必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.211.40.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.211.40.139.			IN	A

;; AUTHORITY SECTION:
.			464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:19:19 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.40.211.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.40.211.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
71.6.158.166 attack
71.6.158.166 - - [05/Mar/2020:09:06:32 +0800] "quit" 400 150 "-" "-" "-"
2020-03-05 16:13:23
178.204.249.170 attackspam
Unauthorized connection attempt from IP address 178.204.249.170 on Port 445(SMB)
2020-03-05 16:20:41
36.72.213.227 attackspambots
1583383817 - 03/05/2020 05:50:17 Host: 36.72.213.227/36.72.213.227 Port: 445 TCP Blocked
2020-03-05 16:33:02
212.64.40.35 attackbots
Mar  5 06:00:26 mail sshd\[16865\]: Invalid user git from 212.64.40.35
Mar  5 06:00:26 mail sshd\[16865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.35
Mar  5 06:00:28 mail sshd\[16865\]: Failed password for invalid user git from 212.64.40.35 port 46860 ssh2
...
2020-03-05 16:24:21
178.128.187.104 attackbotsspam
abuseConfidenceScore blocked for 12h
2020-03-05 16:43:59
178.216.251.21 attack
03/04/2020-23:50:22.296778 178.216.251.21 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-05 16:28:26
92.63.194.25 attackbotsspam
Mar  5 09:14:17 OPSO sshd\[1874\]: Invalid user Administrator from 92.63.194.25 port 37755
Mar  5 09:14:17 OPSO sshd\[1874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.25
Mar  5 09:14:20 OPSO sshd\[1874\]: Failed password for invalid user Administrator from 92.63.194.25 port 37755 ssh2
Mar  5 09:14:38 OPSO sshd\[1950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.25  user=root
Mar  5 09:14:40 OPSO sshd\[1950\]: Failed password for root from 92.63.194.25 port 34263 ssh2
2020-03-05 16:25:25
121.11.111.230 attackbots
2020-03-05T08:50:55.567165  sshd[23239]: Invalid user openvpn_as from 121.11.111.230 port 38370
2020-03-05T08:50:55.580425  sshd[23239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.11.111.230
2020-03-05T08:50:55.567165  sshd[23239]: Invalid user openvpn_as from 121.11.111.230 port 38370
2020-03-05T08:50:57.248864  sshd[23239]: Failed password for invalid user openvpn_as from 121.11.111.230 port 38370 ssh2
...
2020-03-05 16:14:51
165.22.33.32 attack
Mar  5 08:46:40 sd-53420 sshd\[13615\]: Invalid user qdxx from 165.22.33.32
Mar  5 08:46:40 sd-53420 sshd\[13615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32
Mar  5 08:46:42 sd-53420 sshd\[13615\]: Failed password for invalid user qdxx from 165.22.33.32 port 56404 ssh2
Mar  5 08:52:49 sd-53420 sshd\[14159\]: Invalid user wangyu from 165.22.33.32
Mar  5 08:52:49 sd-53420 sshd\[14159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32
...
2020-03-05 16:10:45
165.227.53.38 attackspam
2020-03-05T08:15:44.285215shield sshd\[1929\]: Invalid user openfiler from 165.227.53.38 port 35480
2020-03-05T08:15:44.289319shield sshd\[1929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.53.38
2020-03-05T08:15:45.706251shield sshd\[1929\]: Failed password for invalid user openfiler from 165.227.53.38 port 35480 ssh2
2020-03-05T08:24:47.726998shield sshd\[2861\]: Invalid user wangyw from 165.227.53.38 port 43474
2020-03-05T08:24:47.733750shield sshd\[2861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.53.38
2020-03-05 16:32:28
92.63.194.32 attackbotsspam
Mar  5 09:12:11 localhost sshd\[22819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32  user=root
Mar  5 09:12:13 localhost sshd\[22819\]: Failed password for root from 92.63.194.32 port 41875 ssh2
Mar  5 09:12:35 localhost sshd\[22906\]: Invalid user admin from 92.63.194.32
Mar  5 09:12:35 localhost sshd\[22906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32
Mar  5 09:12:37 localhost sshd\[22906\]: Failed password for invalid user admin from 92.63.194.32 port 44437 ssh2
...
2020-03-05 16:16:54
68.183.190.43 attackspam
$f2bV_matches
2020-03-05 16:18:35
112.133.229.67 attack
1583383803 - 03/05/2020 05:50:03 Host: 112.133.229.67/112.133.229.67 Port: 445 TCP Blocked
2020-03-05 16:41:20
37.49.231.163 attackspam
Mar  5 09:03:31 debian-2gb-nbg1-2 kernel: \[5654582.573725\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.231.163 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=57424 PROTO=TCP SPT=46234 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-05 16:29:32
111.93.4.174 attackspambots
Brute force attempt
2020-03-05 16:04:11

最近上报的IP列表

103.211.219.238 103.211.49.196 103.211.55.113 103.212.120.60
104.21.61.46 103.212.121.225 103.211.61.252 103.212.121.73
103.212.181.141 103.212.121.241 103.212.225.132 103.212.121.53
103.212.121.91 103.212.232.248 103.212.69.180 103.212.71.150
103.213.0.34 103.213.213.191 103.213.195.130 103.214.112.18