00 x@x
2019-07-05T18:49:48+02:00 x@x
2019-06-29T09:06:17+02:00 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.195.47.174
2019-07-18 06:09:25
109.19.16.40 attack
Jul 17 22:08:25 cvbmail sshd\[3520\]: Invalid user v from 109.19.16.40
Jul 17 22:08:25 cvbmail sshd\[3520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.19.16.40
Jul 17 22:08:27 cvbmail sshd\[3520\]: Failed password for invalid user v from 109.19.16.40 port 35730 ssh2
2019-07-18 05:52:57
59.25.197.154 attackbotsspam
Jul 17 21:28:52 MK-Soft-VM5 sshd\[31977\]: Invalid user update from 59.25.197.154 port 33582
Jul 17 21:28:52 MK-Soft-VM5 sshd\[31977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.154
Jul 17 21:28:53 MK-Soft-VM5 sshd\[31977\]: Failed password for invalid user update from 59.25.197.154 port 33582 ssh2
...
2019-07-18 05:43:03
188.131.211.154 attackspam
Jul 17 13:50:49 shared07 sshd[16430]: Invalid user ns from 188.131.211.154
Jul 17 13:50:49 shared07 sshd[16430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.211.154
Jul 17 13:50:51 shared07 sshd[16430]: Failed password for invalid user ns from 188.131.211.154 port 36560 ssh2
Jul 17 13:50:51 shared07 sshd[16430]: Received disconnect from 188.131.211.154 port 36560:11: Bye Bye [preauth]
Jul 17 13:50:51 shared07 sshd[16430]: Disconnected from 188.131.211.154 port 36560 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.131.211.154
2019-07-18 05:46:07

最近上报的IP列表

176.79.175.161 250.148.70.179 128.153.98.146 15.29.32.235
6.47.26.208 32.117.63.234 59.242.118.43 210.208.204.173
26.24.197.68 107.94.116.210 211.101.230.136 233.72.157.183
202.236.214.94 156.61.62.212 53.161.227.58 129.42.46.160
99.192.225.223 178.248.42.165 193.83.84.3 51.100.194.152