必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Auckland

省份(region): Auckland

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.138.130.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.138.130.13.			IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040301 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 04 12:37:37 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
13.130.138.103.in-addr.arpa domain name pointer ip103-138-130-13.nettrust.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.130.138.103.in-addr.arpa	name = ip103-138-130-13.nettrust.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.70.90.59 attackbots
2019-07-15T08:02:45.169605abusebot-2.cloudsearch.cf sshd\[27769\]: Invalid user sonar from 193.70.90.59 port 38404
2019-07-15 17:44:15
118.185.32.18 attackbotsspam
Jul 15 04:21:23 plusreed sshd[19101]: Invalid user t7inst from 118.185.32.18
...
2019-07-15 18:32:47
37.59.189.19 attackspambots
2019-07-15T08:00:59.613700abusebot-2.cloudsearch.cf sshd\[27749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip19.ip-37-59-189.eu  user=root
2019-07-15 17:37:01
212.83.186.24 attackspambots
Lines containing failures of 212.83.186.24
2019-07-15 08:13:05 H=rafael.netfocus.com.gr (localhost.localdomain) [212.83.186.24] F=: Unrouteable address
2019-07-15 08:13:05 H=rafael.netfocus.com.gr (localhost.localdomain) [212.83.186.24] F=: Unrouteable address
2019-07-15 08:13:05 H=rafael.netfocus.com.gr (localhost.localdomain) [212.83.186.24] F=: Unrouteable address
2019-07-15 08:13:05 H=rafael.netfocus.com.gr (localhost.localdomain) [212.83.186.24] F=: relay not permhostnameted
2019-07-15 08:13:05 H=rafael.netfocus.com.gr (localhost.localdomain) [212.83.186.24] F=: relay not permhostnameted


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.83.186.24
2019-07-15 17:43:46
68.183.83.166 attack
Jul 15 04:30:42 123flo sshd[24447]: Invalid user fake from 68.183.83.166
Jul 15 04:30:42 123flo sshd[24447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.166 
Jul 15 04:30:42 123flo sshd[24447]: Invalid user fake from 68.183.83.166
Jul 15 04:30:43 123flo sshd[24447]: Failed password for invalid user fake from 68.183.83.166 port 57572 ssh2
Jul 15 04:30:44 123flo sshd[24449]: Invalid user user from 68.183.83.166
2019-07-15 18:19:19
137.74.194.226 attack
Jul 15 10:21:24 vps647732 sshd[11767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.194.226
Jul 15 10:21:26 vps647732 sshd[11767]: Failed password for invalid user ftp from 137.74.194.226 port 32826 ssh2
...
2019-07-15 18:14:57
79.166.19.145 attackspam
Automatic report - Port Scan Attack
2019-07-15 17:51:23
83.222.184.82 attack
Jul 15 04:26:36 plusreed sshd[21520]: Invalid user meng from 83.222.184.82
...
2019-07-15 18:35:30
103.99.1.248 attackspam
Automatic report - Banned IP Access
2019-07-15 18:15:38
123.152.215.178 attack
Automatic report - Port Scan Attack
2019-07-15 18:03:52
51.254.206.149 attack
Jul 15 07:28:07 ip-172-31-1-72 sshd\[14829\]: Invalid user quagga from 51.254.206.149
Jul 15 07:28:07 ip-172-31-1-72 sshd\[14829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149
Jul 15 07:28:09 ip-172-31-1-72 sshd\[14829\]: Failed password for invalid user quagga from 51.254.206.149 port 41294 ssh2
Jul 15 07:32:42 ip-172-31-1-72 sshd\[14879\]: Invalid user bbb from 51.254.206.149
Jul 15 07:32:42 ip-172-31-1-72 sshd\[14879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149
2019-07-15 18:17:31
219.143.153.229 attackspam
Jul 15 04:20:59 plusreed sshd[18894]: Invalid user prueba from 219.143.153.229
...
2019-07-15 17:45:47
218.212.181.213 attack
Automatic report - Port Scan Attack
2019-07-15 18:22:13
137.63.184.100 attackspam
Jul 15 10:07:25 dev sshd\[13950\]: Invalid user ems from 137.63.184.100 port 41582
Jul 15 10:07:25 dev sshd\[13950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100
...
2019-07-15 18:07:34
165.22.112.87 attackbots
Jul 15 10:12:24 dev sshd\[14557\]: Invalid user avorion from 165.22.112.87 port 57720
Jul 15 10:12:24 dev sshd\[14557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.87
...
2019-07-15 18:26:00

最近上报的IP列表

103.138.125.254 103.138.158.5 103.138.164.25 103.138.164.27
103.142.140.229 103.142.140.238 103.142.140.35 103.142.140.73
103.142.140.96 103.142.141.117 103.142.141.119 103.142.141.180
103.142.141.209 103.142.141.39 103.143.138.218 103.143.138.222
103.143.98.3 103.144.149.120 103.144.149.121 103.144.149.127