必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.58.44.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.58.44.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:06:03 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 40.44.58.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.44.58.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.21.228.3 attackbots
Nov  4 01:19:56 server sshd\[28822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.228.3  user=root
Nov  4 01:19:58 server sshd\[28822\]: Failed password for root from 103.21.228.3 port 39273 ssh2
Nov  4 01:25:22 server sshd\[30602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.228.3  user=root
Nov  4 01:25:25 server sshd\[30602\]: Failed password for root from 103.21.228.3 port 33186 ssh2
Nov  4 01:29:43 server sshd\[31312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.228.3  user=root
...
2019-11-04 07:44:43
81.192.159.130 attackbots
Nov  3 23:46:52 work-partkepr sshd\[26344\]: Invalid user tehnolog from 81.192.159.130 port 37322
Nov  3 23:46:52 work-partkepr sshd\[26344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.159.130
...
2019-11-04 08:00:02
92.46.220.6 attackbotsspam
Unauthorized connection attempt from IP address 92.46.220.6 on Port 445(SMB)
2019-11-04 07:23:58
5.196.75.47 attackspambots
Nov  3 13:41:42 eddieflores sshd\[30616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3003413.ip-5-196-75.eu  user=root
Nov  3 13:41:43 eddieflores sshd\[30616\]: Failed password for root from 5.196.75.47 port 56820 ssh2
Nov  3 13:45:47 eddieflores sshd\[30916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3003413.ip-5-196-75.eu  user=root
Nov  3 13:45:48 eddieflores sshd\[30916\]: Failed password for root from 5.196.75.47 port 37414 ssh2
Nov  3 13:49:55 eddieflores sshd\[31210\]: Invalid user kb from 5.196.75.47
Nov  3 13:49:55 eddieflores sshd\[31210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3003413.ip-5-196-75.eu
2019-11-04 07:55:14
117.69.46.38 attack
SpamReport
2019-11-04 07:33:32
81.22.45.107 attackbots
11/04/2019-00:19:33.407397 81.22.45.107 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-04 07:28:14
222.186.175.182 attackbotsspam
2019-11-03T23:48:07.842024shield sshd\[9444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-11-03T23:48:09.787039shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-03T23:48:14.596467shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-03T23:48:19.391157shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-03T23:48:23.870603shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-04 07:48:57
200.87.7.61 attack
Nov  3 23:30:00 host sshd[46835]: Invalid user nathaniel from 200.87.7.61 port 55115
...
2019-11-04 07:34:35
185.176.27.18 attack
Multiport scan : 28 ports scanned 10005 10705 11005 11605 12905 13305 13605 13705 13805 14005 14305 14805 15205 15705 15905 16205 16405 16505 17005 17605 17705 17905 18005 18305 18505 18605 18905 19805
2019-11-04 07:32:08
106.12.134.58 attackspambots
frenzy
2019-11-04 07:35:24
49.235.76.69 attack
Nov  3 23:29:25 mc1 kernel: \[4106473.203709\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=49.235.76.69 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=24196 DF PROTO=TCP SPT=53423 DPT=243 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov  3 23:29:25 mc1 kernel: \[4106473.219892\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=49.235.76.69 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=24198 DF PROTO=TCP SPT=53425 DPT=243 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov  3 23:29:25 mc1 kernel: \[4106473.235903\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=49.235.76.69 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=24200 DF PROTO=TCP SPT=53427 DPT=64341 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov  3 23:29:25 mc1 kernel: \[4106473.251716\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=49.235.76.69 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=24202 DF PROTO=TCP S
...
2019-11-04 07:52:48
36.78.164.11 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/36.78.164.11/ 
 
 ID - 1H : (36)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN17974 
 
 IP : 36.78.164.11 
 
 CIDR : 36.78.164.0/22 
 
 PREFIX COUNT : 1456 
 
 UNIQUE IP COUNT : 1245952 
 
 
 ATTACKS DETECTED ASN17974 :  
  1H - 1 
  3H - 3 
  6H - 4 
 12H - 6 
 24H - 9 
 
 DateTime : 2019-11-03 23:29:47 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-04 07:42:10
200.194.28.116 attackbotsspam
Nov  3 23:53:11 apollo sshd\[25080\]: Failed password for root from 200.194.28.116 port 48456 ssh2Nov  3 23:53:12 apollo sshd\[25080\]: Failed password for root from 200.194.28.116 port 48456 ssh2Nov  3 23:53:15 apollo sshd\[25080\]: Failed password for root from 200.194.28.116 port 48456 ssh2
...
2019-11-04 07:42:27
106.13.6.116 attack
Invalid user cloudtest from 106.13.6.116 port 38592
2019-11-04 07:52:06
180.101.125.76 attackspambots
2019-11-03T23:32:38.050761abusebot-3.cloudsearch.cf sshd\[20876\]: Invalid user confused from 180.101.125.76 port 48398
2019-11-04 07:36:56

最近上报的IP列表

8.95.144.250 206.59.147.61 169.99.74.145 128.120.63.168
186.119.213.213 101.92.143.119 141.242.229.139 92.20.175.104
34.39.255.223 219.251.239.237 80.2.149.92 144.244.179.120
192.203.154.133 6.119.78.155 19.48.81.3 118.129.162.65
39.186.44.55 152.50.144.231 177.65.111.5 171.107.20.46