必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.99.50.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.99.50.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 15:17:50 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 48.50.99.40.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.50.99.40.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.72.86.17 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-16 23:04:23
5.59.136.226 attack
proto=tcp  .  spt=40679  .  dpt=25  .     Listed on    MailSpike (spam wave plus L3-L5) also rbldns-ru and manitu-net     (189)
2020-04-16 23:00:12
128.199.224.215 attackspambots
2020-04-16T12:05:49.315930Z bb25382500fa New connection: 128.199.224.215:46622 (172.17.0.5:2222) [session: bb25382500fa]
2020-04-16T12:13:46.797704Z 0295c40febe1 New connection: 128.199.224.215:39558 (172.17.0.5:2222) [session: 0295c40febe1]
2020-04-16 22:44:56
207.180.228.118 attackbotsspam
Apr 16 20:07:17 f sshd\[21618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.228.118
Apr 16 20:07:19 f sshd\[21618\]: Failed password for invalid user admin from 207.180.228.118 port 51350 ssh2
Apr 16 20:13:20 f sshd\[21792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.228.118
...
2020-04-16 22:58:51
101.89.201.250 attack
Apr 16 13:33:28 XXXXXX sshd[37945]: Invalid user postgres from 101.89.201.250 port 58574
2020-04-16 23:09:35
206.189.54.253 attackspambots
Apr 16 16:46:36 ns3164893 sshd[13307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.54.253
Apr 16 16:46:38 ns3164893 sshd[13307]: Failed password for invalid user gittest from 206.189.54.253 port 52954 ssh2
...
2020-04-16 22:49:44
93.81.210.198 attack
1587039231 - 04/16/2020 14:13:51 Host: 93.81.210.198/93.81.210.198 Port: 445 TCP Blocked
2020-04-16 22:42:56
148.70.140.71 attackspam
$f2bV_matches
2020-04-16 22:51:48
51.75.202.218 attackspambots
Apr 16 21:16:20 itv-usvr-01 sshd[18036]: Invalid user uo from 51.75.202.218
2020-04-16 22:57:53
218.75.216.90 attackspam
(sshd) Failed SSH login from 218.75.216.90 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 16 08:13:08 host sshd[73263]: Invalid user sshvpn from 218.75.216.90 port 9224
2020-04-16 23:15:44
62.48.201.55 attackbotsspam
scan z
2020-04-16 23:16:57
125.71.21.68 attack
1587039204 - 04/16/2020 14:13:24 Host: 125.71.21.68/125.71.21.68 Port: 445 TCP Blocked
2020-04-16 23:07:15
132.145.200.223 attackbotsspam
k+ssh-bruteforce
2020-04-16 23:18:36
184.105.139.109 attack
Port scan: Attack repeated for 24 hours
2020-04-16 23:12:09
217.138.76.66 attackbots
Apr 16 15:48:34 sigma sshd\[31094\]: Invalid user zb from 217.138.76.66Apr 16 15:48:36 sigma sshd\[31094\]: Failed password for invalid user zb from 217.138.76.66 port 46824 ssh2
...
2020-04-16 23:18:13

最近上报的IP列表

142.192.252.111 196.231.244.168 8.106.34.231 204.131.73.94
49.129.37.141 193.209.73.126 160.215.240.50 227.19.116.152
180.223.133.221 98.126.5.209 179.102.60.116 202.139.143.64
164.149.67.47 229.47.237.163 129.82.206.133 118.193.58.20
142.189.150.177 169.67.121.193 132.108.168.21 13.81.131.235