必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bangladesh

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.103.81.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.103.81.138.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 12:04:48 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
138.81.103.117.in-addr.arpa domain name pointer 117-103-81-138.idsbangladesh.net.bd.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.81.103.117.in-addr.arpa	name = 117-103-81-138.idsbangladesh.net.bd.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
145.102.6.57 attackbotsspam
Port scan on 1 port(s): 53
2020-04-11 03:33:54
113.125.159.5 attack
SSH brute force attempt
2020-04-11 04:04:43
42.114.12.240 attack
1586520216 - 04/10/2020 14:03:36 Host: 42.114.12.240/42.114.12.240 Port: 445 TCP Blocked
2020-04-11 04:08:58
117.37.124.14 attack
117.37.124.14 - - \[10/Apr/2020:14:04:22 +0200\] "GET http://api.gxout.com/proxy/check.aspx HTTP/1.1" 400 666 "http://api.gxout.com/proxy/check.aspx" "Mozilla/4.0 \(compatible\; MSIE 6.0\; Windows NT 5.1\)"
...
2020-04-11 03:42:19
106.12.197.67 attackspambots
Apr 10 21:38:10 meumeu sshd[1027]: Failed password for root from 106.12.197.67 port 57832 ssh2
Apr 10 21:42:25 meumeu sshd[1892]: Failed password for root from 106.12.197.67 port 53744 ssh2
...
2020-04-11 03:53:13
187.162.225.139 attack
Apr 10 21:46:56 roki sshd[30594]: Invalid user malcom from 187.162.225.139
Apr 10 21:46:56 roki sshd[30594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.225.139
Apr 10 21:46:58 roki sshd[30594]: Failed password for invalid user malcom from 187.162.225.139 port 46700 ssh2
Apr 10 21:55:17 roki sshd[31172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.225.139  user=root
Apr 10 21:55:18 roki sshd[31172]: Failed password for root from 187.162.225.139 port 46552 ssh2
...
2020-04-11 04:08:16
46.105.50.223 attack
2020-04-10T19:50:45.632944shield sshd\[16791\]: Invalid user ping from 46.105.50.223 port 53994
2020-04-10T19:50:45.636930shield sshd\[16791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip223.ip-46-105-50.eu
2020-04-10T19:50:47.292490shield sshd\[16791\]: Failed password for invalid user ping from 46.105.50.223 port 53994 ssh2
2020-04-10T19:54:32.413792shield sshd\[17529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip223.ip-46-105-50.eu  user=root
2020-04-10T19:54:34.234626shield sshd\[17529\]: Failed password for root from 46.105.50.223 port 34452 ssh2
2020-04-11 04:00:47
61.153.237.252 attackbots
Apr 10 21:05:14 ewelt sshd[11346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.237.252  user=root
Apr 10 21:05:16 ewelt sshd[11346]: Failed password for root from 61.153.237.252 port 53011 ssh2
Apr 10 21:07:18 ewelt sshd[11464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.237.252  user=root
Apr 10 21:07:21 ewelt sshd[11464]: Failed password for root from 61.153.237.252 port 41723 ssh2
...
2020-04-11 03:32:14
173.246.23.219 attackbots
SSH/22 MH Probe, BF, Hack -
2020-04-11 03:34:50
182.61.108.64 attackbots
Apr 10 14:14:57 XXX sshd[15628]: Invalid user nagios from 182.61.108.64 port 44842
2020-04-11 03:52:23
203.195.193.139 attack
Apr 10 15:59:58 * sshd[4685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.193.139
Apr 10 16:00:00 * sshd[4685]: Failed password for invalid user oracle from 203.195.193.139 port 51128 ssh2
2020-04-11 03:57:52
106.12.208.31 attackspam
$f2bV_matches
2020-04-11 04:02:29
106.12.43.66 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-11 04:09:20
61.35.4.150 attackspambots
Apr 10 21:42:09 markkoudstaal sshd[18142]: Failed password for root from 61.35.4.150 port 52396 ssh2
Apr 10 21:44:31 markkoudstaal sshd[18435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.35.4.150
Apr 10 21:44:33 markkoudstaal sshd[18435]: Failed password for invalid user sommerfelt from 61.35.4.150 port 43486 ssh2
2020-04-11 03:47:10
192.240.101.10 attackbotsspam
[ 📨 ] From bruna.nunes@tcmkt.com.br Fri Apr 10 07:38:38 2020
Received: from bjczceazbabzba.tcmkt.com.br ([192.240.101.10]:52136)
2020-04-11 04:08:02

最近上报的IP列表

117.103.81.134 114.97.184.86 114.97.184.88 114.97.184.94
114.97.184.96 114.97.185.101 117.14.148.108 117.14.148.153
117.14.148.201 117.14.148.21 117.14.147.90 117.14.148.200
117.14.148.150 117.14.148.72 117.14.148.73 117.14.148.137
117.14.149.126 114.97.185.105 117.14.149.206 117.14.148.149