必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Panama

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.34.12.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.34.12.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 10:17:02 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 40.12.34.190.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.12.34.190.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.98 attackspam
04/26/2020-17:51:48.485954 185.176.27.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-27 05:58:37
45.55.88.16 attackbotsspam
Invalid user cdsmgr from 45.55.88.16 port 43828
2020-04-27 06:29:18
94.42.165.180 attack
Apr 26 23:22:17 legacy sshd[16121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.165.180
Apr 26 23:22:19 legacy sshd[16121]: Failed password for invalid user kristof from 94.42.165.180 port 40800 ssh2
Apr 26 23:26:19 legacy sshd[16397]: Failed password for root from 94.42.165.180 port 47119 ssh2
...
2020-04-27 06:33:24
42.112.17.30 attackspambots
scan r
2020-04-27 06:32:15
196.37.111.217 attackbots
Apr 26 23:32:27 OPSO sshd\[25070\]: Invalid user oracle from 196.37.111.217 port 33088
Apr 26 23:32:27 OPSO sshd\[25070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.37.111.217
Apr 26 23:32:29 OPSO sshd\[25070\]: Failed password for invalid user oracle from 196.37.111.217 port 33088 ssh2
Apr 26 23:35:55 OPSO sshd\[26126\]: Invalid user manan from 196.37.111.217 port 53552
Apr 26 23:35:55 OPSO sshd\[26126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.37.111.217
2020-04-27 06:02:47
83.97.20.35 attackspambots
Multiport scan : 45 ports scanned 26 84 123 137 389 631 1027 2001 2323 3333 4000 5006 5007 5009 5050 5222 5269 5672 5986 6000 6001 6666 7071 7548 7779 8060 8069 8082 8087 8098 8161 8200 8333 8554 8834 9191 9333 9418 9981 18081 20000 32400 37777 49153 50000
2020-04-27 06:23:23
194.26.29.114 attack
Apr 27 00:25:51 debian-2gb-nbg1-2 kernel: \[10198884.493732\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.114 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=45364 PROTO=TCP SPT=53550 DPT=5632 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-27 06:28:03
132.232.52.86 attack
Invalid user eve from 132.232.52.86 port 40702
2020-04-27 06:16:27
116.253.211.155 attackspambots
Apr 27 01:38:40 gw1 sshd[13991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.253.211.155
Apr 27 01:38:43 gw1 sshd[13991]: Failed password for invalid user blue from 116.253.211.155 port 34442 ssh2
...
2020-04-27 06:33:04
138.68.81.162 attack
2020-04-26T23:51:39.111300sd-86998 sshd[14443]: Invalid user kristof from 138.68.81.162 port 55994
2020-04-26T23:51:39.114482sd-86998 sshd[14443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.81.162
2020-04-26T23:51:39.111300sd-86998 sshd[14443]: Invalid user kristof from 138.68.81.162 port 55994
2020-04-26T23:51:41.389967sd-86998 sshd[14443]: Failed password for invalid user kristof from 138.68.81.162 port 55994 ssh2
2020-04-26T23:57:06.057635sd-86998 sshd[14971]: Invalid user pma from 138.68.81.162 port 36950
...
2020-04-27 06:01:37
138.68.233.112 attackspam
138.68.233.112 - - [26/Apr/2020:22:39:12 +0200] "POST /wp-login.php HTTP/1.1" 200 3405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.233.112 - - [26/Apr/2020:22:39:16 +0200] "POST /wp-login.php HTTP/1.1" 200 3404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-27 06:09:27
175.124.43.162 attackbotsspam
Apr 27 00:14:50 mail sshd[7309]: Failed password for root from 175.124.43.162 port 40458 ssh2
Apr 27 00:19:01 mail sshd[8174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162
Apr 27 00:19:03 mail sshd[8174]: Failed password for invalid user mason from 175.124.43.162 port 52386 ssh2
2020-04-27 06:30:00
202.175.250.219 attackbotsspam
(sshd) Failed SSH login from 202.175.250.219 (PH/Philippines/219.250.175.202.static.eastern-tele.com): 5 in the last 3600 secs
2020-04-27 06:08:45
36.71.238.195 attackspam
Apr 26 22:39:28 tuxlinux sshd[16025]: Invalid user guest from 36.71.238.195 port 62591
Apr 26 22:39:28 tuxlinux sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.71.238.195 
Apr 26 22:39:28 tuxlinux sshd[16025]: Invalid user guest from 36.71.238.195 port 62591
Apr 26 22:39:28 tuxlinux sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.71.238.195 
Apr 26 22:39:28 tuxlinux sshd[16025]: Invalid user guest from 36.71.238.195 port 62591
Apr 26 22:39:28 tuxlinux sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.71.238.195 
Apr 26 22:39:30 tuxlinux sshd[16025]: Failed password for invalid user guest from 36.71.238.195 port 62591 ssh2
...
2020-04-27 06:00:08
89.248.171.174 attack
IP reached maximum auth failures for a one day block
2020-04-27 06:21:56

最近上报的IP列表

118.181.72.137 203.95.117.146 192.167.11.168 42.244.237.40
75.167.25.194 23.189.35.208 168.222.92.114 217.119.219.41
248.191.168.200 51.189.124.235 115.165.213.150 164.180.154.180
195.220.155.158 235.85.15.147 148.193.172.29 174.132.210.223
204.129.234.196 209.52.96.88 23.166.226.17 29.151.0.255