必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.191.66.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;167.191.66.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:17:05 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 40.66.191.167.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 40.66.191.167.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.36.152.13 attackbots
Lines containing failures of 101.36.152.13
Nov  4 21:55:44 jarvis sshd[11261]: Invalid user zahore from 101.36.152.13 port 36434
Nov  4 21:55:44 jarvis sshd[11261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.152.13 
Nov  4 21:55:46 jarvis sshd[11261]: Failed password for invalid user zahore from 101.36.152.13 port 36434 ssh2
Nov  4 21:55:48 jarvis sshd[11261]: Received disconnect from 101.36.152.13 port 36434:11: Bye Bye [preauth]
Nov  4 21:55:48 jarvis sshd[11261]: Disconnected from invalid user zahore 101.36.152.13 port 36434 [preauth]
Nov  4 22:08:50 jarvis sshd[14084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.152.13  user=r.r
Nov  4 22:08:52 jarvis sshd[14084]: Failed password for r.r from 101.36.152.13 port 51558 ssh2
Nov  4 22:08:54 jarvis sshd[14084]: Received disconnect from 101.36.152.13 port 51558:11: Bye Bye [preauth]
Nov  4 22:08:54 jarvis sshd[14084]: Di........
------------------------------
2019-11-05 06:51:52
52.230.127.59 attackbots
Wordpress brute-force
2019-11-05 06:36:55
196.219.60.70 attackspam
Nov  5 08:58:50 our-server-hostname postfix/smtpd[31920]: connect from unknown[196.219.60.70]
Nov  5 08:58:50 our-server-hostname postfix/smtpd[31920]: NOQUEUE: reject: RCPT from unknown[196.219.60.70]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Nov  5 08:58:51 our-server-hostname postfix/smtpd[31920]: disconnect from unknown[196.219.60.70]
Nov  5 08:59:04 our-server-hostname postfix/smtpd[32339]: connect from unknown[196.219.60.70]
Nov  5 08:59:05 our-server-hostname postfix/smtpd[32339]: NOQUEUE: reject: RCPT from unknown[196.219.60.70]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Nov  5 08:59:05 our-server-hostname postfix/smtpd[32339]: disconnect from unknown[196.219.60.70]
Nov  5 08:59:22 our-server-hostname postfix/smtpd[26993]: connect from unknown[196.219.60.70]
Nov  5 08:59:23 our-server-hostname postfix/smtpd[26993]: NOQUEUE: reject: RCPT from unknown[196.219.60.70........
-------------------------------
2019-11-05 07:10:18
94.29.249.47 attackspam
" "
2019-11-05 06:53:26
14.231.201.16 attackbotsspam
Received: from mail.bnpb.go.id (14.231.201.16) by HQEXSV01.bnpb.go.id
 (192.168.253.252) with Microsoft SMTP Server (TLS) id 15.0.847.32; Mon, 4 Nov
 2019 08:29:07 +0700
From: rosstefano29 <rifai@bnpb.go.id>
To: [...]
Subject: Fw:Mi auguro che stia avendo una meravigliosa giornata
Thread-Topic: Fw:Mi auguro che stia avendo una meravigliosa giornata
Thread-Index: AQHVkq9JXUsuy80aNka1yH/VL93LWQ==
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Mon, 4 Nov 2019 02:31:22 +0100
Message-ID: <8295ebb9-101f-4b32-b6ff-44914f4b36cd@bnpb.go.id>
2019-11-05 06:44:37
91.73.136.38 attack
Abuse
2019-11-05 06:42:26
165.22.213.24 attack
Nov  4 12:37:41 web1 sshd\[31828\]: Invalid user rtholden from 165.22.213.24
Nov  4 12:37:41 web1 sshd\[31828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.24
Nov  4 12:37:43 web1 sshd\[31828\]: Failed password for invalid user rtholden from 165.22.213.24 port 48380 ssh2
Nov  4 12:41:42 web1 sshd\[32275\]: Invalid user xx from 165.22.213.24
Nov  4 12:41:42 web1 sshd\[32275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.24
2019-11-05 06:59:11
159.203.73.200 attackspam
Lines containing failures of 159.203.73.200
2019-11-04 23:26:09 no host name found for IP address 159.203.73.200
2019-11-04 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.203.73.200
2019-11-05 06:50:22
130.61.122.5 attackspambots
Nov  4 09:25:46 debian sshd\[19628\]: Invalid user support from 130.61.122.5 port 46532
Nov  4 09:25:46 debian sshd\[19628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.122.5
Nov  4 09:25:48 debian sshd\[19628\]: Failed password for invalid user support from 130.61.122.5 port 46532 ssh2
...
2019-11-05 06:37:34
125.141.139.9 attackbotsspam
2019-11-04T22:41:30.404761abusebot-7.cloudsearch.cf sshd\[11512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.9  user=root
2019-11-05 07:07:17
14.207.42.142 attack
Lines containing failures of 14.207.42.142
2019-11-04 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.207.42.142
2019-11-05 06:48:58
106.12.7.173 attackbots
Failed password for invalid user Passwort1! from 106.12.7.173 port 58080 ssh2
Invalid user 12qw23as45zx from 106.12.7.173 port 37068
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.173
Failed password for invalid user 12qw23as45zx from 106.12.7.173 port 37068 ssh2
Invalid user Qwer!234 from 106.12.7.173 port 44316
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.173
2019-11-05 06:41:58
13.78.49.11 attackbotsspam
2019-11-04T22:54:00.558828abusebot.cloudsearch.cf sshd\[28237\]: Invalid user maik from 13.78.49.11 port 39618
2019-11-04T22:54:00.563308abusebot.cloudsearch.cf sshd\[28237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.49.11
2019-11-05 06:57:39
113.101.65.135 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/113.101.65.135/ 
 
 CN - 1H : (588)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 113.101.65.135 
 
 CIDR : 113.100.0.0/15 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 16 
  3H - 36 
  6H - 77 
 12H - 138 
 24H - 257 
 
 DateTime : 2019-11-04 15:25:44 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-05 06:38:19
101.78.209.39 attack
Nov  4 15:05:29 nandi sshd[25337]: Invalid user cristobal from 101.78.209.39
Nov  4 15:05:29 nandi sshd[25337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 
Nov  4 15:05:31 nandi sshd[25337]: Failed password for invalid user cristobal from 101.78.209.39 port 38667 ssh2
Nov  4 15:05:31 nandi sshd[25337]: Received disconnect from 101.78.209.39: 11: Bye Bye [preauth]
Nov  4 15:14:26 nandi sshd[3457]: Invalid user pwrchute from 101.78.209.39
Nov  4 15:14:26 nandi sshd[3457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=101.78.209.39
2019-11-05 06:43:43

最近上报的IP列表

16.125.7.135 228.145.6.166 133.55.31.159 232.156.113.89
87.123.193.239 4.89.212.45 161.65.220.162 30.194.235.195
50.190.225.193 168.73.32.235 206.151.106.135 22.59.220.120
38.131.214.173 163.90.77.136 118.71.187.37 73.100.196.115
188.252.80.178 70.193.34.177 36.15.182.20 141.193.82.127