必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Osaka

省份(region): Osaka

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.191.145.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.191.145.14.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121903 1800 900 604800 86400

;; Query time: 191 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 20 16:18:51 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 14.145.191.40.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.145.191.40.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.18.54.70 spam
Used undred times per day for SPAM, PHISHING, SCAM and SEXE on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS !
Especially by namecheap.com with creatensend.com ?
https://www.mywot.com/scorecard/creatensend.com
https://www.mywot.com/scorecard/namecheap.com
Or uniregistry.com with casinovips.com ?
https://www.mywot.com/scorecard/casinovips.com
https://www.mywot.com/scorecard/uniregistry.com
And the same few hours before...
By GoDaddy.com, une autre SOUS MERDE adepte d'ESCROCS commebonusmasters.com...
https://www.mywot.com/scorecard/bonusmasters.com
https://www.mywot.com/scorecard/godaddy.com
2020-02-20 05:28:25
186.192.224.168 attackbotsspam
Unauthorized connection attempt from IP address 186.192.224.168 on Port 445(SMB)
2020-02-20 05:35:19
212.66.48.35 attackbots
Port probing on unauthorized port 445
2020-02-20 05:50:11
121.159.62.53 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-20 05:48:56
51.158.25.170 attack
firewall-block, port(s): 15080/udp
2020-02-20 05:19:29
171.242.146.196 attackbots
1582119065 - 02/19/2020 14:31:05 Host: 171.242.146.196/171.242.146.196 Port: 445 TCP Blocked
2020-02-20 05:43:52
117.5.121.128 attackspambots
Honeypot attack, port: 5555, PTR: localhost.
2020-02-20 05:32:33
81.18.66.4 attackspam
Unauthorized connection attempt from IP address 81.18.66.4 on Port 445(SMB)
2020-02-20 05:15:32
12.175.66.34 attack
Trying ports that it shouldn't be.
2020-02-20 05:34:54
77.75.33.51 attackbots
Unauthorized connection attempt from IP address 77.75.33.51 on Port 445(SMB)
2020-02-20 05:28:37
92.118.161.1 attackspam
Honeypot hit.
2020-02-20 05:17:03
213.127.111.63 attackspam
Honeypot attack, port: 445, PTR: ip-213-127-111-63.ip.prioritytelecom.net.
2020-02-20 05:49:57
129.40.253.55 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 05:30:26
106.51.1.131 attackbotsspam
Unauthorized connection attempt from IP address 106.51.1.131 on Port 445(SMB)
2020-02-20 05:49:18
202.65.148.98 attackspambots
Feb 19 19:41:45 vpn01 sshd[24525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.148.98
Feb 19 19:41:47 vpn01 sshd[24525]: Failed password for invalid user zanron from 202.65.148.98 port 60952 ssh2
...
2020-02-20 05:37:29

最近上报的IP列表

70.61.253.214 40.227.221.121 35.211.235.151 33.128.40.154
29.138.219.112 27.132.195.69 29.121.87.205 238.189.143.9
230.119.213.56 225.250.181.19 29.138.219.248 201.160.122.182
200.229.216.160 2.195.216.49 167.85.25.232 54.155.241.45
150.192.35.188 145.192.23.147 143.7.104.63 142.96.112.200