必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.218.64.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.218.64.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:42:46 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
40.64.218.82.in-addr.arpa domain name pointer h082218064040.host.wavenet.at.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.64.218.82.in-addr.arpa	name = h082218064040.host.wavenet.at.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.38.186.191 attack
suspicious action Fri, 28 Feb 2020 10:27:43 -0300
2020-02-29 03:32:56
138.118.100.43 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-02-29 03:41:54
112.135.72.157 attackbotsspam
Automatic report - Port Scan Attack
2020-02-29 04:05:24
62.234.95.136 attack
SSH login attempts.
2020-02-29 03:39:57
185.147.215.14 attackspambots
[2020-02-28 18:21:12] NOTICE[26448] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '' failed for '185.147.215.14:50736' (callid: 568064661-1230882836-1522585602) - Failed to authenticate
[2020-02-28 18:21:12] SECURITY[1911] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-02-28T18:21:12.883+0100",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="568064661-1230882836-1522585602",LocalAddress="IPV4/UDP/185.118.197.148/5060",RemoteAddress="IPV4/UDP/185.147.215.14/50736",Challenge="1582910472/efdbfe636eae321f895d861434202272",Response="1e7982870b71d1da59708eb7d92296bb",ExpectedResponse=""
[2020-02-28 18:21:12] NOTICE[24815] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '' failed for '185.147.215.14:50736' (callid: 568064661-1230882836-1522585602) - Failed to authenticate
[2020-02-28 18:21:12] SECURITY[1911] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-02-28T1
2020-02-29 04:08:11
177.139.150.179 attack
Automatic report - Port Scan Attack
2020-02-29 03:46:46
42.113.106.46 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:30:30
45.143.220.190 attack
suspicious action Fri, 28 Feb 2020 10:26:51 -0300
2020-02-29 04:03:00
85.93.20.30 attackspambots
20 attempts against mh-misbehave-ban on rock
2020-02-29 03:51:51
203.93.97.101 attackbotsspam
Feb 28 15:30:33 *** sshd[18717]: Invalid user user from 203.93.97.101
2020-02-29 03:28:37
181.120.8.172 attackbots
scan z
2020-02-29 04:00:24
42.112.55.74 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:33:16
183.60.156.9 attackspambots
Feb 28 14:06:19 websrv1.aknwsrv.net postfix/smtpd[214219]: warning: unknown[183.60.156.9]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 28 14:06:26 websrv1.aknwsrv.net postfix/smtpd[214219]: warning: unknown[183.60.156.9]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 28 14:06:43 websrv1.aknwsrv.net postfix/smtpd[209924]: warning: unknown[183.60.156.9]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-29 04:08:34
23.124.47.4 attackbots
tcp 81
2020-02-29 03:49:13
66.249.75.94 attackbots
Automatic report - Banned IP Access
2020-02-29 03:35:36

最近上报的IP列表

8.6.83.7 77.72.49.210 20.9.197.73 24.92.81.246
215.80.202.186 85.167.255.49 48.57.142.138 23.246.149.148
178.119.12.236 31.125.31.198 30.239.225.82 76.33.76.65
88.158.220.210 155.161.99.226 120.105.154.1 235.187.88.187
194.213.50.187 94.105.176.7 209.106.239.68 233.70.137.241