必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.138.145.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.138.145.38.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 20:00:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 38.145.138.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.145.138.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.254.122.36 attackbotsspam
Port scan on 6 port(s): 20286 20741 20987 21737 22103 25047
2019-08-19 16:52:20
192.81.215.176 attackbotsspam
Aug 18 22:40:23 web1 sshd\[16560\]: Invalid user gm from 192.81.215.176
Aug 18 22:40:23 web1 sshd\[16560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.215.176
Aug 18 22:40:26 web1 sshd\[16560\]: Failed password for invalid user gm from 192.81.215.176 port 35936 ssh2
Aug 18 22:44:30 web1 sshd\[17073\]: Invalid user agarwal from 192.81.215.176
Aug 18 22:44:30 web1 sshd\[17073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.215.176
2019-08-19 16:55:24
185.176.27.18 attackspam
Splunk® : port scan detected:
Aug 19 04:25:01 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.176.27.18 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=55850 PROTO=TCP SPT=58939 DPT=25807 WINDOW=1024 RES=0x00 SYN URGP=0
2019-08-19 17:25:16
34.66.42.84 attack
Aug 18 22:41:53 kapalua sshd\[8132\]: Invalid user joomla from 34.66.42.84
Aug 18 22:41:53 kapalua sshd\[8132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.42.66.34.bc.googleusercontent.com
Aug 18 22:41:55 kapalua sshd\[8132\]: Failed password for invalid user joomla from 34.66.42.84 port 53932 ssh2
Aug 18 22:46:00 kapalua sshd\[8520\]: Invalid user dbadmin from 34.66.42.84
Aug 18 22:46:00 kapalua sshd\[8520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.42.66.34.bc.googleusercontent.com
2019-08-19 16:46:06
217.107.64.132 attack
[portscan] Port scan
2019-08-19 17:21:21
103.233.194.102 attackbotsspam
Sql/code injection probe
2019-08-19 16:48:50
80.211.245.229 attack
SIP Server BruteForce Attack
2019-08-19 16:56:57
47.91.104.10 attackbots
Unauthorised access (Aug 19) SRC=47.91.104.10 LEN=40 TTL=51 ID=24087 TCP DPT=8080 WINDOW=61575 SYN
2019-08-19 16:46:43
51.38.131.1 attack
Aug 19 10:39:04 SilenceServices sshd[28160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.131.1
Aug 19 10:39:05 SilenceServices sshd[28160]: Failed password for invalid user nexus from 51.38.131.1 port 34940 ssh2
Aug 19 10:43:08 SilenceServices sshd[31325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.131.1
2019-08-19 16:53:13
89.109.5.110 attackbots
Automatic report - Port Scan Attack
2019-08-19 17:06:42
182.186.116.50 attack
firewall-block, port(s): 23/tcp
2019-08-19 17:19:03
201.114.252.23 attack
Aug 19 11:14:54 vps647732 sshd[27366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.114.252.23
Aug 19 11:14:56 vps647732 sshd[27366]: Failed password for invalid user mk from 201.114.252.23 port 36808 ssh2
...
2019-08-19 17:24:46
36.232.13.130 attack
Honeypot attack, port: 23, PTR: 36-232-13-130.dynamic-ip.hinet.net.
2019-08-19 17:00:51
202.106.93.46 attackspambots
Aug 19 10:58:26 OPSO sshd\[32118\]: Invalid user laci from 202.106.93.46 port 59580
Aug 19 10:58:26 OPSO sshd\[32118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
Aug 19 10:58:28 OPSO sshd\[32118\]: Failed password for invalid user laci from 202.106.93.46 port 59580 ssh2
Aug 19 11:03:58 OPSO sshd\[617\]: Invalid user jody from 202.106.93.46 port 53119
Aug 19 11:03:58 OPSO sshd\[617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
2019-08-19 17:08:09
165.227.93.58 attackspam
Aug 18 22:23:54 lcprod sshd\[4081\]: Invalid user nico from 165.227.93.58
Aug 18 22:23:54 lcprod sshd\[4081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.93.58
Aug 18 22:23:57 lcprod sshd\[4081\]: Failed password for invalid user nico from 165.227.93.58 port 53754 ssh2
Aug 18 22:27:47 lcprod sshd\[4433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.93.58  user=mysql
Aug 18 22:27:50 lcprod sshd\[4433\]: Failed password for mysql from 165.227.93.58 port 42890 ssh2
2019-08-19 16:41:38

最近上报的IP列表

121.138.138.64 121.138.31.168 121.138.31.139 121.138.172.201
121.138.145.239 114.32.131.134 121.138.171.233 121.138.155.234
121.138.171.205 121.138.152.163 121.138.31.156 121.138.31.245
121.139.11.218 121.139.0.199 121.138.31.238 121.139.171.10
121.138.88.227 121.139.171.12 121.139.171.15 114.33.17.55