必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Reserved

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.134.55.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.134.55.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 05:59:54 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 40.55.134.23.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.55.134.23.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.48.37.170 attackbotsspam
Invalid user gabriel from 181.48.37.170 port 44016
2020-07-21 01:18:02
36.57.88.204 attack
Jul 20 17:12:18 srv01 postfix/smtpd\[15131\]: warning: unknown\[36.57.88.204\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:19:14 srv01 postfix/smtpd\[24674\]: warning: unknown\[36.57.88.204\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:19:25 srv01 postfix/smtpd\[24674\]: warning: unknown\[36.57.88.204\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 17:19:44 srv01 postfix/smtpd\[24674\]: warning: unknown\[36.57.88.204\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Jul 20 17:30:24 srv01 postfix/smtpd\[27362\]: warning: unknown\[36.57.88.204\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
...
2020-07-21 01:34:02
183.239.21.44 attack
Invalid user goyette from 183.239.21.44 port 33791
2020-07-21 01:19:22
111.72.194.213 attackspambots
Jul 20 15:56:15 srv01 postfix/smtpd\[25547\]: warning: unknown\[111.72.194.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 16:06:54 srv01 postfix/smtpd\[31927\]: warning: unknown\[111.72.194.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 16:07:17 srv01 postfix/smtpd\[31927\]: warning: unknown\[111.72.194.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 16:07:36 srv01 postfix/smtpd\[31927\]: warning: unknown\[111.72.194.213\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Jul 20 16:13:45 srv01 postfix/smtpd\[2961\]: warning: unknown\[111.72.194.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-21 01:23:59
106.13.226.34 attack
Jul 20 13:32:06 ip-172-31-62-245 sshd\[30337\]: Invalid user wuqianhan from 106.13.226.34\
Jul 20 13:32:07 ip-172-31-62-245 sshd\[30337\]: Failed password for invalid user wuqianhan from 106.13.226.34 port 38712 ssh2\
Jul 20 13:36:41 ip-172-31-62-245 sshd\[30406\]: Invalid user bram from 106.13.226.34\
Jul 20 13:36:43 ip-172-31-62-245 sshd\[30406\]: Failed password for invalid user bram from 106.13.226.34 port 32856 ssh2\
Jul 20 13:41:23 ip-172-31-62-245 sshd\[30512\]: Invalid user www from 106.13.226.34\
2020-07-21 01:24:25
121.74.25.178 attackbotsspam
SSH Brute-Forcing (server2)
2020-07-21 01:45:36
206.189.93.61 attackbots
Jul 20 13:55:49 olgosrv01 sshd[24983]: Failed password for r.r from 206.189.93.61 port 36578 ssh2
Jul 20 13:55:49 olgosrv01 sshd[24983]: Connection closed by 206.189.93.61 [preauth]
Jul 20 13:57:56 olgosrv01 sshd[25165]: Failed password for r.r from 206.189.93.61 port 41144 ssh2
Jul 20 13:57:57 olgosrv01 sshd[25165]: Connection closed by 206.189.93.61 [preauth]
Jul 20 13:59:58 olgosrv01 sshd[25288]: Failed password for r.r from 206.189.93.61 port 45508 ssh2
Jul 20 13:59:58 olgosrv01 sshd[25288]: Connection closed by 206.189.93.61 [preauth]
Jul 20 14:01:43 olgosrv01 sshd[25903]: Failed password for r.r from 206.189.93.61 port 49654 ssh2
Jul 20 14:01:43 olgosrv01 sshd[25903]: Connection closed by 206.189.93.61 [preauth]
Jul 20 14:03:19 olgosrv01 sshd[26107]: Failed password for r.r from 206.189.93.61 port 53332 ssh2
Jul 20 14:03:20 olgosrv01 sshd[26107]: Connection closed by 206.189.93.61 [preauth]
Jul 20 14:04:54 olgosrv01 sshd[26168]: Failed password for r.r from 206.18........
-------------------------------
2020-07-21 01:49:53
150.129.8.26 attackspambots
20 attempts against mh_ha-misbehave-ban on light
2020-07-21 01:32:01
183.89.212.89 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-07-21 01:57:03
35.226.76.161 attackspam
Jul 20 13:47:19 firewall sshd[23841]: Invalid user ftpuser from 35.226.76.161
Jul 20 13:47:20 firewall sshd[23841]: Failed password for invalid user ftpuser from 35.226.76.161 port 58326 ssh2
Jul 20 13:51:26 firewall sshd[23941]: Invalid user jocelyn from 35.226.76.161
...
2020-07-21 01:28:54
117.89.172.66 attack
Jul 20 13:46:10 zimbra sshd[28697]: Invalid user halley from 117.89.172.66
Jul 20 13:46:10 zimbra sshd[28697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.172.66
Jul 20 13:46:12 zimbra sshd[28697]: Failed password for invalid user halley from 117.89.172.66 port 34178 ssh2
Jul 20 13:46:12 zimbra sshd[28697]: Received disconnect from 117.89.172.66 port 34178:11: Bye Bye [preauth]
Jul 20 13:46:12 zimbra sshd[28697]: Disconnected from 117.89.172.66 port 34178 [preauth]
Jul 20 13:59:38 zimbra sshd[9365]: Invalid user alfresco from 117.89.172.66
Jul 20 13:59:38 zimbra sshd[9365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.172.66
Jul 20 13:59:40 zimbra sshd[9365]: Failed password for invalid user alfresco from 117.89.172.66 port 35948 ssh2
Jul 20 13:59:40 zimbra sshd[9365]: Received disconnect from 117.89.172.66 port 35948:11: Bye Bye [preauth]
Jul 20 13:59:40 zimbra sshd[936........
-------------------------------
2020-07-21 01:47:11
111.229.67.3 attackspambots
Invalid user banner from 111.229.67.3 port 37664
2020-07-21 01:32:49
37.49.230.204 attackbots
DATE:2020-07-20 14:28:04, IP:37.49.230.204, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-07-21 01:33:26
74.82.47.29 attack
srv02 Mass scanning activity detected Target: 17  ..
2020-07-21 01:31:18
106.12.72.135 attackspambots
2020-07-20T14:27:45+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-21 01:51:55

最近上报的IP列表

142.122.174.179 252.90.99.130 21.113.120.114 127.110.135.114
135.236.24.10 129.169.78.54 56.38.244.41 28.208.205.50
226.49.83.226 190.192.87.233 39.229.251.179 59.15.45.40
193.38.26.247 122.113.142.91 142.248.216.6 46.176.189.169
128.163.110.198 210.46.95.201 67.221.48.219 237.235.99.66