必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.55.166.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.55.166.40.			IN	A

;; AUTHORITY SECTION:
.			38	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:06:37 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 40.166.55.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.166.55.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
184.30.210.217 attack
10/18/2019-22:10:39.517266 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-19 04:40:02
49.234.217.80 attackbotsspam
Oct 18 22:47:24 vps647732 sshd[28531]: Failed password for root from 49.234.217.80 port 52676 ssh2
...
2019-10-19 04:56:27
202.47.51.150 attackspambots
202.47.51.150 - - [18/Oct/2019:15:52:20 -0400] "GET /?page=products&action=view&manufacturerID=36&productID=../../../../../../etc/passwd%00&linkID=13130 HTTP/1.1" 302 - "https://simplexlock.com/?page=products&action=view&manufacturerID=36&productID=../../../../../../etc/passwd%00&linkID=13130" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-10-19 05:01:12
51.38.126.92 attack
Oct 18 23:06:24 pkdns2 sshd\[45915\]: Invalid user hj from 51.38.126.92Oct 18 23:06:26 pkdns2 sshd\[45915\]: Failed password for invalid user hj from 51.38.126.92 port 51684 ssh2Oct 18 23:10:22 pkdns2 sshd\[46096\]: Invalid user security from 51.38.126.92Oct 18 23:10:24 pkdns2 sshd\[46096\]: Failed password for invalid user security from 51.38.126.92 port 34604 ssh2Oct 18 23:14:17 pkdns2 sshd\[46224\]: Invalid user monit from 51.38.126.92Oct 18 23:14:20 pkdns2 sshd\[46224\]: Failed password for invalid user monit from 51.38.126.92 port 45764 ssh2
...
2019-10-19 04:43:53
60.250.23.105 attackbots
$f2bV_matches
2019-10-19 05:02:11
159.89.169.137 attackspambots
Oct 18 16:05:46 xtremcommunity sshd\[654493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137  user=root
Oct 18 16:05:48 xtremcommunity sshd\[654493\]: Failed password for root from 159.89.169.137 port 47486 ssh2
Oct 18 16:10:03 xtremcommunity sshd\[654703\]: Invalid user dave2 from 159.89.169.137 port 58334
Oct 18 16:10:03 xtremcommunity sshd\[654703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137
Oct 18 16:10:05 xtremcommunity sshd\[654703\]: Failed password for invalid user dave2 from 159.89.169.137 port 58334 ssh2
...
2019-10-19 04:29:40
121.166.26.234 attackbotsspam
Oct 18 07:07:04 nxxxxxxx sshd[18566]: Invalid user cloud from 121.166.26.234
Oct 18 07:07:04 nxxxxxxx sshd[18566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.26.234 
Oct 18 07:07:07 nxxxxxxx sshd[18566]: Failed password for invalid user cloud from 121.166.26.234 port 54364 ssh2
Oct 18 07:07:07 nxxxxxxx sshd[18566]: Received disconnect from 121.166.26.234: 11: Bye Bye [preauth]
Oct 18 07:23:14 nxxxxxxx sshd[19685]: Invalid user webuser from 121.166.26.234
Oct 18 07:23:14 nxxxxxxx sshd[19685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.26.234 
Oct 18 07:23:16 nxxxxxxx sshd[19685]: Failed password for invalid user webuser from 121.166.26.234 port 43914 ssh2
Oct 18 07:23:16 nxxxxxxx sshd[19685]: Received disconnect from 121.166.26.234: 11: Bye Bye [preauth]
Oct 18 07:27:51 nxxxxxxx sshd[19971]: Invalid user test from 121.166.26.234
Oct 18 07:27:51 nxxxxxxx sshd[19971]: ........
-------------------------------
