必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Manchester

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.21.11.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58663
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.21.11.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 08:53:54 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
140.11.21.86.in-addr.arpa domain name pointer asht-08-b2-v4wan-170752-cust395.vm18.cable.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.11.21.86.in-addr.arpa	name = asht-08-b2-v4wan-170752-cust395.vm18.cable.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.120.65.55 attackbotsspam
21 attempts against mh-misbehave-ban on beach.magehost.pro
2019-07-29 03:08:21
39.41.249.237 attackbots
Unauthorised access (Jul 28) SRC=39.41.249.237 LEN=44 TOS=0x08 PREC=0x20 TTL=237 ID=34980 TCP DPT=139 WINDOW=1024 SYN
2019-07-29 03:08:56
188.128.39.130 attackspam
Jul 28 07:17:36 estefan sshd[22332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.130  user=r.r
Jul 28 07:17:37 estefan sshd[22332]: Failed password for r.r from 188.128.39.130 port 37328 ssh2
Jul 28 07:17:37 estefan sshd[22333]: Received disconnect from 188.128.39.130: 11: Bye Bye
Jul 28 07:27:56 estefan sshd[22402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.130  user=r.r
Jul 28 07:27:57 estefan sshd[22402]: Failed password for r.r from 188.128.39.130 port 40752 ssh2
Jul 28 07:27:58 estefan sshd[22403]: Received disconnect from 188.128.39.130: 11: Bye Bye
Jul 28 07:32:33 estefan sshd[22425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.130  user=r.r
Jul 28 07:32:36 estefan sshd[22425]: Failed password for r.r from 188.128.39.130 port 36510 ssh2
Jul 28 07:32:36 estefan sshd[22426]: Received disconnect from 1........
-------------------------------
2019-07-29 03:18:40
198.20.103.242 attack
Automatic report - Banned IP Access
2019-07-29 03:12:18
194.35.43.203 attackbotsspam
Jul 28 21:41:26 srv-4 sshd\[14721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.35.43.203  user=root
Jul 28 21:41:28 srv-4 sshd\[14721\]: Failed password for root from 194.35.43.203 port 8673 ssh2
Jul 28 21:49:34 srv-4 sshd\[15572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.35.43.203  user=root
...
2019-07-29 03:13:48
175.144.105.181 attackbots
http
2019-07-29 03:21:06
185.220.101.28 attackspambots
Jul 28 07:54:51 cac1d2 sshd\[26435\]: Invalid user admin1 from 185.220.101.28 port 44927
Jul 28 07:54:51 cac1d2 sshd\[26435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.28
Jul 28 07:54:53 cac1d2 sshd\[26435\]: Failed password for invalid user admin1 from 185.220.101.28 port 44927 ssh2
...
2019-07-29 03:42:27
218.3.139.85 attackspambots
Jul 28 18:36:06 localhost sshd\[120359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85  user=root
Jul 28 18:36:08 localhost sshd\[120359\]: Failed password for root from 218.3.139.85 port 41214 ssh2
Jul 28 18:38:37 localhost sshd\[120454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85  user=root
Jul 28 18:38:39 localhost sshd\[120454\]: Failed password for root from 218.3.139.85 port 54221 ssh2
Jul 28 18:41:12 localhost sshd\[120592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85  user=root
...
2019-07-29 03:00:14
119.28.14.154 attackbotsspam
Jul 28 16:56:38 vps647732 sshd[22466]: Failed password for root from 119.28.14.154 port 59314 ssh2
...
2019-07-29 03:13:18
188.165.23.42 attackbots
Automatic report - Banned IP Access
2019-07-29 03:24:22
24.18.38.136 attack
28.07.2019 16:21:20 SSH access blocked by firewall
2019-07-29 03:25:59
59.63.208.191 attackbots
Jul 28 13:19:30 MK-Soft-VM3 sshd\[6471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.208.191  user=root
Jul 28 13:19:32 MK-Soft-VM3 sshd\[6471\]: Failed password for root from 59.63.208.191 port 49528 ssh2
Jul 28 13:20:58 MK-Soft-VM3 sshd\[6524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.208.191  user=root
...
2019-07-29 03:44:04
222.165.182.130 attack
/wp-login.php
2019-07-29 03:46:06
147.158.98.59 attackspam
http
2019-07-29 03:19:01
192.227.144.218 attack
SMB Server BruteForce Attack
2019-07-29 03:05:31

最近上报的IP列表

116.11.244.16 72.200.221.237 250.140.161.252 227.184.33.160
136.7.2.56 203.210.199.11 157.55.143.41 155.247.206.115
205.100.203.172 97.151.21.220 244.137.13.28 23.111.181.170
160.139.125.149 114.192.117.134 103.223.97.173 98.122.66.24
138.77.81.212 235.120.65.112 77.141.11.129 18.234.235.160