必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Reserved

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.138.65.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;240.138.65.26.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 23:36:13 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 26.65.138.240.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.65.138.240.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.29.13.20 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-12 20:59:49
104.248.187.231 attack
Aug 12 14:26:16 v22018076622670303 sshd\[26266\]: Invalid user kathi from 104.248.187.231 port 50616
Aug 12 14:26:16 v22018076622670303 sshd\[26266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.231
Aug 12 14:26:18 v22018076622670303 sshd\[26266\]: Failed password for invalid user kathi from 104.248.187.231 port 50616 ssh2
...
2019-08-12 20:38:31
81.28.100.125 attackspam
Autoban   81.28.100.125 AUTH/CONNECT
2019-08-12 20:46:22
139.59.25.230 attackspambots
ssh failed login
2019-08-12 20:40:48
103.206.209.238 attackspam
Aug 12 07:03:48 our-server-hostname postfix/smtpd[19881]: connect from unknown[103.206.209.238]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug 12 07:03:53 our-server-hostname postfix/smtpd[19881]: lost connection after RCPT from unknown[103.206.209.238]
Aug 12 07:03:53 our-server-hostname postfix/smtpd[19881]: disconnect from unknown[103.206.209.238]
Aug 12 07:48:57 our-server-hostname postfix/smtpd[19902]: connect from unknown[103.206.209.238]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug 12 07:49:06 our-server-hostname postfix/smtpd[19902]: lost connection after RCPT from unknown[103.206.209.238]
Aug 12 07:49:06 our-server-hostname postfix/smtpd[19902]: disconnect from unknown[103.206.209.238]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.206.209.238
2019-08-12 20:25:15
122.155.223.113 attack
Aug 12 11:34:58 shadeyouvpn sshd[5611]: Invalid user usuario from 122.155.223.113
Aug 12 11:34:58 shadeyouvpn sshd[5611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.113 
Aug 12 11:35:01 shadeyouvpn sshd[5611]: Failed password for invalid user usuario from 122.155.223.113 port 60404 ssh2
Aug 12 11:35:01 shadeyouvpn sshd[5611]: Received disconnect from 122.155.223.113: 11: Bye Bye [preauth]
Aug 12 11:43:50 shadeyouvpn sshd[13798]: Invalid user SinusBot from 122.155.223.113
Aug 12 11:43:50 shadeyouvpn sshd[13798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.113 
Aug 12 11:43:52 shadeyouvpn sshd[13798]: Failed password for invalid user SinusBot from 122.155.223.113 port 33296 ssh2
Aug 12 11:43:52 shadeyouvpn sshd[13798]: Received disconnect from 122.155.223.113: 11: Bye Bye [preauth]
Aug 12 11:44:55 shadeyouvpn sshd[14291]: Invalid user angelina from 122.155.223.........
-------------------------------
2019-08-12 20:35:26
51.254.123.131 attackspambots
Aug 12 13:26:14 debian sshd\[5527\]: Invalid user ioana from 51.254.123.131 port 59668
Aug 12 13:26:14 debian sshd\[5527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.123.131
...
2019-08-12 20:42:06
185.220.101.22 attackbotsspam
Aug 12 14:25:47 ovpn sshd\[8666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.22  user=root
Aug 12 14:25:49 ovpn sshd\[8666\]: Failed password for root from 185.220.101.22 port 33221 ssh2
Aug 12 14:25:51 ovpn sshd\[8666\]: Failed password for root from 185.220.101.22 port 33221 ssh2
Aug 12 14:25:54 ovpn sshd\[8666\]: Failed password for root from 185.220.101.22 port 33221 ssh2
Aug 12 14:25:56 ovpn sshd\[8666\]: Failed password for root from 185.220.101.22 port 33221 ssh2
2019-08-12 20:58:45
169.255.190.111 attackspam
Aug 12 06:49:21 our-server-hostname postfix/smtpd[19536]: connect from unknown[169.255.190.111]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug 12 06:49:29 our-server-hostname postfix/smtpd[19536]: lost connection after RCPT from unknown[169.255.190.111]
Aug 12 06:49:29 our-server-hostname postfix/smtpd[19536]: disconnect from unknown[169.255.190.111]
Aug 12 07:22:58 our-server-hostname postfix/smtpd[21305]: connect from unknown[169.255.190.111]
Aug x@x
Aug 12 07:23:01 our-server-hostname postfix/smtpd[21305]: lost connection after RCPT from unknown[169.255.190.111]
Aug 12 07:23:01 our-server-hostname postfix/smtpd[21305]: disconnect from unknown[169.255.190.111]
Aug 12 10:50:19 our-server-hostname postfix/smtpd[573]: connect from unknown[169.255.190.111]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=169.255.190.111
2019-08-12 20:19:04
85.209.0.115 attackbotsspam
Port scan on 10 port(s): 24302 26169 27234 29813 30453 39474 44279 50887 51134 54172
2019-08-12 20:23:07
132.145.21.100 attackspambots
Aug 12 14:25:56 nextcloud sshd\[24346\]: Invalid user teamspeak-server from 132.145.21.100
Aug 12 14:25:56 nextcloud sshd\[24346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.21.100
Aug 12 14:25:58 nextcloud sshd\[24346\]: Failed password for invalid user teamspeak-server from 132.145.21.100 port 38595 ssh2
...
2019-08-12 20:57:02
47.254.192.237 attack
Lines containing failures of 47.254.192.237
Aug 12 13:53:23 *** sshd[16430]: Invalid user nc from 47.254.192.237 port 54172
Aug 12 13:53:23 *** sshd[16430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.192.237
Aug 12 13:53:26 *** sshd[16430]: Failed password for invalid user nc from 47.254.192.237 port 54172 ssh2
Aug 12 13:53:26 *** sshd[16430]: Received disconnect from 47.254.192.237 port 54172:11: Bye Bye [preauth]
Aug 12 13:53:26 *** sshd[16430]: Disconnected from invalid user nc 47.254.192.237 port 54172 [preauth]
Aug 12 14:06:30 *** sshd[17141]: Invalid user mb from 47.254.192.237 port 51338
Aug 12 14:06:30 *** sshd[17141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.192.237
Aug 12 14:06:33 *** sshd[17141]: Failed password for invalid user mb from 47.254.192.237 port 51338 ssh2
Aug 12 14:06:33 *** sshd[17141]: Received disconnect from 47.254.192.237 port 51338:11: By........
------------------------------
2019-08-12 20:42:34
192.160.102.170 attackspambots
Aug 12 11:59:35 v22018076622670303 sshd\[25115\]: Invalid user user1 from 192.160.102.170 port 43263
Aug 12 11:59:35 v22018076622670303 sshd\[25115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.160.102.170
Aug 12 11:59:38 v22018076622670303 sshd\[25115\]: Failed password for invalid user user1 from 192.160.102.170 port 43263 ssh2
...
2019-08-12 20:17:07
13.71.1.224 attackbots
$f2bV_matches
2019-08-12 20:49:07
173.198.182.40 attackspam
22
2019-08-12 21:06:09

最近上报的IP列表

178.46.249.241 216.126.74.179 218.148.218.177 3.129.185.87
247.64.27.124 92.75.149.14 36.198.154.250 139.162.23.47
179.18.179.91 165.22.245.19 144.221.94.10 213.205.39.40
117.50.50.44 67.75.83.133 234.83.197.185 48.213.39.118
241.238.88.136 149.135.31.142 10.182.161.101 52.22.76.27