必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.111.57.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15011
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.111.57.138.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 20:16:27 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 138.57.111.100.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.57.111.100.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.171 attack
Feb 20 19:51:13 server sshd\[13997\]: Failed password for root from 218.92.0.171 port 20532 ssh2
Feb 21 02:03:32 server sshd\[26396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Feb 21 02:03:34 server sshd\[26396\]: Failed password for root from 218.92.0.171 port 24615 ssh2
Feb 21 02:03:37 server sshd\[26396\]: Failed password for root from 218.92.0.171 port 24615 ssh2
Feb 21 02:03:41 server sshd\[26396\]: Failed password for root from 218.92.0.171 port 24615 ssh2
...
2020-02-21 07:05:41
91.218.85.100 attackbotsspam
Port Scan
2020-02-21 06:37:27
185.176.27.90 attackbots
Multiport scan : 252 ports scanned 14566 14666 14766 14866 14966 15066 15166 15266 15366 15466 15566 15666 15766 15866 15966 16066 16166 16266 16366 16466 16566 16666 16766 16866 16966 17066 17166 17266 17366 17466 17566 17666 17766 17866 17966 18066 18166 18266 18366 18466 18566 18666 18766 18866 18966 19066 19166 19266 19366 19466 19566 19666 19766 19866 19966 20066 20166 20266 20366 20466 20566 20666 20766 20866 20966 21066 21166 .....
2020-02-21 06:46:26
49.247.207.56 attackbots
Invalid user alexadra from 49.247.207.56 port 49764
2020-02-21 07:14:19
201.116.46.11 attackspambots
Feb 20 20:10:13 alx-lms-prod01 sshd\[952\]: Invalid user admin from 201.116.46.11
Feb 20 20:59:10 alx-lms-prod01 sshd\[7223\]: Invalid user admin from 201.116.46.11
Feb 20 21:47:40 alx-lms-prod01 sshd\[12894\]: Invalid user admin from 201.116.46.11
...
2020-02-21 07:02:32
95.226.183.46 attackbots
Feb 20 23:52:00 dedicated sshd[23502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.226.183.46  user=man
Feb 20 23:52:02 dedicated sshd[23502]: Failed password for man from 95.226.183.46 port 54672 ssh2
2020-02-21 06:55:28
218.92.0.178 attack
Feb 20 22:34:29 marvibiene sshd[7697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
Feb 20 22:34:32 marvibiene sshd[7697]: Failed password for root from 218.92.0.178 port 5870 ssh2
Feb 20 22:34:36 marvibiene sshd[7697]: Failed password for root from 218.92.0.178 port 5870 ssh2
Feb 20 22:34:29 marvibiene sshd[7697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
Feb 20 22:34:32 marvibiene sshd[7697]: Failed password for root from 218.92.0.178 port 5870 ssh2
Feb 20 22:34:36 marvibiene sshd[7697]: Failed password for root from 218.92.0.178 port 5870 ssh2
...
2020-02-21 06:43:40
157.230.91.45 attackbotsspam
Feb 20 22:29:27 icinga sshd[21826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 
Feb 20 22:29:29 icinga sshd[21826]: Failed password for invalid user rr from 157.230.91.45 port 55446 ssh2
Feb 20 22:48:02 icinga sshd[39460]: Failed password for root from 157.230.91.45 port 51390 ssh2
...
