必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.20.119.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51936
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.20.119.40.			IN	A

;; AUTHORITY SECTION:
.			2511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072901 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 30 07:40:41 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 40.119.20.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 40.119.20.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.118.7.202 attackbotsspam
1578631992 - 01/10/2020 05:53:12 Host: 122.118.7.202/122.118.7.202 Port: 445 TCP Blocked
2020-01-10 16:26:34
1.203.115.141 attackspambots
Jan 10 09:52:48 gw1 sshd[2999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141
Jan 10 09:52:50 gw1 sshd[2999]: Failed password for invalid user administrator from 1.203.115.141 port 48451 ssh2
...
2020-01-10 16:42:25
88.84.202.11 attackspam
20/1/9@23:52:11: FAIL: Alarm-Network address from=88.84.202.11
20/1/9@23:52:12: FAIL: Alarm-Network address from=88.84.202.11
...
2020-01-10 17:04:33
71.46.255.70 attackbotsspam
Jan  9 23:52:57 mail sshd\[45143\]: Invalid user zena from 71.46.255.70
Jan  9 23:52:57 mail sshd\[45143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.46.255.70
...
2020-01-10 16:36:35
132.248.88.78 attackbotsspam
Jan  9 22:20:03 php1 sshd\[9391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.88.78  user=root
Jan  9 22:20:05 php1 sshd\[9391\]: Failed password for root from 132.248.88.78 port 41533 ssh2
Jan  9 22:22:44 php1 sshd\[9675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.88.78  user=root
Jan  9 22:22:46 php1 sshd\[9675\]: Failed password for root from 132.248.88.78 port 57873 ssh2
Jan  9 22:25:32 php1 sshd\[9954\]: Invalid user test123 from 132.248.88.78
Jan  9 22:25:32 php1 sshd\[9954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.88.78
2020-01-10 16:33:50
103.207.11.12 attackbots
Jan 10 05:49:31 legacy sshd[23212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12
Jan 10 05:49:33 legacy sshd[23212]: Failed password for invalid user ekain from 103.207.11.12 port 55388 ssh2
Jan 10 05:53:07 legacy sshd[23465]: Failed password for root from 103.207.11.12 port 58126 ssh2
...
2020-01-10 16:28:58
144.76.174.7 attackbots
144.76.174.7 - - - [10/Jan/2020:08:08:21 +0000] "GET /?author=1 HTTP/1.1" 404 564 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" "-" "-"
2020-01-10 16:28:15
220.80.184.135 attack
Automatic report - SSH Brute-Force Attack
2020-01-10 16:31:42
112.215.113.10 attackbotsspam
Jan 10 08:14:48 mail sshd\[4398\]: Invalid user oy from 112.215.113.10
Jan 10 08:14:48 mail sshd\[4398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10
Jan 10 08:14:50 mail sshd\[4398\]: Failed password for invalid user oy from 112.215.113.10 port 58572 ssh2
...
2020-01-10 16:50:29
103.74.123.41 attack
Automatic report - XMLRPC Attack
2020-01-10 16:30:45
188.138.41.207 attack
10.01.2020 05:52:29 - Bad Robot 
Ignore Robots.txt
2020-01-10 16:57:04
123.207.142.31 attackbots
Jan 10 05:55:35 ip-172-31-62-245 sshd\[30927\]: Invalid user tao from 123.207.142.31\
Jan 10 05:55:37 ip-172-31-62-245 sshd\[30927\]: Failed password for invalid user tao from 123.207.142.31 port 45501 ssh2\
Jan 10 05:59:05 ip-172-31-62-245 sshd\[31009\]: Invalid user oracle from 123.207.142.31\
Jan 10 05:59:07 ip-172-31-62-245 sshd\[31009\]: Failed password for invalid user oracle from 123.207.142.31 port 58498 ssh2\
Jan 10 06:02:29 ip-172-31-62-245 sshd\[31043\]: Failed password for root from 123.207.142.31 port 43262 ssh2\
2020-01-10 17:01:25
188.166.246.46 attack
Jan 10 06:17:38 plex sshd[773]: Invalid user viper from 188.166.246.46 port 59862
2020-01-10 16:40:17
125.64.94.221 attack
Port scan: Attack repeated for 24 hours
2020-01-10 16:39:50
134.73.51.136 attackbotsspam
2020-01-10 1ipkS2-0003sX-OW H=ladybug.yojaana.com \(ladybug.miladelevator.co\) \[134.73.51.136\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-01-10 H=ladybug.yojaana.com \(ladybug.miladelevator.co\) \[134.73.51.136\] F=\ rejected RCPT \<**REMOVED**@**REMOVED**.de\>: Mail not accepted. 134.73.51.136 is listed at a DNSBL.
2020-01-10 H=ladybug.yojaana.com \(ladybug.miladelevator.co\) \[134.73.51.136\] F=\ rejected RCPT \: Mail not accepted. 134.73.51.136 is listed at a DNSBL.
2020-01-10 16:55:48

最近上报的IP列表

182.187.80.124 182.72.106.122 182.185.153.141 180.211.233.195
52.29.81.56 54.66.175.107 178.88.232.96 158.189.99.181
11.251.110.188 126.28.58.199 177.38.187.164 176.209.83.23
174.22.39.72 113.122.108.123 246.205.71.235 255.32.145.198
244.5.72.72 52.237.132.31 42.118.70.247 194.230.148.37