必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.220.60.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25968
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.220.60.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:05:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
40.60.220.122.in-addr.arpa domain name pointer 122x220x60x40.ap122.ftth.ucom.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.60.220.122.in-addr.arpa	name = 122x220x60x40.ap122.ftth.ucom.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.203.158.242 attackbotsspam
Honeypot attack, port: 445, PTR: 64-203-158-242.unassigned.ntelos.net.
2020-02-28 18:10:37
42.188.96.99 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-28 17:48:11
59.127.172.234 attackspam
Feb 28 10:36:30 silence02 sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.172.234
Feb 28 10:36:32 silence02 sshd[29747]: Failed password for invalid user piotr from 59.127.172.234 port 55874 ssh2
Feb 28 10:44:02 silence02 sshd[30269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.172.234
2020-02-28 18:07:02
117.107.171.254 attack
DATE:2020-02-28 09:37:56, IP:117.107.171.254, PORT:ssh SSH brute force auth (docker-dc)
2020-02-28 17:44:46
103.140.127.135 attackbots
Feb 28 10:09:17 gw1 sshd[29575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.127.135
Feb 28 10:09:19 gw1 sshd[29575]: Failed password for invalid user aws from 103.140.127.135 port 43632 ssh2
...
2020-02-28 17:54:27
146.88.240.4 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-28 18:16:56
103.96.41.130 attackbotsspam
1582865518 - 02/28/2020 05:51:58 Host: 103.96.41.130/103.96.41.130 Port: 445 TCP Blocked
2020-02-28 17:57:43
31.155.158.20 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-28 18:03:20
123.16.188.70 attackspam
unauthorized connection attempt
2020-02-28 17:49:19
87.214.158.232 attackbotsspam
Feb 28 11:03:32 gw1 sshd[31755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.214.158.232
Feb 28 11:03:34 gw1 sshd[31755]: Failed password for invalid user git from 87.214.158.232 port 65534 ssh2
...
2020-02-28 17:58:46
86.25.57.104 attackbotsspam
unauthorized connection attempt
2020-02-28 18:04:18
171.226.237.39 attack
Honeypot attack, port: 81, PTR: dynamic-ip-adsl.viettel.vn.
2020-02-28 18:13:58
49.234.83.240 attackspam
port
2020-02-28 17:47:10
167.172.97.14 attackbotsspam
02/27/2020-23:51:53.868806 167.172.97.14 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-28 18:02:26
194.26.29.130 attackbots
02/28/2020-04:13:45.789288 194.26.29.130 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-28 17:43:23

最近上报的IP列表

37.17.91.252 140.52.244.173 17.194.142.207 180.75.44.207
234.143.214.149 26.23.42.11 146.31.181.250 96.105.231.214
65.48.24.233 199.80.116.58 5.38.109.45 241.74.24.132
85.189.77.249 9.172.226.46 180.23.242.204 203.171.85.132
155.13.13.230 88.231.20.77 59.87.140.94 46.175.205.147