必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.138.217.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.138.217.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:51:04 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
40.217.138.70.in-addr.arpa domain name pointer 70-138-217-40.lightspeed.hstntx.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.217.138.70.in-addr.arpa	name = 70-138-217-40.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.16.153.10 attackspam
445/tcp
[2020-09-04]1pkt
2020-09-04 16:23:34
201.149.54.90 attackbotsspam
1599152542 - 09/03/2020 19:02:22 Host: 201.149.54.90/201.149.54.90 Port: 445 TCP Blocked
2020-09-04 16:26:20
202.53.87.54 attackbotsspam
Unauthorized connection attempt from IP address 202.53.87.54 on Port 445(SMB)
2020-09-04 16:53:13
104.244.74.169 attackbotsspam
Bruteforce detected by fail2ban
2020-09-04 16:57:59
45.95.168.96 attackspam
Sep  4 10:32:43 mail postfix/smtpd\[13444\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  4 10:33:51 mail postfix/smtpd\[13049\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  4 10:33:51 mail postfix/smtpd\[13444\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  4 10:33:51 mail postfix/smtpd\[13030\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-04 16:34:56
200.85.183.189 attackspambots
Unauthorized connection attempt from IP address 200.85.183.189 on Port 445(SMB)
2020-09-04 16:59:58
152.200.55.85 attackbotsspam
Lines containing failures of 152.200.55.85
Sep  2 11:00:34 omfg postfix/smtpd[17589]: connect from unknown[152.200.55.85]
Sep x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=152.200.55.85
2020-09-04 16:51:52
138.68.95.204 attackspambots
 TCP (SYN) 138.68.95.204:40555 -> port 11945, len 44
2020-09-04 16:25:07
198.98.61.139 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-04 16:22:25
45.142.120.36 attackbotsspam
2020-09-04 10:34:09 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=channels@no-server.de\)
2020-09-04 10:34:37 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=channels@no-server.de\)
2020-09-04 10:34:41 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=eg@no-server.de\)
2020-09-04 10:35:10 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=eg@no-server.de\)
2020-09-04 10:35:43 dovecot_login authenticator failed for \(User\) \[45.142.120.36\]: 535 Incorrect authentication data \(set_id=subtract@no-server.de\)
...
2020-09-04 16:49:37
183.100.236.215 attack
Sep  4 08:13:32 vm1 sshd[31416]: Failed password for root from 183.100.236.215 port 51796 ssh2
...
2020-09-04 16:31:51
164.132.107.245 attack
Invalid user user3 from 164.132.107.245 port 53730
2020-09-04 16:59:19
222.186.169.192 attackbotsspam
Sep  4 09:28:00 ns308116 sshd[27005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Sep  4 09:28:02 ns308116 sshd[27005]: Failed password for root from 222.186.169.192 port 5960 ssh2
Sep  4 09:28:06 ns308116 sshd[27005]: Failed password for root from 222.186.169.192 port 5960 ssh2
Sep  4 09:28:09 ns308116 sshd[27005]: Failed password for root from 222.186.169.192 port 5960 ssh2
Sep  4 09:28:12 ns308116 sshd[27005]: Failed password for root from 222.186.169.192 port 5960 ssh2
...
2020-09-04 16:32:53
207.46.13.103 attackbots
Automatic report - Banned IP Access
2020-09-04 16:33:45
49.88.112.76 attack
Sep  4 15:22:03 webhost01 sshd[529]: Failed password for root from 49.88.112.76 port 10426 ssh2
...
2020-09-04 16:38:33

最近上报的IP列表

101.231.37.101 129.214.35.51 75.173.48.192 56.6.228.224
240.247.191.40 49.25.169.122 151.2.25.160 12.111.51.208
56.77.130.69 223.32.241.230 100.227.92.201 214.86.253.122
125.133.80.228 219.239.155.175 9.148.39.213 32.196.62.38
68.161.174.152 122.151.74.21 214.43.121.61 181.17.167.140