必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.9.134.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.9.134.107.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023013100 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 31 17:55:57 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 107.134.9.40.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.134.9.40.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
154.8.223.253 attack
Brute force attempt
2019-07-29 18:57:05
185.220.101.5 attackbotsspam
Invalid user debian from 185.220.101.5 port 35767
2019-07-29 18:22:12
177.87.219.130 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-29 19:00:12
111.242.213.153 attack
Honeypot attack, port: 23, PTR: 111-242-213-153.dynamic-ip.hinet.net.
2019-07-29 18:28:42
54.177.48.62 attackbots
Invalid user hadoop from 54.177.48.62 port 50730
2019-07-29 18:14:42
211.107.220.68 attackspam
Jul 29 09:45:14 OPSO sshd\[15693\]: Invalid user adress from 211.107.220.68 port 59192
Jul 29 09:45:14 OPSO sshd\[15693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.220.68
Jul 29 09:45:16 OPSO sshd\[15693\]: Failed password for invalid user adress from 211.107.220.68 port 59192 ssh2
Jul 29 09:50:22 OPSO sshd\[16437\]: Invalid user penggen from 211.107.220.68 port 52440
Jul 29 09:50:22 OPSO sshd\[16437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.220.68
2019-07-29 17:55:35
200.116.160.38 attackspam
2019-07-29T07:41:08.917304abusebot.cloudsearch.cf sshd\[1174\]: Invalid user P@\$\$@Word from 200.116.160.38 port 57332
2019-07-29 18:15:09
159.69.40.168 attack
Jul 29 08:14:57 servernet sshd[21925]: Failed password for r.r from 159.69.40.168 port 54906 ssh2
Jul 29 08:28:25 servernet sshd[22170]: Failed password for r.r from 159.69.40.168 port 39628 ssh2
Jul 29 08:32:30 servernet sshd[22191]: Failed password for r.r from 159.69.40.168 port 35178 ssh2
Jul 29 08:36:45 servernet sshd[22246]: Failed password for r.r from 159.69.40.168 port 58904 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.69.40.168
2019-07-29 17:54:31
117.223.188.140 attack
Jul 29 06:30:04 xtremcommunity sshd\[4671\]: Invalid user 0okmnji98uhb from 117.223.188.140 port 35408
Jul 29 06:30:04 xtremcommunity sshd\[4671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.223.188.140
Jul 29 06:30:06 xtremcommunity sshd\[4671\]: Failed password for invalid user 0okmnji98uhb from 117.223.188.140 port 35408 ssh2
Jul 29 06:35:49 xtremcommunity sshd\[4814\]: Invalid user www from 117.223.188.140 port 56842
Jul 29 06:35:49 xtremcommunity sshd\[4814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.223.188.140
...
2019-07-29 18:37:53
142.93.32.146 attackbots
Jul 29 10:36:27 SilenceServices sshd[8277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.32.146
Jul 29 10:36:29 SilenceServices sshd[8277]: Failed password for invalid user luhongwei from 142.93.32.146 port 36802 ssh2
Jul 29 10:40:21 SilenceServices sshd[11341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.32.146
2019-07-29 18:08:49
210.90.135.104 attack
Jul 29 05:11:19 aat-srv002 sshd[6203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.90.135.104
Jul 29 05:11:22 aat-srv002 sshd[6203]: Failed password for invalid user !s@604207 from 210.90.135.104 port 35842 ssh2
Jul 29 05:16:17 aat-srv002 sshd[6319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.90.135.104
Jul 29 05:16:19 aat-srv002 sshd[6319]: Failed password for invalid user jordie from 210.90.135.104 port 39960 ssh2
...
2019-07-29 18:37:18
201.238.212.34 attackbotsspam
Honeypot attack, port: 445, PTR: static.201.238.212.34.gtdinternet.com.
2019-07-29 18:43:57
14.243.143.89 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-07-29 19:01:49
73.187.89.63 attackspam
Jul 29 08:48:54 dedicated sshd[3233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.187.89.63  user=root
Jul 29 08:48:56 dedicated sshd[3233]: Failed password for root from 73.187.89.63 port 48746 ssh2
2019-07-29 18:06:39
142.93.174.47 attackbotsspam
Jul 29 06:22:00 TORMINT sshd\[28628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.174.47  user=root
Jul 29 06:22:02 TORMINT sshd\[28628\]: Failed password for root from 142.93.174.47 port 33174 ssh2
Jul 29 06:27:36 TORMINT sshd\[28903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.174.47  user=root
...
2019-07-29 18:35:00

最近上报的IP列表

98.38.18.208 84.81.69.60 210.210.213.24 186.209.104.30
184.177.193.92 141.252.21.198 180.27.188.92 125.201.2.73
218.24.87.116 152.103.246.34 224.52.114.223 227.49.139.65
26.39.101.190 99.203.164.86 34.182.223.133 222.220.153.15
206.173.245.5 179.171.14.83 136.208.19.2 10.57.153.4