必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Montgomery

省份(region): Alabama

国家(country): United States

运营商(isp): RTC Communications LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.106.40.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.106.40.12.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102600 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 27 00:37:57 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
12.40.106.207.in-addr.arpa domain name pointer 12.40.106.207.in-addr.arpa.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.40.106.207.in-addr.arpa	name = 12.40.106.207.in-addr.arpa.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.183.252.116 attack
Automatic report - Port Scan Attack
2020-02-11 05:47:20
209.200.15.178 attackbotsspam
445/tcp 1433/tcp...
[2019-12-16/2020-02-10]8pkt,2pt.(tcp)
2020-02-11 05:43:38
69.14.231.20 attack
Honeypot attack, port: 445, PTR: 69-14-231-20.static.try.wideopenwest.com.
2020-02-11 05:39:11
78.154.167.55 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 05:53:15
77.43.245.150 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 06:06:42
14.190.118.193 attackbots
1581341774 - 02/10/2020 14:36:14 Host: 14.190.118.193/14.190.118.193 Port: 445 TCP Blocked
2020-02-11 05:40:53
191.6.82.108 attack
Automatic report - Port Scan Attack
2020-02-11 06:02:18
95.57.218.103 attackspambots
1433/tcp 445/tcp...
[2019-12-13/2020-02-10]12pkt,2pt.(tcp)
2020-02-11 05:52:48
118.44.140.48 attackspam
23/tcp 60001/tcp...
[2019-12-11/2020-02-10]11pkt,2pt.(tcp)
2020-02-11 05:40:21
201.48.206.146 attackbotsspam
$f2bV_matches
2020-02-11 06:01:38
62.171.137.45 attackspambots
69/udp 69/udp 69/udp...
[2020-02-08/10]5pkt,1pt.(udp)
2020-02-11 05:59:55
201.43.22.107 attackbots
$f2bV_matches
2020-02-11 06:07:38
222.186.173.183 attackbots
Feb 10 22:34:35 h2177944 kernel: \[4568486.877868\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=222.186.173.183 DST=85.214.117.9 LEN=724 TOS=0x00 PREC=0x00 TTL=47 ID=57726 DF PROTO=TCP SPT=35224 DPT=22 WINDOW=229 RES=0x00 ACK PSH URGP=0 
Feb 10 22:34:36 h2177944 kernel: \[4568487.656564\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=222.186.173.183 DST=85.214.117.9 LEN=67 TOS=0x00 PREC=0x00 TTL=47 ID=57728 DF PROTO=TCP SPT=35224 DPT=22 WINDOW=229 RES=0x00 ACK PSH URGP=0 
Feb 10 22:34:37 h2177944 kernel: \[4568488.381189\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=222.186.173.183 DST=85.214.117.9 LEN=67 TOS=0x00 PREC=0x00 TTL=47 ID=57729 DF PROTO=TCP SPT=35224 DPT=22 WINDOW=229 RES=0x00 ACK PSH URGP=0 
Feb 10 22:34:38 h2177944 kernel: \[4568489.832339\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=222.186.173.183 DST=85.214.117.9 LEN=67 TOS=0x00 PREC=0x00 TTL=47 ID=57730 DF PROTO=TCP SPT=35224 DPT=22 WINDOW=229 RES=0x00 ACK PSH URGP=0 
Feb 10 22:34:41 h2177944 kernel: \[4568492.735638\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=222.186.1
2020-02-11 05:37:01
78.188.151.201 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 05:33:10
117.202.8.55 attackbots
detected by Fail2Ban
2020-02-11 06:10:22

最近上报的IP列表

162.224.105.83 102.255.191.169 55.230.219.73 14.34.247.105
64.199.9.194 152.70.253.6 23.135.98.225 128.88.49.220
246.1.63.150 154.243.206.16 98.224.64.61 147.113.126.26
22.54.27.143 145.206.54.210 152.147.90.239 149.197.165.129
109.119.110.121 100.25.132.11 24.30.57.232 235.11.227.243