必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): New Taipei City

省份(region): New Taipei

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.240.220.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.240.220.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:57:31 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
45.220.240.27.in-addr.arpa domain name pointer 27-240-220-45.adsl.fetnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.220.240.27.in-addr.arpa	name = 27-240-220-45.adsl.fetnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.76.34.87 attackspam
Invalid user ts3user from 185.76.34.87 port 52932
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.76.34.87
Failed password for invalid user ts3user from 185.76.34.87 port 52932 ssh2
Invalid user guest from 185.76.34.87 port 60976
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.76.34.87
2019-11-17 14:12:31
193.91.125.249 attackbotsspam
Automatic report - Banned IP Access
2019-11-17 14:21:33
106.12.82.70 attackspambots
Nov 17 07:47:57 server sshd\[12328\]: Invalid user backup from 106.12.82.70
Nov 17 07:47:57 server sshd\[12328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.82.70 
Nov 17 07:47:59 server sshd\[12328\]: Failed password for invalid user backup from 106.12.82.70 port 38300 ssh2
Nov 17 07:57:27 server sshd\[14866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.82.70  user=root
Nov 17 07:57:30 server sshd\[14866\]: Failed password for root from 106.12.82.70 port 38198 ssh2
...
2019-11-17 13:48:32
128.199.133.201 attackbotsspam
Nov 17 00:28:38 TORMINT sshd\[1662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.201  user=root
Nov 17 00:28:40 TORMINT sshd\[1662\]: Failed password for root from 128.199.133.201 port 52546 ssh2
Nov 17 00:32:37 TORMINT sshd\[1995\]: Invalid user aikman from 128.199.133.201
Nov 17 00:32:37 TORMINT sshd\[1995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.201
...
2019-11-17 13:53:13
79.135.40.231 attack
Invalid user test01 from 79.135.40.231 port 50348
2019-11-17 14:01:37
23.91.70.84 attack
Automatic report - XMLRPC Attack
2019-11-17 13:43:51
180.166.114.14 attackbots
[ssh] SSH attack
2019-11-17 13:44:18
103.47.57.165 attackbotsspam
Nov 17 00:15:39 ny01 sshd[15721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.57.165
Nov 17 00:15:42 ny01 sshd[15721]: Failed password for invalid user mahani from 103.47.57.165 port 40335 ssh2
Nov 17 00:24:51 ny01 sshd[16522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.57.165
2019-11-17 13:37:32
218.57.90.40 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/218.57.90.40/ 
 
 CN - 1H : (668)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 218.57.90.40 
 
 CIDR : 218.57.0.0/17 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 6 
  3H - 34 
  6H - 69 
 12H - 130 
 24H - 245 
 
 DateTime : 2019-11-17 05:56:51 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-17 14:17:31
114.238.59.21 attackbotsspam
badbot
2019-11-17 13:49:41
49.235.42.19 attack
Nov 17 11:37:37 vibhu-HP-Z238-Microtower-Workstation sshd\[23232\]: Invalid user tropeano from 49.235.42.19
Nov 17 11:37:37 vibhu-HP-Z238-Microtower-Workstation sshd\[23232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.42.19
Nov 17 11:37:39 vibhu-HP-Z238-Microtower-Workstation sshd\[23232\]: Failed password for invalid user tropeano from 49.235.42.19 port 41080 ssh2
Nov 17 11:42:31 vibhu-HP-Z238-Microtower-Workstation sshd\[23623\]: Invalid user dresden from 49.235.42.19
Nov 17 11:42:31 vibhu-HP-Z238-Microtower-Workstation sshd\[23623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.42.19
...
2019-11-17 14:16:28
104.236.142.89 attackbotsspam
2019-11-17T06:03:41.797628abusebot-4.cloudsearch.cf sshd\[14699\]: Invalid user opedal from 104.236.142.89 port 46828
2019-11-17 14:04:04
123.138.18.11 attack
2019-11-17T05:30:23.297946abusebot.cloudsearch.cf sshd\[17408\]: Invalid user sexsex from 123.138.18.11 port 45932
2019-11-17 13:37:01
104.250.34.5 attackspam
Nov 17 05:38:40 ns382633 sshd\[3903\]: Invalid user create from 104.250.34.5 port 14800
Nov 17 05:38:40 ns382633 sshd\[3903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.5
Nov 17 05:38:41 ns382633 sshd\[3903\]: Failed password for invalid user create from 104.250.34.5 port 14800 ssh2
Nov 17 05:57:21 ns382633 sshd\[7782\]: Invalid user arri from 104.250.34.5 port 59924
Nov 17 05:57:21 ns382633 sshd\[7782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.5
2019-11-17 13:55:51
112.15.38.218 attackbots
Nov 17 05:54:26 game-panel sshd[16659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.38.218
Nov 17 05:54:28 game-panel sshd[16659]: Failed password for invalid user admin from 112.15.38.218 port 48218 ssh2
Nov 17 05:59:26 game-panel sshd[16836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.38.218
2019-11-17 14:07:15

最近上报的IP列表

164.157.213.69 13.76.111.96 241.100.166.246 106.209.184.40
54.183.60.246 41.214.251.148 21.134.193.46 231.72.174.174
248.11.210.47 44.184.12.7 58.129.250.164 166.175.98.6
16.96.100.30 118.214.8.124 149.6.4.126 245.244.240.133
186.143.99.172 123.238.190.142 203.0.35.20 156.149.141.134