必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Getafe

省份(region): Comunidad de Madrid

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.21.140.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.21.140.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025122600 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 26 17:01:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
194.140.21.95.in-addr.arpa domain name pointer 194.pool95-21-140.static.orange.es.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.140.21.95.in-addr.arpa	name = 194.pool95-21-140.static.orange.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.238.99.185 attack
port scan and connect, tcp 23 (telnet)
2019-08-10 12:02:34
122.195.200.148 attackspambots
$f2bV_matches
2019-08-10 11:41:33
49.88.112.69 attackspambots
Failed password for root from 49.88.112.69 port 59559 ssh2
Failed password for root from 49.88.112.69 port 59559 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Failed password for root from 49.88.112.69 port 31983 ssh2
Failed password for root from 49.88.112.69 port 31983 ssh2
2019-08-10 11:52:22
23.129.64.162 attackbotsspam
C1,WP GET /nelson/wp-login.php
2019-08-10 12:03:34
196.3.98.109 attack
Aug 10 04:46:39 mail postfix/smtpd\[11380\]: NOQUEUE: reject: RCPT from unknown\[196.3.98.109\]: 550 5.7.1 \: Recipient address rejected: Message rejected due to: domain owner discourages use of this host. Please see http://www.openspf.net/Why\?s=helo\;id=lss.it\;ip=196.3.98.109\;r=t.nobbenhuis@nobbenhuis.nl\; from=\ to=\ proto=ESMTP helo=\\
2019-08-10 11:24:34
164.132.110.223 attackspam
Aug 10 04:46:36 * sshd[6431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.223
Aug 10 04:46:38 * sshd[6431]: Failed password for invalid user hassan from 164.132.110.223 port 49190 ssh2
2019-08-10 11:25:15
106.241.16.119 attack
Aug 10 05:00:54 plex sshd[20281]: Failed password for invalid user user123 from 106.241.16.119 port 45874 ssh2
Aug 10 05:00:52 plex sshd[20281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.119
Aug 10 05:00:52 plex sshd[20281]: Invalid user user123 from 106.241.16.119 port 45874
Aug 10 05:00:54 plex sshd[20281]: Failed password for invalid user user123 from 106.241.16.119 port 45874 ssh2
Aug 10 05:05:38 plex sshd[20340]: Invalid user nagios from 106.241.16.119 port 39872
2019-08-10 11:22:57
88.99.168.195 attack
Automatic report - Banned IP Access
2019-08-10 11:20:06
106.12.28.124 attack
Aug  9 23:14:18 xtremcommunity sshd\[14372\]: Invalid user ts2 from 106.12.28.124 port 40642
Aug  9 23:14:18 xtremcommunity sshd\[14372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.124
Aug  9 23:14:21 xtremcommunity sshd\[14372\]: Failed password for invalid user ts2 from 106.12.28.124 port 40642 ssh2
Aug  9 23:20:15 xtremcommunity sshd\[14557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.124  user=root
Aug  9 23:20:17 xtremcommunity sshd\[14557\]: Failed password for root from 106.12.28.124 port 34106 ssh2
...
2019-08-10 11:22:10
62.210.151.21 attack
\[2019-08-09 23:28:50\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-09T23:28:50.746-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="892312243078499",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/55205",ACLName="no_extension_match"
\[2019-08-09 23:29:03\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-09T23:29:03.771-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="696813054404227",SessionID="0x7ff4d02d8f48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/65240",ACLName="no_extension_match"
\[2019-08-09 23:29:18\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-09T23:29:18.476-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00098215623860418",SessionID="0x7ff4d046fb18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/65280",ACLName="no_e
2019-08-10 11:41:04
118.42.125.170 attackbotsspam
Aug 10 05:26:35 SilenceServices sshd[14093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170
Aug 10 05:26:38 SilenceServices sshd[14093]: Failed password for invalid user postgres from 118.42.125.170 port 60900 ssh2
Aug 10 05:31:41 SilenceServices sshd[17508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170
2019-08-10 11:33:54
106.12.34.226 attack
Aug 10 05:46:20 srv-4 sshd\[23327\]: Invalid user apache2 from 106.12.34.226
Aug 10 05:46:20 srv-4 sshd\[23327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.226
Aug 10 05:46:22 srv-4 sshd\[23327\]: Failed password for invalid user apache2 from 106.12.34.226 port 48228 ssh2
...
2019-08-10 11:28:34
106.12.49.150 attackbots
Aug  9 23:26:04 vps200512 sshd\[6081\]: Invalid user appltest from 106.12.49.150
Aug  9 23:26:04 vps200512 sshd\[6081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150
Aug  9 23:26:06 vps200512 sshd\[6081\]: Failed password for invalid user appltest from 106.12.49.150 port 50756 ssh2
Aug  9 23:29:13 vps200512 sshd\[6088\]: Invalid user vsifax from 106.12.49.150
Aug  9 23:29:13 vps200512 sshd\[6088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150
2019-08-10 11:37:24
167.99.81.101 attackbots
Aug  9 23:11:46 TORMINT sshd\[17313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101  user=sync
Aug  9 23:11:49 TORMINT sshd\[17313\]: Failed password for sync from 167.99.81.101 port 35292 ssh2
Aug  9 23:15:43 TORMINT sshd\[17543\]: Invalid user juniper from 167.99.81.101
Aug  9 23:15:43 TORMINT sshd\[17543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101
...
2019-08-10 11:36:32
89.210.36.54 attackspambots
Automatic report - Port Scan Attack
2019-08-10 11:45:30

最近上报的IP列表

14.212.103.39 198.176.56.18 8.148.250.59 60.186.77.28
85.217.149.0 203.164.248.129 209.38.27.141 144.123.76.81
39.174.164.164 2408:8207:246d:33a1:c43b:6ae0:adfb:3a8b 143.0.228.212 118.26.111.61
205.202.65.180 212.73.148.12 103.180.29.114 175.178.132.70
45.67.138.138 117.14.112.162 106.117.111.194 27.46.75.12