必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.147.29.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.147.29.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:35:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 148.29.147.40.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.29.147.40.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.118.145.196 attack
Dec 18 12:24:13 MK-Soft-VM7 sshd[27808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.118.145.196 
Dec 18 12:24:16 MK-Soft-VM7 sshd[27808]: Failed password for invalid user chnet from 181.118.145.196 port 41749 ssh2
...
2019-12-18 19:46:59
1.52.198.37 attackspambots
Unauthorized connection attempt detected from IP address 1.52.198.37 to port 445
2019-12-18 19:54:13
103.41.56.62 attack
Automatic report - Port Scan Attack
2019-12-18 19:58:34
50.70.229.239 attackspambots
Tried sshing with brute force.
2019-12-18 20:02:43
221.239.199.9 attackbots
19/12/18@01:25:46: FAIL: Alarm-Intrusion address from=221.239.199.9
...
2019-12-18 20:14:07
118.107.41.59 attackspam
Dec 18 10:00:39 xeon sshd[62083]: Failed password for invalid user kettering from 118.107.41.59 port 59946 ssh2
2019-12-18 19:35:33
40.92.66.62 attackbotsspam
Dec 18 09:26:10 debian-2gb-vpn-nbg1-1 kernel: [1028735.015467] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.66.62 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=30856 DF PROTO=TCP SPT=31808 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-18 19:45:54
166.62.122.244 attackspambots
166.62.122.244 - - [18/Dec/2019:09:30:08 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [18/Dec/2019:09:30:09 +0100] "POST /wp-login.php HTTP/1.1" 200 2298 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [18/Dec/2019:09:30:10 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [18/Dec/2019:09:30:11 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [18/Dec/2019:09:30:11 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
166.62.122.244 - - [18/Dec/2019:09:30:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2273 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-18 19:59:59
114.108.175.187 attackspambots
Automatic report - XMLRPC Attack
2019-12-18 20:11:58
193.32.161.113 attackbots
firewall-block, port(s): 55550/tcp, 55554/tcp, 55556/tcp, 55557/tcp, 55558/tcp
2019-12-18 19:33:50
168.126.85.225 attackspam
SSH Brute Force
2019-12-18 19:32:22
117.80.212.113 attack
$f2bV_matches
2019-12-18 20:07:44
78.127.239.138 attack
Dec 18 07:26:11 amit sshd\[27137\]: Invalid user petrushka from 78.127.239.138
Dec 18 07:26:11 amit sshd\[27137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.127.239.138
Dec 18 07:26:13 amit sshd\[27137\]: Failed password for invalid user petrushka from 78.127.239.138 port 55912 ssh2
...
2019-12-18 19:36:13
85.113.210.58 attack
Invalid user berkay from 85.113.210.58 port 34113
2019-12-18 19:44:10
143.192.97.178 attack
2019-12-18T09:36:47.143280  sshd[32282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.192.97.178  user=wwwrun
2019-12-18T09:36:49.159762  sshd[32282]: Failed password for wwwrun from 143.192.97.178 port 27822 ssh2
2019-12-18T09:43:38.768931  sshd[32420]: Invalid user system from 143.192.97.178 port 19996
2019-12-18T09:43:38.781820  sshd[32420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.192.97.178
2019-12-18T09:43:38.768931  sshd[32420]: Invalid user system from 143.192.97.178 port 19996
2019-12-18T09:43:40.557993  sshd[32420]: Failed password for invalid user system from 143.192.97.178 port 19996 ssh2
...
2019-12-18 20:12:49

最近上报的IP列表

33.41.229.26 13.182.28.71 225.218.188.65 210.153.27.203
239.69.72.126 233.107.139.247 92.83.25.25 203.48.94.219
202.83.168.143 176.23.168.7 253.205.192.80 192.253.244.100
166.147.48.4 57.180.220.113 58.98.81.146 89.121.116.197
221.182.41.129 75.155.119.240 99.8.172.115 53.177.235.102