必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.106.62.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.106.62.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:58:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
140.62.106.99.in-addr.arpa domain name pointer 99-106-62-140.lightspeed.hstntx.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.62.106.99.in-addr.arpa	name = 99-106-62-140.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
40.121.5.100 attack
$f2bV_matches
2020-07-14 23:12:56
221.133.18.250 attackspam
1594732450 - 07/14/2020 15:14:10 Host: 221.133.18.250/221.133.18.250 Port: 445 TCP Blocked
2020-07-14 23:27:22
190.39.143.179 attackbotsspam
Port probing on unauthorized port 445
2020-07-14 22:59:06
103.78.209.204 attackbots
 TCP (SYN) 103.78.209.204:50948 -> port 8211, len 44
2020-07-14 23:40:40
52.149.183.196 attack
Jul 14 15:53:33 ns382633 sshd\[24217\]: Invalid user pro from 52.149.183.196 port 6861
Jul 14 15:53:33 ns382633 sshd\[24218\]: Invalid user mail.tipi.pro from 52.149.183.196 port 6862
Jul 14 15:53:33 ns382633 sshd\[24217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.149.183.196
Jul 14 15:53:33 ns382633 sshd\[24218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.149.183.196
Jul 14 15:53:33 ns382633 sshd\[24219\]: Invalid user tipi from 52.149.183.196 port 6860
Jul 14 15:53:33 ns382633 sshd\[24219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.149.183.196
2020-07-14 23:01:08
46.38.145.254 attackspambots
2020-07-14 15:37:12 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=yellow07@mail.csmailer.org)
2020-07-14 15:38:37 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=wonton!@mail.csmailer.org)
2020-07-14 15:39:59 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=xanderxxx@mail.csmailer.org)
2020-07-14 15:41:22 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=warrior6@mail.csmailer.org)
2020-07-14 15:42:43 auth_plain authenticator failed for (User) [46.38.145.254]: 535 Incorrect authentication data (set_id=wood91@mail.csmailer.org)
...
2020-07-14 23:41:14
181.143.172.106 attackspambots
Jul 14 20:19:14 dhoomketu sshd[1514840]: Invalid user ftp_user from 181.143.172.106 port 17075
Jul 14 20:19:14 dhoomketu sshd[1514840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.172.106 
Jul 14 20:19:14 dhoomketu sshd[1514840]: Invalid user ftp_user from 181.143.172.106 port 17075
Jul 14 20:19:15 dhoomketu sshd[1514840]: Failed password for invalid user ftp_user from 181.143.172.106 port 17075 ssh2
Jul 14 20:23:41 dhoomketu sshd[1514887]: Invalid user edith from 181.143.172.106 port 17673
...
2020-07-14 23:32:00
191.232.166.233 attackspam
[Tue Jul 14 13:13:40 2020] Failed password for r.r from 191.232.166.233 port 13089 ssh2
[Tue Jul 14 13:13:40 2020] Failed password for r.r from 191.232.166.233 port 13086 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for r.r from 191.232.166.233 port 13085 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for r.r from 191.232.166.233 port 13088 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for invalid user webserver.iddos-domain.tld from 191.232.166.233 port 13083 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for invalid user admin from 191.232.166.233 port 13093 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for invalid user ispgateway from 191.232.166.233 port 13072 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for invalid user ispgateway from 191.232.166.233 port 13077 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for invalid user ispgateway from 191.232.166.233 port 13075 ssh2
[Tue Jul 14 13:13:41 2020] Failed password for invalid user webserver from 191.23........
-------------------------------
2020-07-14 23:12:23
23.129.64.205 attack
proto=tcp  .  spt=36376  .  dpt=25  .     Found on   The Onion Router Exit      (101)
2020-07-14 23:02:55
52.231.162.132 attackspambots
Jul 14 13:39:09 vlre-nyc-1 sshd\[24672\]: Invalid user govlre from 52.231.162.132
Jul 14 13:39:09 vlre-nyc-1 sshd\[24672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.162.132
Jul 14 13:39:09 vlre-nyc-1 sshd\[24673\]: Invalid user govlre.com from 52.231.162.132
Jul 14 13:39:09 vlre-nyc-1 sshd\[24673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.162.132
Jul 14 13:39:11 vlre-nyc-1 sshd\[24672\]: Failed password for invalid user govlre from 52.231.162.132 port 18913 ssh2
...
2020-07-14 23:20:43
192.42.116.20 attackbots
Automatic report - Banned IP Access
2020-07-14 23:33:54
52.171.37.161 attack
Jul 14 15:48:53 PorscheCustomer sshd[6414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.171.37.161
Jul 14 15:48:53 PorscheCustomer sshd[6416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.171.37.161
Jul 14 15:48:55 PorscheCustomer sshd[6414]: Failed password for invalid user xpandity from 52.171.37.161 port 7457 ssh2
...
2020-07-14 23:00:45
13.72.73.88 attackspam
Auto Fail2Ban report, multiple SSH login attempts.
2020-07-14 23:03:54
60.30.98.194 attackbotsspam
Jul 14 15:10:08 plex-server sshd[797041]: Invalid user squid from 60.30.98.194 port 65226
Jul 14 15:10:08 plex-server sshd[797041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.98.194 
Jul 14 15:10:08 plex-server sshd[797041]: Invalid user squid from 60.30.98.194 port 65226
Jul 14 15:10:10 plex-server sshd[797041]: Failed password for invalid user squid from 60.30.98.194 port 65226 ssh2
Jul 14 15:12:05 plex-server sshd[798111]: Invalid user gc from 60.30.98.194 port 25508
...
2020-07-14 23:14:26
40.71.171.254 attackbots
2020-07-14T13:52:32.192237Z ff8d3de18bfc New connection: 40.71.171.254:2769 (172.17.0.2:2222) [session: ff8d3de18bfc]
2020-07-14T13:52:32.193915Z acb86ba1b0e3 New connection: 40.71.171.254:2770 (172.17.0.2:2222) [session: acb86ba1b0e3]
2020-07-14T13:52:32.207680Z 51898856b2fe New connection: 40.71.171.254:2771 (172.17.0.2:2222) [session: 51898856b2fe]
2020-07-14 23:19:13

最近上报的IP列表

233.48.159.155 199.236.73.252 204.156.155.87 45.209.137.250
224.158.74.211 66.91.117.7 199.114.145.49 30.20.150.178
250.138.143.196 168.176.131.246 173.226.146.172 156.233.173.14
204.40.34.176 185.254.73.115 64.2.39.31 106.202.13.102
42.33.170.255 6.39.188.49 98.70.242.72 45.237.47.25