必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.239.157.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.239.157.138.		IN	A

;; AUTHORITY SECTION:
.			219	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 16:58:20 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
b';; connection timed out; no servers could be reached
'
NSLOOKUP信息:
server can't find 120.239.157.138.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.204 attackspam
Aug 11 10:09:30 vpn01 sshd[31983]: Failed password for root from 218.92.0.204 port 49773 ssh2
...
2020-08-11 16:16:41
45.14.150.133 attackbots
Brute-force attempt banned
2020-08-11 15:50:28
106.54.64.77 attackbots
Aug 11 06:55:02 vpn01 sshd[29384]: Failed password for root from 106.54.64.77 port 52386 ssh2
...
2020-08-11 16:17:43
45.6.168.168 attackbotsspam
Aug 11 05:14:31 mail.srvfarm.net postfix/smtps/smtpd[2147252]: warning: unknown[45.6.168.168]: SASL PLAIN authentication failed: 
Aug 11 05:14:32 mail.srvfarm.net postfix/smtps/smtpd[2147252]: lost connection after AUTH from unknown[45.6.168.168]
Aug 11 05:20:47 mail.srvfarm.net postfix/smtps/smtpd[2148611]: warning: unknown[45.6.168.168]: SASL PLAIN authentication failed: 
Aug 11 05:20:47 mail.srvfarm.net postfix/smtps/smtpd[2148611]: lost connection after AUTH from unknown[45.6.168.168]
Aug 11 05:21:01 mail.srvfarm.net postfix/smtpd[2163993]: warning: unknown[45.6.168.168]: SASL PLAIN authentication failed:
2020-08-11 15:44:10
103.207.6.54 attackspam
Aug 11 05:03:40 mail.srvfarm.net postfix/smtpd[2145468]: warning: unknown[103.207.6.54]: SASL PLAIN authentication failed: 
Aug 11 05:03:40 mail.srvfarm.net postfix/smtpd[2145468]: lost connection after AUTH from unknown[103.207.6.54]
Aug 11 05:04:58 mail.srvfarm.net postfix/smtpd[2145463]: warning: unknown[103.207.6.54]: SASL PLAIN authentication failed: 
Aug 11 05:04:59 mail.srvfarm.net postfix/smtpd[2145463]: lost connection after AUTH from unknown[103.207.6.54]
Aug 11 05:10:49 mail.srvfarm.net postfix/smtps/smtpd[2148626]: warning: unknown[103.207.6.54]: SASL PLAIN authentication failed:
2020-08-11 15:38:01
61.177.172.13 attack
Aug 11 04:54:13 vps46666688 sshd[8988]: Failed password for root from 61.177.172.13 port 47993 ssh2
...
2020-08-11 16:09:12
159.65.155.255 attackbotsspam
Aug 11 09:05:06 lukav-desktop sshd\[7070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=root
Aug 11 09:05:08 lukav-desktop sshd\[7070\]: Failed password for root from 159.65.155.255 port 38146 ssh2
Aug 11 09:09:39 lukav-desktop sshd\[5562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=root
Aug 11 09:09:42 lukav-desktop sshd\[5562\]: Failed password for root from 159.65.155.255 port 48764 ssh2
Aug 11 09:14:17 lukav-desktop sshd\[25502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=root
2020-08-11 16:19:11
156.96.117.187 attack
[2020-08-11 03:54:02] NOTICE[1185][C-00000d4b] chan_sip.c: Call from '' (156.96.117.187:64850) to extension '/00046162016029' rejected because extension not found in context 'public'.
[2020-08-11 03:54:02] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-11T03:54:02.939-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="/00046162016029",SessionID="0x7f10c405ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.117.187/64850",ACLName="no_extension_match"
[2020-08-11 03:55:17] NOTICE[1185][C-00000d52] chan_sip.c: Call from '' (156.96.117.187:59391) to extension '6000046162016023' rejected because extension not found in context 'public'.
[2020-08-11 03:55:17] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-11T03:55:17.733-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="6000046162016023",SessionID="0x7f10c43e3a48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4
...
2020-08-11 15:55:23
13.74.25.0 attackspam
''
2020-08-11 16:02:34
41.139.12.109 attackspam
Aug 11 05:14:33 mail.srvfarm.net postfix/smtps/smtpd[2148611]: warning: unknown[41.139.12.109]: SASL PLAIN authentication failed: 
Aug 11 05:14:33 mail.srvfarm.net postfix/smtps/smtpd[2148611]: lost connection after AUTH from unknown[41.139.12.109]
Aug 11 05:19:02 mail.srvfarm.net postfix/smtpd[2163446]: warning: unknown[41.139.12.109]: SASL PLAIN authentication failed: 
Aug 11 05:19:02 mail.srvfarm.net postfix/smtpd[2163446]: lost connection after AUTH from unknown[41.139.12.109]
Aug 11 05:19:49 mail.srvfarm.net postfix/smtps/smtpd[2147252]: warning: unknown[41.139.12.109]: SASL PLAIN authentication failed:
2020-08-11 15:44:36
106.75.106.221 attack
Suspicious access to SMTP/POP/IMAP services.
2020-08-11 15:53:20
46.4.21.20 attackspam
scan
2020-08-11 16:05:05
172.82.239.23 attack
Aug 11 05:01:12 mail.srvfarm.net postfix/smtpd[2145288]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Aug 11 05:03:05 mail.srvfarm.net postfix/smtpd[2145290]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Aug 11 05:05:07 mail.srvfarm.net postfix/smtpd[2145254]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Aug 11 05:06:23 mail.srvfarm.net postfix/smtpd[2145288]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Aug 11 05:07:44 mail.srvfarm.net postfix/smtpd[2145503]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
2020-08-11 15:35:44
190.179.93.77 attack
Automatic report - Port Scan Attack
2020-08-11 15:46:30
82.62.60.214 attackbots
Telnet Server BruteForce Attack
2020-08-11 15:57:06

最近上报的IP列表

2.250.15.23 120.239.157.70 193.181.235.37 120.239.16.93
120.239.162.21 120.239.164.39 120.239.165.159 120.239.171.31
120.239.172.17 120.239.175.171 120.239.176.18 120.239.177.111
120.239.177.76 120.239.177.82 120.239.178.147 120.239.178.67
120.239.180.157 120.239.190.105 120.239.190.128 120.239.192.33