必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mount Pleasant

省份(region): Michigan

国家(country): United States

运营商(isp): RTC Communications LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.130.149.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9217
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.130.149.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:04:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
196.149.130.40.in-addr.arpa domain name pointer h196.149.130.40.static.ip.windstream.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.149.130.40.in-addr.arpa	name = h196.149.130.40.static.ip.windstream.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.137 attack
$f2bV_matches
2019-11-22 00:06:39
200.58.75.249 attackspam
RDP Brute-Force (Grieskirchen RZ2)
2019-11-22 00:24:13
223.220.159.78 attackspam
Nov 21 04:47:58 php1 sshd\[6039\]: Invalid user clock from 223.220.159.78
Nov 21 04:47:58 php1 sshd\[6039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
Nov 21 04:48:00 php1 sshd\[6039\]: Failed password for invalid user clock from 223.220.159.78 port 37806 ssh2
Nov 21 04:54:58 php1 sshd\[6637\]: Invalid user vcsa from 223.220.159.78
Nov 21 04:54:58 php1 sshd\[6637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
2019-11-22 00:18:16
79.135.40.231 attack
Nov 21 16:58:32 vpn01 sshd[5644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.135.40.231
Nov 21 16:58:34 vpn01 sshd[5644]: Failed password for invalid user administradorweb from 79.135.40.231 port 43524 ssh2
...
2019-11-22 00:00:59
180.117.53.77 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-22 00:29:15
40.117.78.147 attack
Nov 21 05:45:36 hpm sshd\[4988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.78.147  user=root
Nov 21 05:45:38 hpm sshd\[4988\]: Failed password for root from 40.117.78.147 port 38018 ssh2
Nov 21 05:50:05 hpm sshd\[5349\]: Invalid user haase from 40.117.78.147
Nov 21 05:50:05 hpm sshd\[5349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.78.147
Nov 21 05:50:08 hpm sshd\[5349\]: Failed password for invalid user haase from 40.117.78.147 port 50134 ssh2
2019-11-22 00:03:47
124.156.245.159 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-21 23:57:12
63.88.23.244 attackspambots
63.88.23.244 was recorded 15 times by 7 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 15, 87, 473
2019-11-21 23:47:25
120.15.141.155 attackspam
Unauthorised access (Nov 21) SRC=120.15.141.155 LEN=40 TTL=49 ID=3258 TCP DPT=23 WINDOW=31297 SYN
2019-11-22 00:22:53
62.28.132.131 attackspam
Bad mail behaviour
2019-11-22 00:33:46
119.115.130.234 attackspambots
Nov 21 15:55:01 srv206 sshd[12420]: Invalid user sh3ll from 119.115.130.234
...
2019-11-22 00:17:28
85.105.36.66 attackbots
Automatic report - Port Scan Attack
2019-11-22 00:10:47
124.156.241.236 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 00:05:13
103.233.1.70 attackbots
Automatically reported by fail2ban report script (mx1)
2019-11-22 00:26:24
67.205.177.0 attackbotsspam
*Port Scan* detected from 67.205.177.0 (US/United States/-). 4 hits in the last 35 seconds
2019-11-22 00:08:50

最近上报的IP列表

208.121.31.217 7.144.87.151 132.126.31.188 224.61.15.1
140.3.76.157 68.29.168.141 182.140.75.71 165.232.144.90
155.220.251.134 36.30.213.104 14.198.139.170 129.142.171.162
122.25.108.143 68.194.115.110 51.180.12.54 136.130.194.206
39.148.236.241 19.117.228.47 240.167.187.145 61.226.47.240