必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.221.40.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.221.40.152.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060200 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 20:50:33 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 152.40.221.133.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.40.221.133.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.248.30.249 attackspambots
Nov 10 16:31:00 legacy sshd[31148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249
Nov 10 16:31:02 legacy sshd[31148]: Failed password for invalid user administrator from 104.248.30.249 port 34712 ssh2
Nov 10 16:34:24 legacy sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249
...
2019-11-10 23:42:14
81.22.45.65 attack
Nov 10 16:41:10 mc1 kernel: \[4686755.244527\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=1624 PROTO=TCP SPT=50058 DPT=57373 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 10 16:47:17 mc1 kernel: \[4687122.952956\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=3500 PROTO=TCP SPT=50058 DPT=57241 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 10 16:47:29 mc1 kernel: \[4687134.498313\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=14478 PROTO=TCP SPT=50058 DPT=56932 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-10 23:56:47
104.245.144.44 attack
(From kaylene.eagar50@gmail.com) Do you want to post your ad on tons of online ad sites every month? One tiny investment every month will get you almost endless traffic to your site forever!For details check out: http://www.submitmyadnow.tech
2019-11-10 23:49:59
125.214.51.33 attackbots
Unauthorized connection attempt from IP address 125.214.51.33 on Port 445(SMB)
2019-11-11 00:00:36
122.51.85.199 attack
$f2bV_matches
2019-11-11 00:20:26
70.183.157.187 attackspambots
Unauthorized connection attempt from IP address 70.183.157.187 on Port 445(SMB)
2019-11-10 23:50:25
105.27.98.22 attack
Unauthorized connection attempt from IP address 105.27.98.22 on Port 445(SMB)
2019-11-10 23:52:14
185.156.73.3 attack
185.156.73.3 was recorded 27 times by 15 hosts attempting to connect to the following ports: 17467,17468,17469,52472,52471. Incident counter (4h, 24h, all-time): 27, 175, 439
2019-11-11 00:16:52
203.195.171.126 attack
2019-11-10T15:47:23.541228abusebot-5.cloudsearch.cf sshd\[26649\]: Invalid user rodger from 203.195.171.126 port 40663
2019-11-10 23:48:55
211.193.58.173 attackspam
Nov 10 11:41:40 firewall sshd[26431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.58.173  user=root
Nov 10 11:41:42 firewall sshd[26431]: Failed password for root from 211.193.58.173 port 54028 ssh2
Nov 10 11:46:07 firewall sshd[26676]: Invalid user tc from 211.193.58.173
...
2019-11-10 23:55:59
80.82.77.33 attack
11/10/2019-17:10:34.230432 80.82.77.33 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-11 00:19:48
125.214.52.18 attackbotsspam
Unauthorized connection attempt from IP address 125.214.52.18 on Port 445(SMB)
2019-11-10 23:43:24
5.196.72.11 attackspam
Nov  7 23:34:15 dax sshd[25155]: Failed password for r.r from 5.196.72.11 port 40264 ssh2
Nov  7 23:34:15 dax sshd[25155]: Received disconnect from 5.196.72.11: 11: Bye Bye [preauth]
Nov  7 23:56:56 dax sshd[28418]: Invalid user arbgirl_phpbb1 from 5.196.72.11
Nov  7 23:56:58 dax sshd[28418]: Failed password for invalid user arbgirl_phpbb1 from 5.196.72.11 port 38110 ssh2
Nov  7 23:56:58 dax sshd[28418]: Received disconnect from 5.196.72.11: 11: Bye Bye [preauth]
Nov  8 00:01:26 dax sshd[29093]: Failed password for r.r from 5.196.72.11 port 50368 ssh2
Nov  8 00:01:26 dax sshd[29093]: Received disconnect from 5.196.72.11: 11: Bye Bye [preauth]
Nov  8 00:05:46 dax sshd[29750]: Invalid user web from 5.196.72.11
Nov  8 00:05:48 dax sshd[29750]: Failed password for invalid user web from 5.196.72.11 port 34348 ssh2
Nov  8 00:05:48 dax sshd[29750]: Received disconnect from 5.196.72.11: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.196.72.1
2019-11-11 00:19:06
45.91.149.54 attackbots
Nov 11 00:15:25 our-server-hostname postfix/smtpd[1407]: connect from unknown[45.91.149.54]
Nov 11 00:15:28 our-server-hostname postfix/smtpd[1161]: connect from unknown[45.91.149.54]
Nov x@x
Nov x@x
Nov 11 00:15:30 our-server-hostname postfix/smtpd[1161]: 44B74A40041: client=unknown[45.91.149.54]
Nov x@x
Nov x@x
Nov 11 00:15:30 our-server-hostname postfix/smtpd[1407]: 4770CA40095: client=unknown[45.91.149.54]
Nov 11 00:15:30 our-server-hostname postfix/smtpd[31863]: B5911A40096: client=unknown[127.0.0.1], orig_client=unknown[45.91.149.54]
Nov 11 00:15:30 our-server-hostname amavis[28801]: (28801-11) Passed CLEAN, [45.91.149.54] [45.91.149.54] , mail_id: l19rXm01NxAG, Hhostnames: -, size: 6184, queued_as: B5911A40096, 112 ms
Nov x@x
Nov x@x
Nov 11 00:15:31 our-server-hostname postfix/smtpd[1161]: 04FECA40041: client=unknown[45.91.149.54]
Nov 11 00:15:31 our-server-hostname postfix/smtpd[31863]: 1CC0CA40096: client=unknown[127.0.0.1], orig_client=unknown[45.91.149.5........
-------------------------------
2019-11-10 23:40:53
66.96.233.31 attackbots
Nov 10 15:46:15 mout sshd[22709]: Invalid user fork from 66.96.233.31 port 46026
2019-11-10 23:45:38

最近上报的IP列表

166.227.169.147 126.99.37.40 44.157.151.2 188.100.166.215
145.1.149.29 223.119.28.160 55.65.25.204 80.200.37.92
238.139.231.99 174.194.117.202 232.167.252.56 14.146.197.53
171.244.177.162 127.190.36.221 47.98.56.24 72.122.134.51
101.27.238.37 199.94.185.72 13.128.173.114 38.216.108.218