必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.13.38.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.13.38.138.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 00:53:12 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
Host 138.38.13.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.38.13.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
100.6.85.37 attackspam
port scan and connect, tcp 23 (telnet)
2020-06-04 19:02:18
142.44.242.38 attack
Jun  4 07:29:08 *** sshd[19340]: User root from 142.44.242.38 not allowed because not listed in AllowUsers
2020-06-04 18:56:08
35.236.14.30 attackbots
Brute forcing email accounts
2020-06-04 19:17:37
62.210.219.124 attack
$f2bV_matches
2020-06-04 18:54:46
103.65.195.163 attack
Jun  4 10:47:23 webhost01 sshd[18711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.65.195.163
Jun  4 10:47:25 webhost01 sshd[18711]: Failed password for invalid user abracadabra\r from 103.65.195.163 port 38732 ssh2
...
2020-06-04 19:04:26
118.194.132.112 attackspambots
Jun  3 21:03:40 mockhub sshd[29579]: Failed password for root from 118.194.132.112 port 34463 ssh2
...
2020-06-04 19:11:14
111.229.103.67 attackspam
Jun  4 12:46:38 Ubuntu-1404-trusty-64-minimal sshd\[25532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67  user=root
Jun  4 12:46:40 Ubuntu-1404-trusty-64-minimal sshd\[25532\]: Failed password for root from 111.229.103.67 port 56668 ssh2
Jun  4 13:04:00 Ubuntu-1404-trusty-64-minimal sshd\[8884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67  user=root
Jun  4 13:04:02 Ubuntu-1404-trusty-64-minimal sshd\[8884\]: Failed password for root from 111.229.103.67 port 54210 ssh2
Jun  4 13:09:19 Ubuntu-1404-trusty-64-minimal sshd\[14598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67  user=root
2020-06-04 19:19:21
180.76.156.150 attack
Jun  3 23:55:39 server1 sshd\[25546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.156.150  user=root
Jun  3 23:55:41 server1 sshd\[25546\]: Failed password for root from 180.76.156.150 port 36342 ssh2
Jun  4 00:00:29 server1 sshd\[27808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.156.150  user=root
Jun  4 00:00:31 server1 sshd\[27808\]: Failed password for root from 180.76.156.150 port 35240 ssh2
Jun  4 00:05:37 server1 sshd\[29336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.156.150  user=root
...
2020-06-04 19:13:56
103.121.18.8 attack
langenachtfulda.de 103.121.18.8 [04/Jun/2020:05:47:12 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4276 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
langenachtfulda.de 103.121.18.8 [04/Jun/2020:05:47:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4276 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-06-04 19:12:18
103.253.42.59 attackbots
[2020-06-04 07:07:15] NOTICE[1288][C-0000060c] chan_sip.c: Call from '' (103.253.42.59:54824) to extension '00846462607642' rejected because extension not found in context 'public'.
[2020-06-04 07:07:15] SECURITY[1303] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-04T07:07:15.427-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00846462607642",SessionID="0x7f4d7403c148",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.42.59/54824",ACLName="no_extension_match"
[2020-06-04 07:08:48] NOTICE[1288][C-0000060d] chan_sip.c: Call from '' (103.253.42.59:50047) to extension '00746462607642' rejected because extension not found in context 'public'.
[2020-06-04 07:08:48] SECURITY[1303] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-04T07:08:48.588-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00746462607642",SessionID="0x7f4d7403c148",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.
...
2020-06-04 19:28:13
45.143.220.111 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-06-04 19:28:48
223.217.24.248 attackspambots
" "
2020-06-04 19:39:32
185.26.122.44 attackbots
"Inject  2121121121212.1"
2020-06-04 19:34:04
178.62.234.85 attackspam
Jun  4 19:07:37 web1 sshd[29758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.85  user=root
Jun  4 19:07:40 web1 sshd[29758]: Failed password for root from 178.62.234.85 port 59082 ssh2
Jun  4 19:18:50 web1 sshd[32498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.85  user=root
Jun  4 19:18:53 web1 sshd[32498]: Failed password for root from 178.62.234.85 port 60226 ssh2
Jun  4 19:22:41 web1 sshd[1002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.85  user=root
Jun  4 19:22:43 web1 sshd[1002]: Failed password for root from 178.62.234.85 port 35258 ssh2
Jun  4 19:26:28 web1 sshd[1996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.234.85  user=root
Jun  4 19:26:31 web1 sshd[1996]: Failed password for root from 178.62.234.85 port 38518 ssh2
Jun  4 19:29:46 web1 sshd[2873]: pam_uni
...
2020-06-04 19:09:29
168.194.162.200 attackbots
frenzy
2020-06-04 18:57:10

最近上报的IP列表

103.13.65.223 103.13.37.14 103.13.242.51 103.13.241.203
103.13.238.72 103.13.233.171 103.13.28.18 103.13.247.0
103.13.244.210 103.13.231.175 103.13.29.198 103.13.27.213
103.13.243.134 103.13.225.122 103.13.19.172 103.13.183.40
103.13.205.209 103.13.2.203 103.13.17.159 103.13.151.95