必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.240.21.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.240.21.39.			IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021092700 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 27 21:49:17 CST 2021
;; MSG SIZE  rcvd: 106
HOST信息:
39.21.240.157.in-addr.arpa domain name pointer edge-fblite-tcp-mini-shv-01-cdt1.facebook.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.21.240.157.in-addr.arpa	name = edge-fblite-tcp-mini-shv-01-cdt1.facebook.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.132.110.223 attack
[ssh] SSH attack
2019-08-13 04:50:59
198.108.67.108 attack
Port scan: Attack repeated for 24 hours
2019-08-13 04:39:43
134.175.62.14 attackspam
SSH Brute-Force reported by Fail2Ban
2019-08-13 04:22:28
41.65.3.130 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-23/08-12]10pkt,1pt.(tcp)
2019-08-13 04:16:32
174.138.30.236 attackspambots
fail2ban honeypot
2019-08-13 04:51:43
171.76.70.190 attack
Automatic report - Port Scan Attack
2019-08-13 04:38:35
34.80.72.249 attackbotsspam
Aug 12 20:52:38 tuxlinux sshd[47185]: Invalid user nathan from 34.80.72.249 port 46656
Aug 12 20:52:38 tuxlinux sshd[47185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.72.249 
Aug 12 20:52:38 tuxlinux sshd[47185]: Invalid user nathan from 34.80.72.249 port 46656
Aug 12 20:52:38 tuxlinux sshd[47185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.72.249 
Aug 12 20:52:38 tuxlinux sshd[47185]: Invalid user nathan from 34.80.72.249 port 46656
Aug 12 20:52:38 tuxlinux sshd[47185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.72.249 
Aug 12 20:52:40 tuxlinux sshd[47185]: Failed password for invalid user nathan from 34.80.72.249 port 46656 ssh2
...
2019-08-13 04:12:58
34.90.88.171 attackspambots
23/tcp
[2019-08-12]1pkt
2019-08-13 04:32:59
118.126.96.180 attackbots
fail2ban honeypot
2019-08-13 04:26:39
212.114.57.61 attackspambots
Aug 12 21:53:59 server2 sshd\[3045\]: User root from 212.114.57.61 not allowed because not listed in AllowUsers
Aug 12 21:53:59 server2 sshd\[3047\]: Invalid user admin from 212.114.57.61
Aug 12 21:54:02 server2 sshd\[3070\]: User root from 212.114.57.61 not allowed because not listed in AllowUsers
Aug 12 21:54:02 server2 sshd\[3072\]: Invalid user admin from 212.114.57.61
Aug 12 21:54:02 server2 sshd\[3074\]: Invalid user user from 212.114.57.61
Aug 12 21:54:03 server2 sshd\[3076\]: Invalid user user from 212.114.57.61
2019-08-13 04:39:11
139.255.56.202 attack
Unauthorized connection attempt from IP address 139.255.56.202 on Port 445(SMB)
2019-08-13 04:12:24
117.218.100.62 attack
445/tcp 445/tcp 445/tcp
[2019-07-22/08-12]3pkt
2019-08-13 04:38:50
43.227.67.198 attack
Aug 12 20:56:05 mail1 sshd\[29152\]: Invalid user toro from 43.227.67.198 port 36534
Aug 12 20:56:05 mail1 sshd\[29152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.67.198
Aug 12 20:56:07 mail1 sshd\[29152\]: Failed password for invalid user toro from 43.227.67.198 port 36534 ssh2
Aug 12 21:06:31 mail1 sshd\[1429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.67.198  user=root
Aug 12 21:06:33 mail1 sshd\[1429\]: Failed password for root from 43.227.67.198 port 55276 ssh2
...
2019-08-13 04:41:36
191.53.223.218 attackbotsspam
failed_logins
2019-08-13 04:33:25
14.161.0.82 attackspam
445/tcp 445/tcp
[2019-08-02/12]2pkt
2019-08-13 04:52:56

最近上报的IP列表

151.229.82.115 186.178.59.115 115.59.178.186 124.50.9.125
85.215.223.140 217.165.89.187 24.87.163.50 3.1.195.219
96.44.179.34 209.58.177.199 164.100.251.91 123.127.48.147
58.97.224.113 138.203.221.248 39.144.16.74 41.39.183.34
35.247.161.16 34.101.233.48 111.254.66.216 84.17.46.165