必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): Vodacom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.18.107.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.18.107.40.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121301 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 04:48:59 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
40.107.18.41.in-addr.arpa domain name pointer vc-gp-n-41-18-107-40.umts.vodacom.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.107.18.41.in-addr.arpa	name = vc-gp-n-41-18-107-40.umts.vodacom.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.216.61.199 attackbotsspam
Automatic report - Port Scan Attack
2019-07-23 16:08:58
128.199.197.53 attackspambots
Jul 23 08:46:53 mail sshd\[23997\]: Invalid user libuuid from 128.199.197.53 port 52807
Jul 23 08:46:53 mail sshd\[23997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.53
...
2019-07-23 15:52:36
71.6.146.130 attackbots
23.07.2019 08:02:07 Connection to port 4321 blocked by firewall
2019-07-23 16:13:13
213.32.92.57 attackbotsspam
2019-07-23T08:28:53.798642abusebot-7.cloudsearch.cf sshd\[14763\]: Invalid user matthias from 213.32.92.57 port 48722
2019-07-23 16:38:36
113.190.130.195 attackspam
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (27)
2019-07-23 16:22:55
78.29.45.176 attackbots
2019-07-23 02:06:15 H=pool-78-29-45-176.is74.ru [78.29.45.176]:55557 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-23 02:06:15 H=pool-78-29-45-176.is74.ru [78.29.45.176]:55557 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-23 02:06:16 H=pool-78-29-45-176.is74.ru [78.29.45.176]:55557 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/78.29.45.176)
...
2019-07-23 15:50:19
222.186.15.217 attackbots
2019-07-23T14:54:13.571596enmeeting.mahidol.ac.th sshd\[8274\]: User root from 222.186.15.217 not allowed because not listed in AllowUsers
2019-07-23T14:54:13.983801enmeeting.mahidol.ac.th sshd\[8274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.217  user=root
2019-07-23T14:54:16.534980enmeeting.mahidol.ac.th sshd\[8274\]: Failed password for invalid user root from 222.186.15.217 port 22488 ssh2
...
2019-07-23 15:55:20
46.101.1.198 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-07-23 16:06:14
206.189.166.172 attack
Jul 23 06:42:16 MK-Soft-VM5 sshd\[2564\]: Invalid user usuario from 206.189.166.172 port 57722
Jul 23 06:42:16 MK-Soft-VM5 sshd\[2564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.166.172
Jul 23 06:42:17 MK-Soft-VM5 sshd\[2564\]: Failed password for invalid user usuario from 206.189.166.172 port 57722 ssh2
...
2019-07-23 15:49:59
80.240.250.222 attackspambots
proto=tcp  .  spt=38208  .  dpt=25  .     (listed on Blocklist de  Jul 22)     (39)
2019-07-23 15:43:34
212.87.167.220 attackbots
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (21)
2019-07-23 16:31:43
132.232.255.50 attack
2019-07-23T07:57:31.131557abusebot-5.cloudsearch.cf sshd\[31090\]: Invalid user suporte from 132.232.255.50 port 49392
2019-07-23T07:57:31.138518abusebot-5.cloudsearch.cf sshd\[31090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.255.50
2019-07-23 15:59:36
41.203.18.206 attackspambots
xmlrpc attack
2019-07-23 15:36:41
23.94.69.34 attackbotsspam
Scanning and Vuln Attempts
2019-07-23 16:40:35
125.119.157.44 attack
Caught in portsentry honeypot
2019-07-23 15:27:37

最近上报的IP列表

12.139.40.18 177.147.29.40 189.203.160.201 31.160.216.164
139.52.14.90 45.242.126.192 162.144.209.154 160.89.226.146
192.164.157.57 174.209.246.58 77.191.154.155 46.101.88.53
144.134.203.106 96.40.163.150 43.243.136.253 148.223.152.202
144.175.188.211 202.17.19.97 178.234.164.20 217.42.76.236