必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.138.122.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.138.122.142.		IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 01:22:20 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
142.122.138.122.in-addr.arpa domain name pointer 142.122.138.122.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.122.138.122.in-addr.arpa	name = 142.122.138.122.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.55.182.232 attackspam
Apr  8 16:43:16 silence02 sshd[14883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.182.232
Apr  8 16:43:18 silence02 sshd[14883]: Failed password for invalid user postgres from 45.55.182.232 port 60468 ssh2
Apr  8 16:48:26 silence02 sshd[15367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.182.232
2020-04-08 23:30:51
62.99.80.170 attackbotsspam
(imapd) Failed IMAP login from 62.99.80.170 (ES/Spain/170.62-99-80.static.clientes.euskaltel.es): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  8 17:11:12 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 4 secs): user=, method=PLAIN, rip=62.99.80.170, lip=5.63.12.44, TLS, session=
2020-04-08 23:32:35
182.61.132.15 attack
SSH bruteforce (Triggered fail2ban)
2020-04-08 23:28:54
157.25.20.67 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/157.25.20.67/ 
 
 RO - 1H : (3)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RO 
 NAME ASN : ASN5588 
 
 IP : 157.25.20.67 
 
 CIDR : 157.25.0.0/19 
 
 PREFIX COUNT : 510 
 
 UNIQUE IP COUNT : 1170944 
 
 
 ATTACKS DETECTED ASN5588 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-04-08 14:40:51 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-04-09 00:05:44
121.237.171.177 attackbots
Apr  8 14:24:40 mail sshd[20595]: Invalid user ubuntu from 121.237.171.177
Apr  8 14:24:40 mail sshd[20595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.237.171.177
Apr  8 14:24:40 mail sshd[20595]: Invalid user ubuntu from 121.237.171.177
Apr  8 14:24:42 mail sshd[20595]: Failed password for invalid user ubuntu from 121.237.171.177 port 25248 ssh2
Apr  8 14:41:24 mail sshd[22899]: Invalid user king from 121.237.171.177
...
2020-04-08 23:24:15
139.59.12.65 attackspambots
Apr  8 11:38:41 firewall sshd[20098]: Invalid user noah from 139.59.12.65
Apr  8 11:38:43 firewall sshd[20098]: Failed password for invalid user noah from 139.59.12.65 port 58074 ssh2
Apr  8 11:48:12 firewall sshd[20539]: Invalid user test from 139.59.12.65
...
2020-04-08 23:02:40
209.65.68.190 attackspambots
Apr  8 14:34:02 DAAP sshd[13094]: Invalid user ubuntu from 209.65.68.190 port 35016
Apr  8 14:34:02 DAAP sshd[13094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.65.68.190
Apr  8 14:34:02 DAAP sshd[13094]: Invalid user ubuntu from 209.65.68.190 port 35016
Apr  8 14:34:04 DAAP sshd[13094]: Failed password for invalid user ubuntu from 209.65.68.190 port 35016 ssh2
Apr  8 14:41:18 DAAP sshd[13296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.65.68.190  user=root
Apr  8 14:41:20 DAAP sshd[13296]: Failed password for root from 209.65.68.190 port 44112 ssh2
...
2020-04-08 23:27:00
181.30.28.120 attackbotsspam
Apr  8 14:47:29 [host] sshd[21097]: Invalid user l
Apr  8 14:47:29 [host] sshd[21097]: pam_unix(sshd:
Apr  8 14:47:30 [host] sshd[21097]: Failed passwor
2020-04-08 23:05:45
165.22.65.134 attackbotsspam
$f2bV_matches
2020-04-08 23:25:09
222.186.173.215 attack
Triggered by Fail2Ban at Ares web server
2020-04-08 22:58:20
113.233.55.110 attack
Apr  8 14:34:19 tux sshd[1463]: Invalid user pi from 113.233.55.110
Apr  8 14:34:19 tux sshd[1463]: Connection closed by 113.233.55.110 [preauth]
Apr  8 14:34:38 tux sshd[1462]: Invalid user pi from 113.233.55.110
Apr  8 14:34:38 tux sshd[1462]: Connection closed by 113.233.55.110 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.233.55.110
2020-04-08 23:04:18
222.186.180.147 attackbots
Apr  8 21:47:54 webhost01 sshd[30340]: Failed password for root from 222.186.180.147 port 34408 ssh2
Apr  8 21:48:06 webhost01 sshd[30340]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 34408 ssh2 [preauth]
...
2020-04-08 22:54:37
92.118.37.55 attack
Apr  8 17:06:40 debian-2gb-nbg1-2 kernel: \[8617417.089234\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.55 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=12680 PROTO=TCP SPT=58334 DPT=15734 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-08 23:16:23
189.190.26.9 attack
(sshd) Failed SSH login from 189.190.26.9 (MX/Mexico/dsl-189-190-26-9-dyn.prod-infinitum.com.mx): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  8 10:46:43 host sshd[45424]: Invalid user bot from 189.190.26.9 port 46236
2020-04-08 23:07:48
93.104.210.125 attackbots
93.104.210.125 - - \[08/Apr/2020:15:36:56 +0200\] "POST /wp-login.php HTTP/1.1" 200 9653 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
93.104.210.125 - - \[08/Apr/2020:15:36:57 +0200\] "POST /wp-login.php HTTP/1.1" 200 9488 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-04-08 22:53:06

最近上报的IP列表

122.138.111.90 122.138.125.72 122.138.133.34 122.138.133.43
122.138.134.153 212.81.135.182 122.138.134.167 122.138.134.34
122.138.136.11 122.138.136.119 122.138.136.138 122.138.136.141
122.138.136.151 122.138.136.17 114.141.215.192 122.138.136.173
122.138.136.188 122.138.136.235 122.138.136.237 122.138.136.24