必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Tietong

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.40.33.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.40.33.31.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:19:15 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 31.33.40.222.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 31.33.40.222.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
210.21.9.251 attack
Port Scan 3389
2019-07-07 07:44:35
220.135.48.40 attackbotsspam
Jul  6 23:12:16 ip-172-31-1-72 sshd\[1774\]: Invalid user ftptest from 220.135.48.40
Jul  6 23:12:16 ip-172-31-1-72 sshd\[1774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.48.40
Jul  6 23:12:18 ip-172-31-1-72 sshd\[1774\]: Failed password for invalid user ftptest from 220.135.48.40 port 60808 ssh2
Jul  6 23:15:29 ip-172-31-1-72 sshd\[1828\]: Invalid user username from 220.135.48.40
Jul  6 23:15:29 ip-172-31-1-72 sshd\[1828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.48.40
2019-07-07 07:23:48
185.220.101.61 attackspam
Unauthorized SSH login attempts
2019-07-07 07:41:08
142.93.65.163 attackbotsspam
142.93.65.163 - - [07/Jul/2019:01:15:04 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:04 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.65.163 - - [07/Jul/2019:01:15:05 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 07:37:13
178.62.42.112 attack
3389BruteforceFW22
2019-07-07 07:59:30
62.102.148.68 attack
Unauthorized SSH login attempts
2019-07-07 07:37:33
85.144.226.170 attackspambots
Jul  7 00:15:48 debian sshd\[15644\]: Invalid user arkserver from 85.144.226.170 port 39492
Jul  7 00:15:48 debian sshd\[15644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170
...
2019-07-07 07:21:05
18.205.169.82 attackbots
This IP address was blacklisted for the following reason:  /en/ @ 2019-07-03T09:51:12+02:00.
2019-07-07 07:40:46
134.209.103.14 attackspam
Attempted SSH login
2019-07-07 07:43:17
5.133.66.123 attack
$f2bV_matches
2019-07-07 07:44:01
118.25.27.67 attack
Jul  6 19:31:52 plusreed sshd[27593]: Invalid user admin from 118.25.27.67
Jul  6 19:31:52 plusreed sshd[27593]: Invalid user admin from 118.25.27.67
Jul  6 19:31:52 plusreed sshd[27593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67
Jul  6 19:31:52 plusreed sshd[27593]: Invalid user admin from 118.25.27.67
Jul  6 19:31:54 plusreed sshd[27593]: Failed password for invalid user admin from 118.25.27.67 port 37388 ssh2
...
2019-07-07 07:49:13
197.52.57.81 attackspambots
Honeypot hit.
2019-07-07 07:21:31
129.150.122.243 attackspambots
Jul  7 01:12:46 cp sshd[7631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.122.243
Jul  7 01:12:47 cp sshd[7631]: Failed password for invalid user apagar from 129.150.122.243 port 30122 ssh2
Jul  7 01:15:41 cp sshd[9285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.122.243
2019-07-07 07:22:51
142.93.85.35 attackspambots
ssh failed login
2019-07-07 07:22:31
167.99.79.156 attackspam
167.99.79.156 - - [07/Jul/2019:01:15:11 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:12 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:14 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:15 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:29 +0200] "POST /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.79.156 - - [07/Jul/2019:01:15:34 +0200] "GET /wp-login.php HTTP/1.1" 200 4405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 07:24:49

最近上报的IP列表

18.166.50.188 253.33.55.197 115.68.117.68 199.207.36.232
143.210.116.113 95.58.92.75 171.99.190.39 238.142.253.100
118.193.241.135 121.223.232.226 192.241.221.237 214.81.240.31
69.160.77.18 66.10.206.5 235.184.202.223 20.16.43.34
203.20.160.211 244.146.34.128 196.20.3.153 206.240.206.176