必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.13.160.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.13.160.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 00:28:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 249.160.13.40.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.160.13.40.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.184.112.142 attack
SASL broute force
2019-12-07 14:27:15
49.88.112.55 attack
2019-12-06T16:50:28.540868homeassistant sshd[4732]: Failed password for root from 49.88.112.55 port 30034 ssh2
2019-12-07T06:04:01.279916homeassistant sshd[18828]: Failed none for root from 49.88.112.55 port 14524 ssh2
2019-12-07T06:04:01.549566homeassistant sshd[18828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
...
2019-12-07 14:06:13
40.77.167.44 attackspam
Automatic report - Banned IP Access
2019-12-07 14:29:33
149.56.131.73 attackspam
Dec  7 00:59:44 TORMINT sshd\[9976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.131.73  user=root
Dec  7 00:59:45 TORMINT sshd\[9976\]: Failed password for root from 149.56.131.73 port 57316 ssh2
Dec  7 01:05:13 TORMINT sshd\[10417\]: Invalid user ap from 149.56.131.73
Dec  7 01:05:13 TORMINT sshd\[10417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.131.73
...
2019-12-07 14:26:25
51.38.238.165 attackbots
Dec  7 01:15:35 linuxvps sshd\[47999\]: Invalid user salmon from 51.38.238.165
Dec  7 01:15:35 linuxvps sshd\[47999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165
Dec  7 01:15:37 linuxvps sshd\[47999\]: Failed password for invalid user salmon from 51.38.238.165 port 36190 ssh2
Dec  7 01:20:51 linuxvps sshd\[50917\]: Invalid user admin from 51.38.238.165
Dec  7 01:20:51 linuxvps sshd\[50917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.165
2019-12-07 14:21:54
212.64.127.106 attackspam
Dec  6 20:34:25 web9 sshd\[27428\]: Invalid user alberto from 212.64.127.106
Dec  6 20:34:25 web9 sshd\[27428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.127.106
Dec  6 20:34:27 web9 sshd\[27428\]: Failed password for invalid user alberto from 212.64.127.106 port 52700 ssh2
Dec  6 20:41:54 web9 sshd\[28559\]: Invalid user 123456789 from 212.64.127.106
Dec  6 20:41:54 web9 sshd\[28559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.127.106
2019-12-07 14:42:27
168.121.11.53 attack
Automatic report - Port Scan Attack
2019-12-07 14:14:05
94.21.243.204 attackbotsspam
Dec  6 14:33:24 server sshd\[14377\]: Failed password for invalid user radvd from 94.21.243.204 port 46834 ssh2
Dec  7 07:52:14 server sshd\[10374\]: Invalid user ijm from 94.21.243.204
Dec  7 07:52:14 server sshd\[10374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-243-204.static.digikabel.hu 
Dec  7 07:52:16 server sshd\[10374\]: Failed password for invalid user ijm from 94.21.243.204 port 58563 ssh2
Dec  7 08:02:27 server sshd\[13111\]: Invalid user bahu from 94.21.243.204
...
2019-12-07 14:16:32
150.95.153.82 attackbotsspam
Dec  7 06:54:54 ns381471 sshd[2994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.153.82
Dec  7 06:54:55 ns381471 sshd[2994]: Failed password for invalid user giles from 150.95.153.82 port 44324 ssh2
2019-12-07 14:04:27
80.70.102.134 attackbots
Dec  7 06:47:19 [host] sshd[13274]: Invalid user oracle from 80.70.102.134
Dec  7 06:47:19 [host] sshd[13274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.70.102.134
Dec  7 06:47:21 [host] sshd[13274]: Failed password for invalid user oracle from 80.70.102.134 port 34106 ssh2
2019-12-07 14:07:24
85.248.42.101 attackspam
Dec  7 04:48:07 zeus sshd[13428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.248.42.101 
Dec  7 04:48:09 zeus sshd[13428]: Failed password for invalid user hh from 85.248.42.101 port 43186 ssh2
Dec  7 04:53:57 zeus sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.248.42.101 
Dec  7 04:53:59 zeus sshd[13590]: Failed password for invalid user vagrant from 85.248.42.101 port 41889 ssh2
2019-12-07 14:17:02
51.254.38.106 attackbotsspam
Dec  7 06:53:33 vps666546 sshd\[13170\]: Invalid user reimer from 51.254.38.106 port 38333
Dec  7 06:53:33 vps666546 sshd\[13170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106
Dec  7 06:53:35 vps666546 sshd\[13170\]: Failed password for invalid user reimer from 51.254.38.106 port 38333 ssh2
Dec  7 06:58:54 vps666546 sshd\[13381\]: Invalid user vcsa from 51.254.38.106 port 43450
Dec  7 06:58:54 vps666546 sshd\[13381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106
...
2019-12-07 14:15:41
106.13.36.73 attack
Dec  7 07:05:01 ns41 sshd[15749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.73
2019-12-07 14:20:25
27.254.130.69 attack
Dec  7 07:00:07 sbg01 sshd[1324]: Failed password for root from 27.254.130.69 port 40267 ssh2
Dec  7 07:09:41 sbg01 sshd[1363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69
Dec  7 07:09:43 sbg01 sshd[1363]: Failed password for invalid user dbus from 27.254.130.69 port 56292 ssh2
2019-12-07 14:18:38
195.49.204.245 attack
[portscan] Port scan
2019-12-07 14:13:34

最近上报的IP列表

190.188.60.159 83.214.234.164 80.24.208.1 202.38.237.135
187.18.55.203 212.153.56.147 231.169.179.144 232.159.7.98
161.141.160.15 185.253.218.24 228.255.3.227 16.130.1.42
74.233.54.21 52.248.148.190 171.197.87.247 147.35.213.2
6.192.206.173 179.131.49.190 118.206.25.111 55.163.18.57