2019-10-19 04:50:18
54.38.184.235 attackspambots
Oct 18 23:30:17 sauna sshd[51856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235
Oct 18 23:30:19 sauna sshd[51856]: Failed password for invalid user disklessadmin from 54.38.184.235 port 57512 ssh2
...
2019-10-19 04:41:38
159.203.201.122 attackbots
10/18/2019-21:52:22.274548 159.203.201.122 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-10-19 05:02:59
95.53.192.44 attackbotsspam
[munged]::443 95.53.192.44 - - [18/Oct/2019:21:52:25 +0200] "POST /[munged]: HTTP/1.1" 200 8165 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 95.53.192.44 - - [18/Oct/2019:21:52:26 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 95.53.192.44 - - [18/Oct/2019:21:52:27 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 95.53.192.44 - - [18/Oct/2019:21:52:27 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 95.53.192.44 - - [18/Oct/2019:21:52:28 +0200] "POST /[munged]: HTTP/1.1" 200 4388 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 95.53.192.44 - - [18/Oct/2019:21:52:29 +0200]
2019-10-19 04:55:32
218.197.16.152 attackbots
Oct 18 22:57:33 MK-Soft-Root1 sshd[12106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.197.16.152 
Oct 18 22:57:35 MK-Soft-Root1 sshd[12106]: Failed password for invalid user ashish from 218.197.16.152 port 47320 ssh2
...
2019-10-19 05:02:24
202.158.49.140 attackspam
(From dyan.adkins@gmail.com) Do you want more people to visit your website? Receive thousands of keyword targeted visitors directly to your site. Boost your profits fast. Start seeing results in as little as 48 hours. For additional information write a reply to: paul5854sau@gmail.com
2019-10-19 04:35:18
112.85.42.227 attackbots
Oct 18 16:37:47 TORMINT sshd\[11769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Oct 18 16:37:49 TORMINT sshd\[11769\]: Failed password for root from 112.85.42.227 port 43782 ssh2
Oct 18 16:38:21 TORMINT sshd\[11810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-10-19 04:42:51
113.229.2.181 attackbotsspam
Unauthorised access (Oct 18) SRC=113.229.2.181 LEN=40 TTL=49 ID=36707 TCP DPT=23 WINDOW=38467 SYN 
Unauthorised access (Oct 18) SRC=113.229.2.181 LEN=40 TTL=49 ID=16950 TCP DPT=8080 WINDOW=5563 SYN 
Unauthorised access (Oct 17) SRC=113.229.2.181 LEN=40 TTL=49 ID=32064 TCP DPT=8080 WINDOW=63850 SYN 
Unauthorised access (Oct 17) SRC=113.229.2.181 LEN=40 TTL=49 ID=61833 TCP DPT=8080 WINDOW=23105 SYN 
Unauthorised access (Oct 17) SRC=113.229.2.181 LEN=40 TTL=49 ID=47030 TCP DPT=8080 WINDOW=63850 SYN 
Unauthorised access (Oct 16) SRC=113.229.2.181 LEN=40 TTL=49 ID=3095 TCP DPT=8080 WINDOW=40523 SYN 
Unauthorised access (Oct 15) SRC=113.229.2.181 LEN=40 TTL=49 ID=8159 TCP DPT=8080 WINDOW=23105 SYN
2019-10-19 04:56:51
92.222.47.41 attackbotsspam
Oct 18 22:31:40 SilenceServices sshd[663]: Failed password for root from 92.222.47.41 port 33234 ssh2
Oct 18 22:35:35 SilenceServices sshd[1723]: Failed password for root from 92.222.47.41 port 44970 ssh2
2019-10-19 04:41:10

最近上报的IP列表

54.90.220.159 183.107.120.67 51.15.228.227 41.57.108.247
23.254.243.251 103.109.56.97 60.13.7.47 201.192.179.198
45.33.78.252 36.5.103.252 58.216.78.127 2.206.57.4
93.81.212.144 77.32.68.1 81.69.242.110 184.22.248.77
183.220.92.136 177.249.169.202 187.94.111.130 43.130.47.67