必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.42.106.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.42.106.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 11:42:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 40.106.42.207.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.106.42.207.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.16.17.236 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 16-10-2019 04:30:22.
2019-10-16 13:29:58
125.64.94.220 attackspambots
16.10.2019 05:23:12 Connection to port 8500 blocked by firewall
2019-10-16 13:43:31
222.186.3.249 attack
Fail2Ban Ban Triggered
2019-10-16 13:11:28
167.99.2.248 attackbotsspam
Attempted to connect 2 times to port 22 TCP
2019-10-16 13:45:54
125.25.185.20 attackbots
Unauthorized connection attempt from IP address 125.25.185.20 on Port 445(SMB)
2019-10-16 13:29:32
193.159.246.242 attack
Oct 15 17:41:16 tdfoods sshd\[11684\]: Invalid user newstart from 193.159.246.242
Oct 15 17:41:16 tdfoods sshd\[11684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.159.246.242
Oct 15 17:41:19 tdfoods sshd\[11684\]: Failed password for invalid user newstart from 193.159.246.242 port 52762 ssh2
Oct 15 17:45:06 tdfoods sshd\[12037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.159.246.242  user=root
Oct 15 17:45:07 tdfoods sshd\[12037\]: Failed password for root from 193.159.246.242 port 34620 ssh2
2019-10-16 13:47:33
118.69.37.45 attackspambots
Unauthorized connection attempt from IP address 118.69.37.45 on Port 445(SMB)
2019-10-16 13:22:33
118.163.111.221 attackbotsspam
2019-10-16T11:02:59.496787enmeeting.mahidol.ac.th sshd\[1505\]: Invalid user ftpuser from 118.163.111.221 port 60594
2019-10-16T11:02:59.517941enmeeting.mahidol.ac.th sshd\[1505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-163-111-221.hinet-ip.hinet.net
2019-10-16T11:03:01.119387enmeeting.mahidol.ac.th sshd\[1505\]: Failed password for invalid user ftpuser from 118.163.111.221 port 60594 ssh2
...
2019-10-16 13:19:36
18.139.97.31 attackbots
(sshd) Failed SSH login from 18.139.97.31 (SG/Singapore/ec2-18-139-97-31.ap-southeast-1.compute.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 16 06:44:29 server2 sshd[14905]: Failed password for root from 18.139.97.31 port 39336 ssh2
Oct 16 06:56:06 server2 sshd[15162]: Invalid user dnsftp from 18.139.97.31 port 45314
Oct 16 06:56:08 server2 sshd[15162]: Failed password for invalid user dnsftp from 18.139.97.31 port 45314 ssh2
Oct 16 07:01:23 server2 sshd[15298]: Failed password for root from 18.139.97.31 port 57608 ssh2
Oct 16 07:06:14 server2 sshd[15387]: Invalid user dirmngr from 18.139.97.31 port 41718
2019-10-16 13:42:32
177.12.176.86 attack
3389BruteforceFW23
2019-10-16 13:07:07
91.244.73.243 attack
SPF Fail sender not permitted to send mail for @vms-online.ru / Sent mail to target address hacked/leaked from abandonia in 2016
2019-10-16 13:28:17
212.64.19.123 attackbots
Oct 16 07:07:01 vps647732 sshd[27345]: Failed password for root from 212.64.19.123 port 45420 ssh2
...
2019-10-16 13:25:01
49.88.112.111 attackbots
Oct 16 06:42:28 ovpn sshd\[25440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Oct 16 06:42:30 ovpn sshd\[25440\]: Failed password for root from 49.88.112.111 port 26845 ssh2
Oct 16 06:43:31 ovpn sshd\[25632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Oct 16 06:43:33 ovpn sshd\[25632\]: Failed password for root from 49.88.112.111 port 13583 ssh2
Oct 16 06:44:19 ovpn sshd\[25782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
2019-10-16 13:12:26
191.96.25.105 attackbotsspam
Oct 16 10:57:07 lcl-usvr-02 sshd[6855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105  user=root
Oct 16 10:57:09 lcl-usvr-02 sshd[6855]: Failed password for root from 191.96.25.105 port 51902 ssh2
Oct 16 11:01:19 lcl-usvr-02 sshd[7920]: Invalid user zun from 191.96.25.105 port 34128
Oct 16 11:01:19 lcl-usvr-02 sshd[7920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105
Oct 16 11:01:19 lcl-usvr-02 sshd[7920]: Invalid user zun from 191.96.25.105 port 34128
Oct 16 11:01:21 lcl-usvr-02 sshd[7920]: Failed password for invalid user zun from 191.96.25.105 port 34128 ssh2
...
2019-10-16 13:06:32
177.133.40.71 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 16-10-2019 04:30:24.
2019-10-16 13:26:42

最近上报的IP列表

148.128.44.123 157.120.222.130 245.243.4.249 126.80.104.151
64.167.56.15 14.244.87.241 254.206.221.61 239.43.105.200
134.147.133.224 153.131.77.59 10.201.164.64 2.68.78.28
169.77.245.96 112.125.145.119 177.223.222.52 24.202.162.65
148.44.54.86 43.101.201.176 229.126.162.67 164.41.130.144