必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.40.141.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.40.141.158.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 14:03:52 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
158.141.40.218.in-addr.arpa domain name pointer d-218-40-141-158.ftth.katch.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.141.40.218.in-addr.arpa	name = d-218-40-141-158.ftth.katch.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.110.118.129 attackbots
Unauthorized connection attempt detected from IP address 36.110.118.129 to port 2220 [J]
2020-01-26 16:45:11
45.65.196.14 attackspambots
Unauthorized connection attempt detected from IP address 45.65.196.14 to port 2220 [J]
2020-01-26 16:31:29
124.123.28.43 attackbotsspam
1580014140 - 01/26/2020 05:49:00 Host: 124.123.28.43/124.123.28.43 Port: 445 TCP Blocked
2020-01-26 16:35:19
91.123.24.84 attackspam
20/1/26@02:17:18: FAIL: Alarm-Network address from=91.123.24.84
20/1/26@02:17:18: FAIL: Alarm-Network address from=91.123.24.84
...
2020-01-26 17:01:21
201.48.65.147 attackbots
Unauthorized connection attempt detected from IP address 201.48.65.147 to port 2220 [J]
2020-01-26 17:11:45
36.155.112.131 attackbotsspam
Unauthorized connection attempt detected from IP address 36.155.112.131 to port 2220 [J]
2020-01-26 16:44:18
106.54.164.208 attack
Jan 26 09:53:29 vps691689 sshd[32295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.164.208
Jan 26 09:53:31 vps691689 sshd[32295]: Failed password for invalid user postgres from 106.54.164.208 port 36194 ssh2
Jan 26 09:55:41 vps691689 sshd[32357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.164.208
...
2020-01-26 17:13:36
117.121.214.50 attackspambots
Unauthorized connection attempt detected from IP address 117.121.214.50 to port 2220 [J]
2020-01-26 17:04:56
128.14.134.170 attack
Unauthorized connection attempt detected from IP address 128.14.134.170 to port 21 [J]
2020-01-26 16:53:42
187.32.120.215 attackspambots
Jan 25 21:09:44 php1 sshd\[4918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.120.215  user=root
Jan 25 21:09:47 php1 sshd\[4918\]: Failed password for root from 187.32.120.215 port 38756 ssh2
Jan 25 21:13:32 php1 sshd\[5355\]: Invalid user chase from 187.32.120.215
Jan 25 21:13:32 php1 sshd\[5355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.120.215
Jan 25 21:13:34 php1 sshd\[5355\]: Failed password for invalid user chase from 187.32.120.215 port 38656 ssh2
2020-01-26 17:12:17
83.211.162.82 attack
Unauthorized connection attempt detected from IP address 83.211.162.82 to port 2220 [J]
2020-01-26 16:39:22
77.247.110.69 attack
Port 5082 scan denied
2020-01-26 16:55:46
205.205.150.59 attackspam
205.205.150.59 was recorded 182 times by 1 hosts attempting to connect to the following ports: 9600,9869,9943,9944,13,6666,389,9981,5060,5985,503,8010,1741,9999,5986,6667,10000,17,515,3001,8069,19,444,6000,21,8080,1962,5222,8081,5269,6001,2000,548,10243,7000,465,6060,8086,554,6379,12345,502,8089,26,5357,8090,11300,3460,5432,631,3541,13579,2082,5555,636,7548,2083,14147,5560,3542,2086,7657,8099,666,5577,16010,2087,7777,53,17000,8112,3689,5672,18245,774,8126,7779,18246,8129,3749,79,8000,19150,3780,5900,8181,20000,873,2323,8333,3790,5938,20547,902,8001,8334,8443,21025,992,993,2376,21379,8008,2379,84,2404,23023,1010,88,23424,7,2425,4063,1023,1025,8880,2455,1098,8888,27015,1099,1177,8889,104,8899,1200,4443,1234,9000,27017,111,1311,4444,1400,113,1433,4567,4730,9001,9002,123,9042,4840,129,9051,4848,9080,1521,9100,4911,135,9151,9160,5000,5001,9191,5002,143,9390,5003,161,9418,175,9443,5007,179,9595,195,5009,311,5019,323. Incident counter (4h, 24h, all-time): 182, 182, 881
2020-01-26 17:08:34
191.241.239.90 attack
Jan 26 08:31:22 hcbbdb sshd\[20736\]: Invalid user sales from 191.241.239.90
Jan 26 08:31:22 hcbbdb sshd\[20736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.239.90
Jan 26 08:31:24 hcbbdb sshd\[20736\]: Failed password for invalid user sales from 191.241.239.90 port 47910 ssh2
Jan 26 08:32:54 hcbbdb sshd\[20890\]: Invalid user parana from 191.241.239.90
Jan 26 08:32:54 hcbbdb sshd\[20890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.239.90
2020-01-26 16:48:20
190.66.3.92 attackspambots
Unauthorized connection attempt detected from IP address 190.66.3.92 to port 2220 [J]
2020-01-26 16:48:47

最近上报的IP列表

103.102.246.161 84.77.59.183 168.232.65.104 114.42.208.119
103.139.89.233 111.1.201.203 1.116.138.153 201.218.216.151
78.36.145.246 182.92.188.198 220.135.97.4 125.44.246.112
182.73.245.154 154.201.44.207 190.180.154.201 93.46.112.62
192.164.244.220 103.96.223.86 88.205.254.189 178.170.54.205