必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.94.99.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.94.99.138.			IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 23:56:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 138.99.94.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.99.94.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.12.241.26 attack
2019-08-20T15:24:41.898274abusebot-8.cloudsearch.cf sshd\[20854\]: Invalid user csgosrv from 81.12.241.26 port 44569
2019-08-21 03:12:16
77.42.117.130 attackbotsspam
Automatic report - Port Scan Attack
2019-08-21 02:18:39
116.202.73.20 attackspam
08/20/2019-15:01:00.582823 116.202.73.20 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-21 03:02:03
106.12.28.203 attackspambots
Aug 20 21:22:30 srv206 sshd[7090]: Invalid user gutenberg from 106.12.28.203
Aug 20 21:22:30 srv206 sshd[7090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.203
Aug 20 21:22:30 srv206 sshd[7090]: Invalid user gutenberg from 106.12.28.203
Aug 20 21:22:32 srv206 sshd[7090]: Failed password for invalid user gutenberg from 106.12.28.203 port 33302 ssh2
...
2019-08-21 03:49:42
182.50.114.14 attack
Aug 20 21:14:12 www5 sshd\[64025\]: Invalid user alva from 182.50.114.14
Aug 20 21:14:12 www5 sshd\[64025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.50.114.14
Aug 20 21:14:14 www5 sshd\[64025\]: Failed password for invalid user alva from 182.50.114.14 port 34291 ssh2
...
2019-08-21 02:25:58
203.45.45.241 attackspambots
Automatic report - Banned IP Access
2019-08-21 02:20:21
51.91.250.68 attack
ZTE Router Exploit Scanner
2019-08-21 02:22:58
95.76.221.9 attackbots
firewall-block, port(s): 137/udp
2019-08-21 02:30:13
190.162.41.5 attackbotsspam
Aug 20 21:05:47 srv-4 sshd\[26717\]: Invalid user guest from 190.162.41.5
Aug 20 21:05:47 srv-4 sshd\[26717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.162.41.5
Aug 20 21:05:49 srv-4 sshd\[26717\]: Failed password for invalid user guest from 190.162.41.5 port 63686 ssh2
...
2019-08-21 02:38:13
128.199.203.236 attack
Aug 20 21:02:47 master sshd[1168]: Failed password for invalid user centos from 128.199.203.236 port 49766 ssh2
Aug 20 21:13:38 master sshd[1172]: Failed password for invalid user sales1 from 128.199.203.236 port 52430 ssh2
Aug 20 21:21:53 master sshd[1186]: Failed password for invalid user admin from 128.199.203.236 port 50778 ssh2
Aug 20 21:29:31 master sshd[1194]: Failed password for invalid user bananapi from 128.199.203.236 port 41858 ssh2
Aug 20 21:37:31 master sshd[1512]: Failed password for invalid user cyrus from 128.199.203.236 port 41200 ssh2
Aug 20 21:45:33 master sshd[1533]: Failed password for invalid user cmxp from 128.199.203.236 port 38082 ssh2
Aug 20 21:53:03 master sshd[1551]: Failed password for invalid user board from 128.199.203.236 port 56662 ssh2
Aug 20 22:00:48 master sshd[1880]: Failed password for invalid user web15 from 128.199.203.236 port 53526 ssh2
2019-08-21 03:16:37
179.83.48.147 attack
Aug 20 16:35:42 srv05 sshd[2774]: reveeclipse mapping checking getaddrinfo for 179.83.48.147.dynamic.adsl.gvt.net.br [179.83.48.147] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 20 16:35:44 srv05 sshd[2774]: Failed password for invalid user noc from 179.83.48.147 port 54044 ssh2
Aug 20 16:35:44 srv05 sshd[2774]: Received disconnect from 179.83.48.147: 11: Bye Bye [preauth]
Aug 20 16:41:11 srv05 sshd[3154]: reveeclipse mapping checking getaddrinfo for 179.83.48.147.dynamic.adsl.gvt.net.br [179.83.48.147] failed - POSSIBLE BREAK-IN ATTEMPT!


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.83.48.147
2019-08-21 02:35:35
77.233.4.133 attackbotsspam
Aug 20 17:59:06 [host] sshd[12726]: Invalid user nia from 77.233.4.133
Aug 20 17:59:06 [host] sshd[12726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.233.4.133
Aug 20 17:59:09 [host] sshd[12726]: Failed password for invalid user nia from 77.233.4.133 port 43328 ssh2
2019-08-21 02:34:37
194.158.36.9 attackspam
Syn flood / slowloris
2019-08-21 03:08:29
98.221.132.191 attackbotsspam
Aug 20 14:33:37 ny01 sshd[32058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.221.132.191
Aug 20 14:33:39 ny01 sshd[32058]: Failed password for invalid user alimov from 98.221.132.191 port 42534 ssh2
Aug 20 14:38:04 ny01 sshd[32508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.221.132.191
2019-08-21 03:54:48
118.26.64.58 attackspambots
Aug 20 21:31:40 srv-4 sshd\[29053\]: Invalid user user from 118.26.64.58
Aug 20 21:31:40 srv-4 sshd\[29053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.64.58
Aug 20 21:31:42 srv-4 sshd\[29053\]: Failed password for invalid user user from 118.26.64.58 port 15425 ssh2
...
2019-08-21 03:07:46

最近上报的IP列表

113.103.53.60 112.94.98.171 113.11.11.235 113.116.154.244
112.94.99.175 113.110.176.212 113.118.189.10 113.116.245.218
113.116.227.188 113.105.181.76 113.118.10.1 112.94.253.142
113.118.189.55 113.118.7.115 113.118.85.126 113.118.134.121
113.132.88.198 113.120.14.35 113.120.27.130 113.131.201.10