必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.40.202.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.40.202.31.			IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:21:07 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 31.202.40.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 31.202.40.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.87.68.21 attack
Unauthorized connection attempt from IP address 177.87.68.21 on Port 445(SMB)
2019-07-31 14:34:15
51.38.186.200 attackspambots
SSH Brute-Forcing (ownc)
2019-07-31 14:37:52
195.155.169.31 attack
Hit on /wp-login.php
2019-07-31 14:43:03
129.28.154.240 attack
SSH-BruteForce
2019-07-31 14:37:02
222.74.239.67 attackbotsspam
Jul 31 00:31:52 nextcloud sshd\[9762\]: Invalid user postgres from 222.74.239.67
Jul 31 00:31:52 nextcloud sshd\[9762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.74.239.67
Jul 31 00:31:55 nextcloud sshd\[9762\]: Failed password for invalid user postgres from 222.74.239.67 port 36428 ssh2
...
2019-07-31 14:28:39
113.161.238.25 attack
Automatic report - Port Scan Attack
2019-07-31 13:56:01
91.185.13.122 attack
Unauthorized connection attempt from IP address 91.185.13.122 on Port 445(SMB)
2019-07-31 13:55:17
104.248.30.249 attackbotsspam
$f2bV_matches_ltvn
2019-07-31 14:50:21
23.129.64.188 attack
Jul 31 05:45:22 lnxweb61 sshd[13912]: Failed password for root from 23.129.64.188 port 20536 ssh2
Jul 31 05:45:25 lnxweb61 sshd[13912]: Failed password for root from 23.129.64.188 port 20536 ssh2
Jul 31 05:45:28 lnxweb61 sshd[13912]: Failed password for root from 23.129.64.188 port 20536 ssh2
Jul 31 05:45:30 lnxweb61 sshd[13912]: Failed password for root from 23.129.64.188 port 20536 ssh2
2019-07-31 14:23:37
201.248.200.58 attackbots
445/tcp
[2019-07-30]1pkt
2019-07-31 13:56:48
162.214.14.3 attackbots
Jul 31 05:49:40 ip-172-31-62-245 sshd\[24912\]: Invalid user sioux from 162.214.14.3\
Jul 31 05:49:42 ip-172-31-62-245 sshd\[24912\]: Failed password for invalid user sioux from 162.214.14.3 port 43980 ssh2\
Jul 31 05:54:17 ip-172-31-62-245 sshd\[24943\]: Invalid user skinny from 162.214.14.3\
Jul 31 05:54:19 ip-172-31-62-245 sshd\[24943\]: Failed password for invalid user skinny from 162.214.14.3 port 40414 ssh2\
Jul 31 05:58:35 ip-172-31-62-245 sshd\[25027\]: Invalid user amdsa from 162.214.14.3\
2019-07-31 14:04:35
181.197.157.193 attackspambots
SSH-BruteForce
2019-07-31 14:05:43
159.89.111.136 attack
Jul 31 00:18:09 master sshd[16151]: Failed password for invalid user ymchoi from 159.89.111.136 port 38498 ssh2
Jul 31 00:54:00 master sshd[16612]: Failed password for uucp from 159.89.111.136 port 35586 ssh2
Jul 31 00:58:09 master sshd[16634]: Failed password for invalid user osvi from 159.89.111.136 port 58998 ssh2
Jul 31 01:02:12 master sshd[16968]: Failed password for invalid user wang from 159.89.111.136 port 54436 ssh2
Jul 31 01:06:03 master sshd[16996]: Failed password for invalid user safety from 159.89.111.136 port 49564 ssh2
Jul 31 01:10:03 master sshd[17020]: Failed password for invalid user amsftp from 159.89.111.136 port 44910 ssh2
Jul 31 01:14:10 master sshd[17050]: Failed password for invalid user testing from 159.89.111.136 port 40068 ssh2
Jul 31 01:18:13 master sshd[17082]: Failed password for root from 159.89.111.136 port 35468 ssh2
Jul 31 01:22:12 master sshd[17110]: Failed password for invalid user quincy from 159.89.111.136 port 58778 ssh2
Jul 31 01:26:13 master sshd[17143]: Failed passwo
2019-07-31 14:34:58
202.83.57.97 attack
Unauthorized connection attempt from IP address 202.83.57.97 on Port 445(SMB)
2019-07-31 14:42:29
121.142.111.222 attackspambots
Invalid user fm from 121.142.111.222 port 50242
2019-07-31 14:53:00

最近上报的IP列表

20.40.202.3 20.40.202.38 20.40.202.5 20.40.202.6
20.40.202.18 20.40.202.32 20.40.202.36 20.40.216.1
20.40.245.117 20.40.242.138 20.40.74.84 20.40.40.248
20.41.228.82 20.40.249.235 20.41.240.176 20.41.54.195
20.41.46.128 20.41.44.121 20.41.87.124 20.41.96.144