必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.244.89.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64700
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.244.89.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 04:39:48 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 11.89.244.40.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 40.244.89.11.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.132.46.14 attackbots
Sep  6 08:15:05 root sshd[16768]: Failed password for root from 164.132.46.14 port 55950 ssh2
...
2020-09-06 14:54:58
106.8.166.189 attackbotsspam
2020-08-31 06:59:58 login_virtual_exim authenticator failed for (1bB66s) [106.8.166.189]: 535 Incorrect authentication data (set_id=strueber.stellpflug)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.8.166.189
2020-09-06 14:48:47
185.220.103.9 attackbots
2020-09-06T05:59[Censored Hostname] sshd[16263]: Failed password for root from 185.220.103.9 port 41950 ssh2
2020-09-06T05:59[Censored Hostname] sshd[16263]: Failed password for root from 185.220.103.9 port 41950 ssh2
2020-09-06T05:59[Censored Hostname] sshd[16263]: Failed password for root from 185.220.103.9 port 41950 ssh2[...]
2020-09-06 14:40:16
156.96.62.82 attackbotsspam
Sep  5 21:19:35 mail postfix/smtpd[26616]: warning: unknown[156.96.62.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 21:19:41 mail postfix/smtpd[26616]: warning: unknown[156.96.62.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 21:19:51 mail postfix/smtpd[26616]: warning: unknown[156.96.62.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-06 14:55:30
106.8.164.185 attackspam
2020-08-31 07:02:10 login_virtual_exim authenticator failed for (Qb2PqNspx) [106.8.164.185]: 535 Incorrect authentication data (set_id=strueber.stellpflug)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.8.164.185
2020-09-06 14:53:06
14.161.50.104 attackbots
Sep  6 08:55:06 * sshd[5131]: Failed password for root from 14.161.50.104 port 56331 ssh2
2020-09-06 15:10:20
120.53.243.211 attackbotsspam
Attempted connection to port 5593.
2020-09-06 14:37:48
82.64.83.141 attack
Sep  6 02:18:58 ws26vmsma01 sshd[21482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.83.141
...
2020-09-06 14:33:54
68.228.215.87 attackbots
Aug 31 07:08:28 h1946882 sshd[20654]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3Dip68=
-228-215-87.ph.ph.cox.net=20
Aug 31 07:08:30 h1946882 sshd[20654]: Failed password for invalid user =
admin from 68.228.215.87 port 49694 ssh2
Aug 31 07:08:30 h1946882 sshd[20654]: Received disconnect from 68.228.2=
15.87: 11: Bye Bye [preauth]
Aug 31 07:08:32 h1946882 sshd[20656]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3Dip68=
-228-215-87.ph.ph.cox.net=20


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=68.228.215.87
2020-09-06 15:00:00
222.186.42.213 attackspambots
Automatic report BANNED IP
2020-09-06 15:07:38
89.248.160.150 attackbotsspam
firewall-block, port(s): 7938/udp, 7954/udp
2020-09-06 14:27:57
59.49.13.45 attackbots
$f2bV_matches
2020-09-06 15:04:46
171.246.141.251 attackbotsspam
Attempted connection to port 445.
2020-09-06 14:36:55
46.114.56.28 attackspam
Lines containing failures of 46.114.56.28
Aug 31 07:02:12 dns01 sshd[17892]: Bad protocol version identification '' from 46.114.56.28 port 60776
Aug 31 07:02:28 dns01 sshd[17898]: Invalid user pi from 46.114.56.28 port 43030
Aug 31 07:02:28 dns01 sshd[17898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.114.56.28
Aug 31 07:02:29 dns01 sshd[17898]: Failed password for invalid user pi from 46.114.56.28 port 43030 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.114.56.28
2020-09-06 14:58:08
185.220.103.6 attack
185.220.103.6 (DE/Germany/karensilkwood.tor-exit.calyxinstitute.org), 3 distributed sshd attacks on account [admin] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  6 01:25:48 internal2 sshd[13385]: Invalid user admin from 185.220.103.6 port 51312
Sep  6 01:25:15 internal2 sshd[13025]: Invalid user admin from 185.220.102.248 port 9788
Sep  6 01:25:17 internal2 sshd[13040]: Invalid user admin from 185.220.102.248 port 3366

IP Addresses Blocked:
2020-09-06 14:31:48

最近上报的IP列表

205.68.194.202 241.18.202.18 192.64.242.186 79.20.202.87
174.10.252.157 222.156.37.33 207.0.195.37 254.162.53.246
152.148.108.65 226.164.102.97 109.130.103.193 82.172.76.1
114.212.184.103 142.70.92.105 33.78.57.114 172.112.203.22
255.247.196.235 203.180.99.47 164.187.115.138 194.23.56.116