必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.40.119.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.40.119.140.			IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:28:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 140.119.40.27.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.119.40.27.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
71.6.135.131 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-05 12:25:53
115.238.62.154 attackspambots
Sep  4 19:57:47 mail sshd\[11996\]: Invalid user admin from 115.238.62.154
Sep  4 19:57:47 mail sshd\[11996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.62.154
...
2019-09-05 12:23:34
182.61.34.79 attackbots
Sep  4 13:46:52 php2 sshd\[25648\]: Invalid user test from 182.61.34.79
Sep  4 13:46:52 php2 sshd\[25648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.34.79
Sep  4 13:46:54 php2 sshd\[25648\]: Failed password for invalid user test from 182.61.34.79 port 25543 ssh2
Sep  4 13:51:19 php2 sshd\[26088\]: Invalid user admin from 182.61.34.79
Sep  4 13:51:19 php2 sshd\[26088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.34.79
2019-09-05 12:20:07
67.160.238.143 attack
Sep  5 06:31:00 MK-Soft-Root1 sshd\[23774\]: Invalid user deployer from 67.160.238.143 port 57018
Sep  5 06:31:00 MK-Soft-Root1 sshd\[23774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.160.238.143
Sep  5 06:31:02 MK-Soft-Root1 sshd\[23774\]: Failed password for invalid user deployer from 67.160.238.143 port 57018 ssh2
...
2019-09-05 12:36:19
80.82.67.116 attackspam
05.09.2019 04:45:33 SSH access blocked by firewall
2019-09-05 12:47:12
37.187.54.45 attack
Sep  5 06:12:11 saschabauer sshd[23388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45
Sep  5 06:12:12 saschabauer sshd[23388]: Failed password for invalid user 1qaz@WSX from 37.187.54.45 port 35174 ssh2
2019-09-05 12:46:51
77.247.181.163 attackspam
Sep  5 04:39:31 thevastnessof sshd[11175]: Failed password for root from 77.247.181.163 port 3290 ssh2
...
2019-09-05 12:52:01
140.249.192.87 attack
Sep  4 23:56:40 xtremcommunity sshd\[5897\]: Invalid user guest from 140.249.192.87 port 51772
Sep  4 23:56:40 xtremcommunity sshd\[5897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.192.87
Sep  4 23:56:42 xtremcommunity sshd\[5897\]: Failed password for invalid user guest from 140.249.192.87 port 51772 ssh2
Sep  5 00:00:13 xtremcommunity sshd\[5984\]: Invalid user steam from 140.249.192.87 port 34776
Sep  5 00:00:13 xtremcommunity sshd\[5984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.192.87
...
2019-09-05 12:27:53
217.22.170.3 attack
Sep  5 07:07:00 server sshd\[10079\]: Invalid user smbuser from 217.22.170.3 port 55472
Sep  5 07:07:00 server sshd\[10079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.22.170.3
Sep  5 07:07:02 server sshd\[10079\]: Failed password for invalid user smbuser from 217.22.170.3 port 55472 ssh2
Sep  5 07:11:50 server sshd\[21078\]: Invalid user webmaster from 217.22.170.3 port 41838
Sep  5 07:11:50 server sshd\[21078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.22.170.3
2019-09-05 12:27:05
195.154.33.66 attackspambots
Sep  5 06:05:44 dedicated sshd[28609]: Invalid user demo from 195.154.33.66 port 32776
2019-09-05 12:15:27
50.209.176.166 attackbotsspam
Sep  4 18:22:20 hpm sshd\[12962\]: Invalid user 123456 from 50.209.176.166
Sep  4 18:22:20 hpm sshd\[12962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.176.166
Sep  4 18:22:22 hpm sshd\[12962\]: Failed password for invalid user 123456 from 50.209.176.166 port 39496 ssh2
Sep  4 18:26:09 hpm sshd\[13287\]: Invalid user qwerty123 from 50.209.176.166
Sep  4 18:26:09 hpm sshd\[13287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.176.166
2019-09-05 12:34:49
167.99.156.195 attackspambots
167.99.156.195 - - [05/Sep/2019:00:57:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.156.195 - - [05/Sep/2019:00:57:35 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.156.195 - - [05/Sep/2019:00:57:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.156.195 - - [05/Sep/2019:00:57:46 +0200] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.156.195 - - [05/Sep/2019:00:57:52 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.156.195 - - [05/Sep/2019:00:57:52 +0200] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-05 12:50:36
49.88.112.85 attackbots
Sep  5 10:01:19 areeb-Workstation sshd[8505]: Failed password for root from 49.88.112.85 port 63131 ssh2
...
2019-09-05 12:35:23
130.61.83.71 attack
Sep  5 07:07:13 www sshd\[7971\]: Invalid user sftpuser from 130.61.83.71Sep  5 07:07:15 www sshd\[7971\]: Failed password for invalid user sftpuser from 130.61.83.71 port 48429 ssh2Sep  5 07:11:36 www sshd\[8054\]: Invalid user myftp123 from 130.61.83.71Sep  5 07:11:38 www sshd\[8054\]: Failed password for invalid user myftp123 from 130.61.83.71 port 28342 ssh2
...
2019-09-05 12:51:00
45.125.65.58 attackspambots
2019-09-05T05:34:07.595552ns1.unifynetsol.net postfix/smtpd\[14403\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-05T06:38:58.055850ns1.unifynetsol.net postfix/smtpd\[23330\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-05T07:42:42.963622ns1.unifynetsol.net postfix/smtpd\[2333\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-05T08:47:27.556956ns1.unifynetsol.net postfix/smtpd\[10972\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-05T09:50:38.605786ns1.unifynetsol.net postfix/smtpd\[19487\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-05 12:57:19

最近上报的IP列表

27.4.248.151 27.40.74.217 27.40.102.57 27.40.102.5
27.40.75.53 27.40.73.216 27.40.77.158 27.40.79.95
27.40.121.4 27.40.83.64 27.40.80.182 27.40.84.134
27.40.77.54 27.40.77.85 27.40.84.169 27.40.85.100
27.40.86.173 27.40.86.145 27.40.88.83 27.41.8.135