必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.40.142.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.40.142.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 14:49:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 126.142.40.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.142.40.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.117.151.197 attackspambots
Jul  4 17:52:21 hosting sshd[1116]: Invalid user yao from 188.117.151.197 port 27372
...
2019-07-05 02:03:12
121.15.140.178 attackspambots
Jul  4 13:26:50 localhost sshd\[76647\]: Invalid user cms from 121.15.140.178 port 43212
Jul  4 13:26:50 localhost sshd\[76647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.140.178
Jul  4 13:26:52 localhost sshd\[76647\]: Failed password for invalid user cms from 121.15.140.178 port 43212 ssh2
Jul  4 13:29:30 localhost sshd\[76687\]: Invalid user dockeruser from 121.15.140.178 port 37174
Jul  4 13:29:30 localhost sshd\[76687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.140.178
...
2019-07-05 01:40:26
95.65.243.58 attackspam
2019-07-04 14:26:18 unexpected disconnection while reading SMTP command from ([95.65.243.58]) [95.65.243.58]:23325 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-04 14:51:54 unexpected disconnection while reading SMTP command from ([95.65.243.58]) [95.65.243.58]:27634 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-04 14:52:33 unexpected disconnection while reading SMTP command from ([95.65.243.58]) [95.65.243.58]:27868 I=[10.100.18.22]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=95.65.243.58
2019-07-05 01:35:18
132.232.101.100 attackbots
Reported by AbuseIPDB proxy server.
2019-07-05 01:47:33
36.74.75.31 attackbotsspam
$f2bV_matches
2019-07-05 01:56:51
181.65.186.185 attackbots
Apr 16 19:51:50 yesfletchmain sshd\[21408\]: Invalid user aa from 181.65.186.185 port 41880
Apr 16 19:51:50 yesfletchmain sshd\[21408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.186.185
Apr 16 19:51:52 yesfletchmain sshd\[21408\]: Failed password for invalid user aa from 181.65.186.185 port 41880 ssh2
Apr 16 19:54:52 yesfletchmain sshd\[21488\]: Invalid user pw from 181.65.186.185 port 55837
Apr 16 19:54:52 yesfletchmain sshd\[21488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.186.185
...
2019-07-05 02:06:35
193.124.129.130 attackbots
firewall-block, port(s): 445/tcp
2019-07-05 02:06:14
41.136.83.48 attackbots
2019-07-04 14:59:53 unexpected disconnection while reading SMTP command from ([41.136.83.48]) [41.136.83.48]:18917 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 15:01:49 unexpected disconnection while reading SMTP command from ([41.136.83.48]) [41.136.83.48]:50689 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 15:02:00 unexpected disconnection while reading SMTP command from ([41.136.83.48]) [41.136.83.48]:62767 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.136.83.48
2019-07-05 02:15:52
102.159.35.17 attack
2019-07-04 14:50:28 unexpected disconnection while reading SMTP command from ([102.159.35.17]) [102.159.35.17]:18958 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:51:47 unexpected disconnection while reading SMTP command from ([102.159.35.17]) [102.159.35.17]:60510 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:52:12 unexpected disconnection while reading SMTP command from ([102.159.35.17]) [102.159.35.17]:51523 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.159.35.17
2019-07-05 01:31:08
45.122.221.235 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-07-05 01:23:48
185.53.88.63 attackspambots
*Port Scan* detected from 185.53.88.63 (NL/Netherlands/-). 4 hits in the last 221 seconds
2019-07-05 01:50:43
107.170.48.143 attackbots
107.170.48.143 - - [04/Jul/2019:17:40:16 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:17 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:17 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:18 +0200] "POST /wp-login.php HTTP/1.1" 200 1631 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
107.170.48.143 - - [04/Jul/2019:17:40:19 +0200] "POST /wp-login.php HTTP/1.1" 200 1630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-05 01:26:40
113.116.89.124 attackbots
Lines containing failures of 113.116.89.124
Jul  4 14:51:59 shared12 sshd[8951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.116.89.124  user=r.r
Jul  4 14:52:00 shared12 sshd[8951]: Failed password for r.r from 113.116.89.124 port 41330 ssh2
Jul  4 14:52:03 shared12 sshd[8951]: Failed password for r.r from 113.116.89.124 port 41330 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.116.89.124
2019-07-05 01:25:39
103.242.110.16 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 02:13:40
39.48.47.150 attackbots
2019-07-04 14:59:18 unexpected disconnection while reading SMTP command from ([39.48.47.150]) [39.48.47.150]:47110 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 15:00:33 unexpected disconnection while reading SMTP command from ([39.48.47.150]) [39.48.47.150]:25223 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 15:02:16 unexpected disconnection while reading SMTP command from ([39.48.47.150]) [39.48.47.150]:16032 I=[10.100.18.21]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.48.47.150
2019-07-05 02:08:44

最近上报的IP列表

252.224.46.16 232.235.254.7 30.93.96.143 238.13.32.74
20.203.96.83 49.145.31.239 33.154.160.122 162.20.247.228
211.74.244.194 247.240.205.179 252.193.221.4 185.188.66.205
64.226.56.182 48.207.123.251 61.52.133.249 243.252.190.174
245.128.153.166 108.161.68.166 57.142.226.84 91.62.42.29