必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.140.138.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.140.138.161.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:26:48 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 161.138.140.41.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.138.140.41.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.145.12.176 attackbots
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"404" \' failed for '103.145.12.176:5154' - Wrong password
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"404" \' failed for '103.145.12.176:5154' - Wrong password
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"404" \' failed for '103.145.12.176:5154' - Wrong password
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"404" \' failed for '103.145.12.176:5154' - Wrong password
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"404" \' failed for '103.145.12.176:5154' - Wrong password
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"404" \' failed for '103.145.12.176:5154' - Wrong password
\[Jul 16 15:14:22\] NOTICE\[31025\] chan_sip.c: Registration from '"4
...
2020-07-16 13:47:38
197.50.126.131 attackspam
Fail2Ban Ban Triggered
2020-07-16 13:23:03
185.176.27.102 attack
Jul 16 07:19:54 debian-2gb-nbg1-2 kernel: \[17135355.433949\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.102 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=52258 PROTO=TCP SPT=50083 DPT=10010 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-16 13:36:40
14.102.74.99 attackspambots
Jul 16 04:56:20 scw-6657dc sshd[11703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99
Jul 16 04:56:20 scw-6657dc sshd[11703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99
Jul 16 04:56:22 scw-6657dc sshd[11703]: Failed password for invalid user admin from 14.102.74.99 port 34488 ssh2
...
2020-07-16 13:33:25
223.241.247.214 attackbotsspam
Jul 16 07:20:12 server sshd[5131]: Failed password for invalid user noaccess from 223.241.247.214 port 50666 ssh2
Jul 16 07:21:29 server sshd[6230]: Failed password for invalid user ben from 223.241.247.214 port 56847 ssh2
Jul 16 07:22:44 server sshd[7132]: Failed password for invalid user lau from 223.241.247.214 port 34792 ssh2
2020-07-16 13:31:38
49.235.76.203 attackspambots
Jul 16 07:13:17 abendstille sshd\[11533\]: Invalid user avendoria from 49.235.76.203
Jul 16 07:13:17 abendstille sshd\[11533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.76.203
Jul 16 07:13:19 abendstille sshd\[11533\]: Failed password for invalid user avendoria from 49.235.76.203 port 47748 ssh2
Jul 16 07:15:27 abendstille sshd\[13748\]: Invalid user ope from 49.235.76.203
Jul 16 07:15:27 abendstille sshd\[13748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.76.203
...
2020-07-16 13:21:51
206.189.200.15 attack
Jul 15 19:20:04 tdfoods sshd\[31851\]: Invalid user shiva from 206.189.200.15
Jul 15 19:20:04 tdfoods sshd\[31851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.200.15
Jul 15 19:20:05 tdfoods sshd\[31851\]: Failed password for invalid user shiva from 206.189.200.15 port 47898 ssh2
Jul 15 19:22:35 tdfoods sshd\[32103\]: Invalid user info from 206.189.200.15
Jul 15 19:22:35 tdfoods sshd\[32103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.200.15
2020-07-16 13:26:53
218.2.197.240 attack
Jul 16 10:46:18 itv-usvr-01 sshd[23748]: Invalid user ssh from 218.2.197.240
Jul 16 10:46:18 itv-usvr-01 sshd[23748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.197.240
Jul 16 10:46:18 itv-usvr-01 sshd[23748]: Invalid user ssh from 218.2.197.240
Jul 16 10:46:21 itv-usvr-01 sshd[23748]: Failed password for invalid user ssh from 218.2.197.240 port 40566 ssh2
Jul 16 10:54:55 itv-usvr-01 sshd[24110]: Invalid user dlm from 218.2.197.240
2020-07-16 13:14:17
193.228.91.109 attack
[ssh] SSH attack
2020-07-16 13:25:58
222.186.173.201 attackbots
Jul 16 07:28:17 ucs sshd\[8832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Jul 16 07:28:19 ucs sshd\[8751\]: error: PAM: User not known to the underlying authentication module for root from 222.186.173.201
Jul 16 07:28:22 ucs sshd\[8888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
...
2020-07-16 13:41:25
118.27.14.123 attackbots
Invalid user spencer from 118.27.14.123 port 55702
2020-07-16 13:47:05
218.92.0.145 attackspam
Jul 16 05:36:41 django-0 sshd[10893]: Failed password for root from 218.92.0.145 port 62387 ssh2
Jul 16 05:36:55 django-0 sshd[10893]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 62387 ssh2 [preauth]
Jul 16 05:36:55 django-0 sshd[10893]: Disconnecting: Too many authentication failures for root [preauth]
...
2020-07-16 13:38:31
13.75.120.217 attack
Jul 16 06:55:09 haigwepa sshd[1397]: Failed password for root from 13.75.120.217 port 52722 ssh2
...
2020-07-16 13:47:53
14.232.214.109 attackbots
Port probing on unauthorized port 445
2020-07-16 13:25:07
119.254.12.66 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-16 13:50:33

最近上报的IP列表

41.139.249.227 41.138.115.29 41.13.204.35 41.140.162.42
41.140.243.46 41.141.105.35 41.141.107.171 41.141.203.14
41.141.117.208 41.141.4.227 41.142.174.55 41.142.226.88
41.141.221.176 41.142.33.11 41.142.186.179 41.142.35.226
41.143.26.5 41.143.192.185 41.143.51.89 41.143.38.77