必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.40.126.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.40.126.67.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 23:52:56 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 67.126.40.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.126.40.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.55.198.186 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 16:25:23,914 INFO [shellcode_manager] (1.55.198.186) no match, writing hexdump (01eba89fa69070374482c596fe9839d1 :2424088) - MS17010 (EternalBlue)
2019-07-09 23:17:22
91.134.120.5 attack
port scan and connect, tcp 22 (ssh)
2019-07-09 22:38:21
37.53.70.64 attackbotsspam
Honeypot attack, port: 23, PTR: 64-70-53-37.pool.ukrtel.net.
2019-07-09 23:03:05
206.180.160.83 attackspam
19/7/9@09:41:38: FAIL: Alarm-Intrusion address from=206.180.160.83
...
2019-07-09 23:49:21
60.250.74.210 attack
2019-07-09T20:40:56.414727enmeeting.mahidol.ac.th sshd\[21233\]: User root from 60-250-74-210.hinet-ip.hinet.net not allowed because not listed in AllowUsers
2019-07-09T20:40:56.540272enmeeting.mahidol.ac.th sshd\[21233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-250-74-210.hinet-ip.hinet.net  user=root
2019-07-09T20:40:58.967570enmeeting.mahidol.ac.th sshd\[21233\]: Failed password for invalid user root from 60.250.74.210 port 47146 ssh2
...
2019-07-10 00:10:52
145.255.0.125 attack
2019-07-09T09:42:57.462840stt-1.[munged] kernel: [6711399.171391] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=145.255.0.125 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=10720 DF PROTO=TCP SPT=61603 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-09T09:43:00.457687stt-1.[munged] kernel: [6711402.166222] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=145.255.0.125 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=14767 DF PROTO=TCP SPT=61603 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-09T09:43:06.458777stt-1.[munged] kernel: [6711408.167294] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=145.255.0.125 DST=[mungedIP1] LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=20137 DF PROTO=TCP SPT=61603 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0
2019-07-09 23:06:09
188.40.149.68 attackspambots
Jul  9 15:13:27 server658 sshd[18258]: Did not receive identification string from 188.40.149.68
Jul  9 15:14:14 server658 sshd[18260]: Invalid user oracle from 188.40.149.68


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.40.149.68
2019-07-09 22:43:02
182.232.194.250 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-09 22:41:00
14.183.40.132 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 16:30:39,260 INFO [shellcode_manager] (14.183.40.132) no match, writing hexdump (374aa0bbf68a2bd2b52c1d996ab04bfa :2050705) - MS17010 (EternalBlue)
2019-07-09 23:50:22
104.236.175.127 attack
Jul  9 18:40:33 hosting sshd[3899]: Invalid user miao from 104.236.175.127 port 53684
Jul  9 18:40:33 hosting sshd[3899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.175.127
Jul  9 18:40:33 hosting sshd[3899]: Invalid user miao from 104.236.175.127 port 53684
Jul  9 18:40:36 hosting sshd[3899]: Failed password for invalid user miao from 104.236.175.127 port 53684 ssh2
Jul  9 18:42:46 hosting sshd[3975]: Invalid user www from 104.236.175.127 port 49408
...
2019-07-09 23:45:06
177.68.89.26 attack
TCP port 8080 (HTTP) attempt blocked by firewall. [2019-07-09 15:41:16]
2019-07-09 23:15:09
218.64.30.223 attackbots
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x
2019-07-09 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=218.64.30.223
2019-07-09 23:38:00
36.6.136.21 attack
Jul  9 15:25:17 garuda postfix/smtpd[45489]: connect from unknown[36.6.136.21]
Jul  9 15:25:18 garuda postfix/smtpd[45490]: connect from unknown[36.6.136.21]
Jul  9 15:25:39 garuda postfix/smtpd[45490]: warning: unknown[36.6.136.21]: SASL LOGIN authentication failed: authentication failure
Jul  9 15:25:44 garuda postfix/smtpd[45490]: lost connection after AUTH from unknown[36.6.136.21]
Jul  9 15:25:44 garuda postfix/smtpd[45490]: disconnect from unknown[36.6.136.21] ehlo=1 auth=0/1 commands=1/2
Jul  9 15:25:44 garuda postfix/smtpd[45491]: connect from unknown[36.6.136.21]
Jul  9 15:26:00 garuda postfix/smtpd[45491]: warning: unknown[36.6.136.21]: SASL LOGIN authentication failed: authentication failure
Jul  9 15:26:05 garuda postfix/smtpd[45491]: lost connection after AUTH from unknown[36.6.136.21]
Jul  9 15:26:05 garuda postfix/smtpd[45491]: disconnect from unknown[36.6.136.21] ehlo=1 auth=0/1 commands=1/2
Jul  9 15:26:05 garuda postfix/smtpd[45490]: connect from unkno........
-------------------------------
2019-07-09 23:30:08
223.206.242.114 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 16:25:37,166 INFO [shellcode_manager] (223.206.242.114) no match, writing hexdump (1f2510243dd0222fe0fede23edb10da4 :12121) - SMB (Unknown)
2019-07-09 23:11:19
222.217.221.178 attackspam
Brute force attempt
2019-07-09 23:45:37

最近上报的IP列表

176.59.47.144 178.138.158.200 25.181.204.42 160.2.227.207
141.226.35.157 121.186.198.57 165.145.213.5 176.243.70.145
136.115.62.181 167.175.175.189 210.56.25.28 135.109.143.66
11.165.113.131 213.217.214.177 227.136.91.184 187.211.54.231
106.221.182.1 25.198.135.69 144.29.209.10 226.171.205.118