2020-02-21 06:50:32
45.5.200.3 attackbots
Automatic report - Port Scan Attack
2020-02-21 06:37:54
223.71.139.98 attackspam
Feb 20 12:46:48 hanapaa sshd\[19799\]: Invalid user couchdb from 223.71.139.98
Feb 20 12:46:48 hanapaa sshd\[19799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98
Feb 20 12:46:51 hanapaa sshd\[19799\]: Failed password for invalid user couchdb from 223.71.139.98 port 47254 ssh2
Feb 20 12:52:10 hanapaa sshd\[20232\]: Invalid user cpanel from 223.71.139.98
Feb 20 12:52:10 hanapaa sshd\[20232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98
2020-02-21 06:53:46
222.186.175.220 attack
2020-02-21T00:08:35.727477  sshd[31406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-02-21T00:08:37.496127  sshd[31406]: Failed password for root from 222.186.175.220 port 12146 ssh2
2020-02-21T00:08:41.765240  sshd[31406]: Failed password for root from 222.186.175.220 port 12146 ssh2
2020-02-21T00:08:35.727477  sshd[31406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-02-21T00:08:37.496127  sshd[31406]: Failed password for root from 222.186.175.220 port 12146 ssh2
2020-02-21T00:08:41.765240  sshd[31406]: Failed password for root from 222.186.175.220 port 12146 ssh2
...
2020-02-21 07:09:57
91.209.54.54 attackbotsspam
Invalid user liuzhenfeng from 91.209.54.54 port 53707
2020-02-21 06:55:43
111.230.185.56 attackspambots
Feb 20 21:45:35 124388 sshd[30520]: Failed password for invalid user web from 111.230.185.56 port 57843 ssh2
Feb 20 21:47:38 124388 sshd[30631]: Invalid user liuzhenfeng from 111.230.185.56 port 4156
Feb 20 21:47:38 124388 sshd[30631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.185.56
Feb 20 21:47:38 124388 sshd[30631]: Invalid user liuzhenfeng from 111.230.185.56 port 4156
Feb 20 21:47:40 124388 sshd[30631]: Failed password for invalid user liuzhenfeng from 111.230.185.56 port 4156 ssh2
2020-02-21 07:04:07
134.175.85.79 attackspam
Feb 20 23:49:02 vps58358 sshd\[12049\]: Invalid user alex from 134.175.85.79Feb 20 23:49:04 vps58358 sshd\[12049\]: Failed password for invalid user alex from 134.175.85.79 port 43646 ssh2Feb 20 23:51:56 vps58358 sshd\[12066\]: Failed password for sys from 134.175.85.79 port 37950 ssh2Feb 20 23:54:29 vps58358 sshd\[12079\]: Invalid user michael from 134.175.85.79Feb 20 23:54:31 vps58358 sshd\[12079\]: Failed password for invalid user michael from 134.175.85.79 port 60476 ssh2Feb 20 23:57:19 vps58358 sshd\[12103\]: Invalid user smbread from 134.175.85.79
...
2020-02-21 07:02:59
5.135.181.53 attack
Feb 20 23:11:44 srv-ubuntu-dev3 sshd[113248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.53  user=mail
Feb 20 23:11:46 srv-ubuntu-dev3 sshd[113248]: Failed password for mail from 5.135.181.53 port 44228 ssh2
Feb 20 23:13:12 srv-ubuntu-dev3 sshd[113390]: Invalid user info from 5.135.181.53
Feb 20 23:13:12 srv-ubuntu-dev3 sshd[113390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.53
Feb 20 23:13:12 srv-ubuntu-dev3 sshd[113390]: Invalid user info from 5.135.181.53
Feb 20 23:13:14 srv-ubuntu-dev3 sshd[113390]: Failed password for invalid user info from 5.135.181.53 port 57476 ssh2
Feb 20 23:14:41 srv-ubuntu-dev3 sshd[113524]: Invalid user ibpzxz from 5.135.181.53
Feb 20 23:14:41 srv-ubuntu-dev3 sshd[113524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.53
Feb 20 23:14:41 srv-ubuntu-dev3 sshd[113524]: Invalid user ibpzxz from 5.135.
...
2020-02-21 06:35:49

最近上报的IP列表

100.116.129.138 100.113.60.67 100.111.27.192 100.113.31.93
100.113.152.35 100.114.196.32 100.117.250.53 100.113.58.99
100.115.65.147 100.112.180.107 100.113.235.68 100.116.35.198
100.111.222.142 100.113.122.183 100.114.62.160 100.113.150.174
100.112.221.221 100.111.182.133 100.113.85.202 100.111.7.69