必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.85.38.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.85.38.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 14:44:11 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
42.38.85.140.in-addr.arpa domain name pointer vmohsthyk001.oracleoutsourcing.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.38.85.140.in-addr.arpa	name = vmohsthyk001.oracleoutsourcing.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.6.120.131 attack
Jan 15 23:23:38 nandi sshd[437]: reveeclipse mapping checking getaddrinfo for bd067883.virtua.com.br [189.6.120.131] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 15 23:23:38 nandi sshd[437]: Invalid user test1 from 189.6.120.131
Jan 15 23:23:38 nandi sshd[437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.120.131 
Jan 15 23:23:40 nandi sshd[437]: Failed password for invalid user test1 from 189.6.120.131 port 61298 ssh2
Jan 15 23:23:40 nandi sshd[437]: Received disconnect from 189.6.120.131: 11: Bye Bye [preauth]
Jan 15 23:42:43 nandi sshd[9752]: reveeclipse mapping checking getaddrinfo for bd067883.virtua.com.br [189.6.120.131] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 15 23:42:43 nandi sshd[9752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.120.131  user=r.r
Jan 15 23:42:45 nandi sshd[9752]: Failed password for r.r from 189.6.120.131 port 52859 ssh2
Jan 15 23:42:46 nandi sshd[97........
-------------------------------
2020-01-16 20:06:45
107.173.40.215 attack
IP: 107.173.40.215
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 14%
Found in DNSBL('s)
ASN Details
   AS36352 ColoCrossing
   United States (US)
   CIDR 107.173.32.0/20
Log Date: 16/01/2020 11:35:59 AM UTC
2020-01-16 20:13:56
14.172.89.219 attackbotsspam
Unauthorized connection attempt from IP address 14.172.89.219 on Port 445(SMB)
2020-01-16 19:41:38
1.10.145.219 attackbots
Unauthorized connection attempt from IP address 1.10.145.219 on Port 445(SMB)
2020-01-16 19:36:30
177.10.211.198 attack
Sending SPAM email
2020-01-16 19:51:23
140.143.204.98 attackspambots
Jan 16 09:42:46 ourumov-web sshd\[13595\]: Invalid user hdfs from 140.143.204.98 port 58484
Jan 16 09:42:46 ourumov-web sshd\[13595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.204.98
Jan 16 09:42:48 ourumov-web sshd\[13595\]: Failed password for invalid user hdfs from 140.143.204.98 port 58484 ssh2
...
2020-01-16 20:05:19
217.150.72.157 attack
Unauthorized connection attempt from IP address 217.150.72.157 on Port 445(SMB)
2020-01-16 19:37:08
167.172.158.200 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-01-16 19:44:20
94.25.230.115 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 16-01-2020 04:45:10.
2020-01-16 19:53:24
81.171.75.178 attackbotsspam
[2020-01-16 06:39:10] NOTICE[2175] chan_sip.c: Registration from '' failed for '81.171.75.178:60418' - Wrong password
[2020-01-16 06:39:10] SECURITY[2212] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-16T06:39:10.191-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="6461",SessionID="0x7f5ac4c6fb48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.178/60418",Challenge="67d6566c",ReceivedChallenge="67d6566c",ReceivedHash="7d8840606f16ee5899adf5385466996b"
[2020-01-16 06:39:33] NOTICE[2175] chan_sip.c: Registration from '' failed for '81.171.75.178:55283' - Wrong password
[2020-01-16 06:39:33] SECURITY[2212] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-16T06:39:33.091-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3885",SessionID="0x7f5ac400f638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.178
...
2020-01-16 19:59:10
118.97.98.205 attack
Unauthorized connection attempt from IP address 118.97.98.205 on Port 445(SMB)
2020-01-16 19:51:49
167.99.86.90 attackspambots
GET requests (Part 2 of 2): 
/kcfinder-2.51/upload/files/up.php.jd
/language/en-GB/en-GB.xml
/libraries/jscripts/kcfinder/upload/files/up.php.jd
/public/upload_nhieuanh/server/php/files/up.php
/scripts/jquery/kcfinder/upload/files/up.php.jd
/server/php/files/up.php
/tpl/plugins/upload9.1.0/server/php/
/tpl/plugins/upload9.1.0/server/php/files/up.php
/tpl/plugins/upload9.1.0/server/php/up.php
/userfiles/file/spy.txt
/vehiculo_photos/server/php/files/up.php
/web/image/Images/up.php
2020-01-16 19:49:02
112.217.225.59 attackbotsspam
Unauthorized connection attempt detected from IP address 112.217.225.59 to port 2220 [J]
2020-01-16 19:55:25
173.45.120.226 attack
Jan 15 04:40:08 Tower sshd[29265]: refused connect from 157.230.129.73 (157.230.129.73)
Jan 15 23:44:42 Tower sshd[29265]: Connection from 173.45.120.226 port 50493 on 192.168.10.220 port 22 rdomain ""
Jan 15 23:44:43 Tower sshd[29265]: Failed password for root from 173.45.120.226 port 50493 ssh2
Jan 15 23:44:43 Tower sshd[29265]: Connection reset by authenticating user root 173.45.120.226 port 50493 [preauth]
2020-01-16 19:58:22
177.96.36.219 attackbots
Jan 16 11:34:55 mail1 sshd\[2289\]: Invalid user musicbot from 177.96.36.219 port 8022
Jan 16 11:34:55 mail1 sshd\[2289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.36.219
Jan 16 11:34:57 mail1 sshd\[2289\]: Failed password for invalid user musicbot from 177.96.36.219 port 8022 ssh2
Jan 16 11:43:25 mail1 sshd\[4366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.36.219  user=root
Jan 16 11:43:27 mail1 sshd\[4366\]: Failed password for root from 177.96.36.219 port 14503 ssh2
...
2020-01-16 19:57:56

最近上报的IP列表

242.30.131.188 126.168.45.216 109.103.4.107 76.169.9.22
182.126.100.187 121.170.30.116 25.68.31.157 115.121.140.151
137.40.147.228 64.225.248.246 141.74.173.3 174.182.71.38
171.138.7.255 202.110.55.47 168.81.204.154 189.231.4.76
153.30.100.83 156.29.212.40 208.223.182.184 16.193.154.16