必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 179.40.199.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;179.40.199.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:20:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
14.199.40.179.in-addr.arpa domain name pointer 179-40-199-14.speedy.com.ar.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.199.40.179.in-addr.arpa	name = 179-40-199-14.speedy.com.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
96.44.187.14 attack
Automatic report - Banned IP Access
2019-12-27 03:30:26
177.73.136.90 attackbotsspam
Fail2Ban Ban Triggered
2019-12-27 03:28:20
50.82.34.106 attackbots
Dec 26 20:16:58 lnxweb62 sshd[24286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.82.34.106
2019-12-27 03:28:50
198.108.67.89 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 03:19:22
114.143.8.37 attackspambots
Brute-force attempt banned
2019-12-27 03:33:35
185.156.177.233 attackbots
Unauthorized connection attempt detected from IP address 185.156.177.233 to port 8854
2019-12-27 03:09:59
173.206.19.96 attackspambots
Automatic report - Port Scan Attack
2019-12-27 03:25:25
80.147.59.28 attack
Automatic report - Banned IP Access
2019-12-27 03:07:44
39.53.116.245 attackspambots
SMTP/25/465/587 Probe, BadAuth, SPAM, Hack -
2019-12-27 03:38:09
104.248.86.215 attack
Lines containing failures of 104.248.86.215
Dec 25 02:17:48 zeta sshd[32367]: Did not receive identification string from 104.248.86.215 port 36120
Dec 25 02:18:44 zeta sshd[32376]: Received disconnect from 104.248.86.215 port 32876:11: Normal Shutdown, Thank you for playing [preauth]
Dec 25 02:18:44 zeta sshd[32376]: Disconnected from authenticating user r.r 104.248.86.215 port 32876 [preauth]
Dec 25 02:19:30 zeta sshd[32383]: Invalid user test from 104.248.86.215 port 36400
Dec 25 02:19:30 zeta sshd[32383]: Received disconnect from 104.248.86.215 port 36400:11: Normal Shutdown, Thank you for playing [preauth]
Dec 25 02:19:30 zeta sshd[32383]: Disconnected from invalid user test 104.248.86.215 port 36400 [preauth]
Dec 25 02:20:16 zeta sshd[32395]: Invalid user oracle from 104.248.86.215 port 39920
Dec 25 02:20:16 zeta sshd[32395]: Received disconnect from 104.248.86.215 port 39920:11: Normal Shutdown, Thank you for playing [preauth]
Dec 25 02:20:16 zeta sshd[32395]: Disc........
------------------------------
2019-12-27 03:00:14
104.254.92.230 attackspam
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "GET /nmaplowercheck1177248208 HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "POST /sdk HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "GET /HNAP1 HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
104.254.92.230 - - [26/Dec/2019:15:50:04 +0200] "GET /evox/about HTTP/1.1" 404 196 "-" "Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)"
2019-12-27 02:59:58
119.29.12.122 attackbots
Dec 26 16:22:33 vps46666688 sshd[32593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.12.122
Dec 26 16:22:35 vps46666688 sshd[32593]: Failed password for invalid user bunni from 119.29.12.122 port 42764 ssh2
...
2019-12-27 03:36:08
157.230.128.195 attackbotsspam
firewall-block, port(s): 10558/tcp
2019-12-27 03:02:50
31.46.42.108 attackspam
Invalid user kwatazia from 31.46.42.108 port 32250
2019-12-27 03:15:40
80.210.211.37 attackbotsspam
SMTP/25/465/587 Probe, BadAuth, SPAM, Hack -
2019-12-27 03:30:00

最近上报的IP列表

237.10.10.27 26.79.150.227 97.64.140.244 23.54.23.212
5.10.60.173 152.226.71.212 212.90.232.204 213.143.180.64
79.75.121.56 145.217.105.133 94.181.199.166 202.88.41.97
224.2.17.122 38.34.131.107 215.243.47.53 66.214.57.109
97.25.100.6 252.24.100.214 232.245.8.238 179.231.138.74