必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hangzhou

省份(region): Zhejiang

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.40.42.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.40.42.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025080800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 09 01:30:06 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 45.42.40.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.42.40.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.24.143.233 attack
Nov 28 07:30:23 srv206 sshd[4496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233  user=root
Nov 28 07:30:26 srv206 sshd[4496]: Failed password for root from 118.24.143.233 port 32837 ssh2
...
2019-11-28 15:02:50
218.92.0.187 attackbotsspam
Nov 28 07:30:54 vps666546 sshd\[3953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187  user=root
Nov 28 07:30:56 vps666546 sshd\[3953\]: Failed password for root from 218.92.0.187 port 37845 ssh2
Nov 28 07:30:59 vps666546 sshd\[3953\]: Failed password for root from 218.92.0.187 port 37845 ssh2
Nov 28 07:31:03 vps666546 sshd\[3953\]: Failed password for root from 218.92.0.187 port 37845 ssh2
Nov 28 07:31:06 vps666546 sshd\[3953\]: Failed password for root from 218.92.0.187 port 37845 ssh2
...
2019-11-28 14:42:40
222.186.175.140 attackbotsspam
Nov 28 07:13:16 localhost sshd\[29969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Nov 28 07:13:18 localhost sshd\[29969\]: Failed password for root from 222.186.175.140 port 54974 ssh2
Nov 28 07:13:21 localhost sshd\[29969\]: Failed password for root from 222.186.175.140 port 54974 ssh2
...
2019-11-28 15:13:28
151.50.110.118 attack
Automatic report - Port Scan Attack
2019-11-28 14:53:19
41.93.32.88 attack
Nov 28 11:31:06 gw1 sshd[19771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88
Nov 28 11:31:07 gw1 sshd[19771]: Failed password for invalid user collazos from 41.93.32.88 port 47784 ssh2
...
2019-11-28 14:50:55
222.186.175.183 attack
$f2bV_matches
2019-11-28 14:21:11
36.155.102.52 attackbots
11/28/2019-01:30:23.259039 36.155.102.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-28 15:09:53
106.52.54.18 attackbotsspam
2019-11-28T07:14:01.384735tmaserv sshd\[17433\]: Failed password for invalid user test from 106.52.54.18 port 56718 ssh2
2019-11-28T08:20:45.833667tmaserv sshd\[20693\]: Invalid user nazrin from 106.52.54.18 port 39644
2019-11-28T08:20:45.839011tmaserv sshd\[20693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.54.18
2019-11-28T08:20:47.385735tmaserv sshd\[20693\]: Failed password for invalid user nazrin from 106.52.54.18 port 39644 ssh2
2019-11-28T08:28:02.398041tmaserv sshd\[21114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.54.18  user=root
2019-11-28T08:28:04.271325tmaserv sshd\[21114\]: Failed password for root from 106.52.54.18 port 44046 ssh2
...
2019-11-28 15:05:31
58.213.198.77 attackbots
Nov 28 03:05:26 ldap01vmsma01 sshd[43565]: Failed password for daemon from 58.213.198.77 port 42656 ssh2
...
2019-11-28 15:07:54
222.186.180.223 attack
2019-11-14 10:16:53,676 fail2ban.actions        [842]: NOTICE  [sshd] Ban 222.186.180.223
2019-11-14 13:49:30,570 fail2ban.actions        [842]: NOTICE  [sshd] Ban 222.186.180.223
2019-11-14 20:17:08,565 fail2ban.actions        [842]: NOTICE  [sshd] Ban 222.186.180.223
...
2019-11-28 14:27:18
35.239.243.107 attackspambots
35.239.243.107 - - \[28/Nov/2019:06:30:49 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.239.243.107 - - \[28/Nov/2019:06:30:50 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-28 14:51:21
107.175.61.58 attackspam
Unauthorized admin access Joomla
2019-11-28 15:12:26
202.39.70.5 attack
Nov 28 07:18:42 SilenceServices sshd[12201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
Nov 28 07:18:44 SilenceServices sshd[12201]: Failed password for invalid user marleejo from 202.39.70.5 port 58128 ssh2
Nov 28 07:25:41 SilenceServices sshd[14105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
2019-11-28 14:26:52
67.227.165.179 attack
Investment Fraud Website

http://mailer212.letians.a.clickbetter.com/
http://clickbetter.com/a.php?vendor=letians
67.227.165.179

Return-Path: 
Received: from source:[160.20.13.23] helo:comfortart.best
From: " Roberta" 
Date: Wed, 27 Nov 2019 17:18:21 -0500
MIME-Version: 1.0
Subject: Well well, would you look at this one
Message-ID: 

http://www.comfortart.best/rtodgeqe/rxpf51081vxubws/c_____0/W_____q
JAVASCRIPT redirect to
http://www.comfortart.best/offer.php?id=2&sid=730314&h=
META redirect to
http://www.comfortart.best/click/smart3/passiveincome_cbet.php?sid=730314&h=
107.175.246.210
 
http://mailer212.letians.a.clickbetter.com/
67.227.165.179
302 Temporary redirect to
http://clickbetter.com/a.php?vendor=letians&id=mailer212&testurl=&subtid=&pid=¶m=&aemail=&lp=&coty=
67.227.165.179
302 Temporary redirect to
http://easyretiredmillionaire.com/clickbetter.php?cbid=mailer212
198.1.124.203
2019-11-28 15:13:00
178.128.84.200 attackspambots
Automatic report - Banned IP Access
2019-11-28 14:24:02

最近上报的IP列表

221.64.81.89 42.236.17.13 8.222.240.251 198.55.98.211
34.99.226.228 150.240.229.214 221.183.104.117 175.178.219.95
197.55.69.23 31.57.166.211 45.142.154.36 194.187.177.170
144.172.110.189 167.97.173.56 35.203.210.90 116.76.38.141
26.103.63.21 97.46.121.35 150.14.17.161 70.65.158.37