必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.218.241.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.218.241.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:49:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 138.241.218.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.241.218.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.74.144.198 attackbotsspam
May 11 05:37:20 dns1 sshd[16008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.144.198 
May 11 05:37:22 dns1 sshd[16008]: Failed password for invalid user gwain from 177.74.144.198 port 37193 ssh2
May 11 05:46:19 dns1 sshd[16377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.144.198
2020-05-11 16:57:53
114.113.126.163 attack
2020-05-11T04:19:50.470728xentho-1 sshd[307243]: Invalid user vinay from 114.113.126.163 port 52595
2020-05-11T04:19:52.418527xentho-1 sshd[307243]: Failed password for invalid user vinay from 114.113.126.163 port 52595 ssh2
2020-05-11T04:21:34.216361xentho-1 sshd[307295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.113.126.163  user=root
2020-05-11T04:21:36.431707xentho-1 sshd[307295]: Failed password for root from 114.113.126.163 port 35541 ssh2
2020-05-11T04:23:14.661780xentho-1 sshd[307344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.113.126.163  user=root
2020-05-11T04:23:16.274364xentho-1 sshd[307344]: Failed password for root from 114.113.126.163 port 46718 ssh2
2020-05-11T04:24:59.313864xentho-1 sshd[307416]: Invalid user hldmsserver from 114.113.126.163 port 57902
2020-05-11T04:24:59.323602xentho-1 sshd[307416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty
...
2020-05-11 17:10:31
222.186.175.148 attackbots
2020-05-11T10:46:04.587061  sshd[4818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2020-05-11T10:46:07.276792  sshd[4818]: Failed password for root from 222.186.175.148 port 29536 ssh2
2020-05-11T10:46:12.512168  sshd[4818]: Failed password for root from 222.186.175.148 port 29536 ssh2
2020-05-11T10:46:04.587061  sshd[4818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2020-05-11T10:46:07.276792  sshd[4818]: Failed password for root from 222.186.175.148 port 29536 ssh2
2020-05-11T10:46:12.512168  sshd[4818]: Failed password for root from 222.186.175.148 port 29536 ssh2
...
2020-05-11 16:50:12
181.57.168.174 attackbotsspam
May 11 08:43:31 ip-172-31-62-245 sshd\[7277\]: Invalid user newsletter from 181.57.168.174\
May 11 08:43:33 ip-172-31-62-245 sshd\[7277\]: Failed password for invalid user newsletter from 181.57.168.174 port 51472 ssh2\
May 11 08:47:53 ip-172-31-62-245 sshd\[7290\]: Invalid user glenn from 181.57.168.174\
May 11 08:47:54 ip-172-31-62-245 sshd\[7290\]: Failed password for invalid user glenn from 181.57.168.174 port 55238 ssh2\
May 11 08:50:36 ip-172-31-62-245 sshd\[7299\]: Invalid user wkproxy from 181.57.168.174\
2020-05-11 17:10:48
218.92.0.172 attackspam
May 11 08:39:01 sshgateway sshd\[567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
May 11 08:39:03 sshgateway sshd\[567\]: Failed password for root from 218.92.0.172 port 58832 ssh2
May 11 08:39:16 sshgateway sshd\[567\]: error: maximum authentication attempts exceeded for root from 218.92.0.172 port 58832 ssh2 \[preauth\]
2020-05-11 16:56:58
222.186.42.155 attack
2020-05-11T08:36:48.156277shield sshd\[23182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
2020-05-11T08:36:49.846846shield sshd\[23182\]: Failed password for root from 222.186.42.155 port 23740 ssh2
2020-05-11T08:36:52.402969shield sshd\[23182\]: Failed password for root from 222.186.42.155 port 23740 ssh2
2020-05-11T08:36:55.226852shield sshd\[23182\]: Failed password for root from 222.186.42.155 port 23740 ssh2
2020-05-11T08:40:46.478888shield sshd\[24048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
2020-05-11 16:45:59
212.64.57.124 attackspambots
2020-05-11T10:37:30.744779struts4.enskede.local sshd\[9405\]: Invalid user pastor from 212.64.57.124 port 37522
2020-05-11T10:37:30.753319struts4.enskede.local sshd\[9405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.124
2020-05-11T10:37:33.440304struts4.enskede.local sshd\[9405\]: Failed password for invalid user pastor from 212.64.57.124 port 37522 ssh2
2020-05-11T10:41:50.359788struts4.enskede.local sshd\[9420\]: Invalid user cn from 212.64.57.124 port 34716
2020-05-11T10:41:50.368657struts4.enskede.local sshd\[9420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.124
...
2020-05-11 16:43:40
85.97.240.175 attackspam
Unauthorised access (May 11) SRC=85.97.240.175 LEN=52 TTL=117 ID=8515 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-11 17:15:39
182.48.66.114 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-11 17:27:02
119.193.78.15 attack
Port probing on unauthorized port 23
2020-05-11 16:58:21
222.186.30.112 attackspam
May 11 09:13:48 localhost sshd[124008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
May 11 09:13:50 localhost sshd[124008]: Failed password for root from 222.186.30.112 port 22225 ssh2
May 11 09:13:52 localhost sshd[124008]: Failed password for root from 222.186.30.112 port 22225 ssh2
May 11 09:13:48 localhost sshd[124008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
May 11 09:13:50 localhost sshd[124008]: Failed password for root from 222.186.30.112 port 22225 ssh2
May 11 09:13:52 localhost sshd[124008]: Failed password for root from 222.186.30.112 port 22225 ssh2
May 11 09:13:48 localhost sshd[124008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
May 11 09:13:50 localhost sshd[124008]: Failed password for root from 222.186.30.112 port 22225 ssh2
May 11 09:13:52 localhost sshd[12
...
2020-05-11 17:18:14
103.219.112.63 attackbotsspam
May 11 08:05:18 pkdns2 sshd\[52519\]: Invalid user user from 103.219.112.63May 11 08:05:21 pkdns2 sshd\[52519\]: Failed password for invalid user user from 103.219.112.63 port 40358 ssh2May 11 08:10:03 pkdns2 sshd\[52760\]: Invalid user backuper from 103.219.112.63May 11 08:10:05 pkdns2 sshd\[52760\]: Failed password for invalid user backuper from 103.219.112.63 port 37842 ssh2May 11 08:14:48 pkdns2 sshd\[53037\]: Invalid user ubuntu from 103.219.112.63May 11 08:14:49 pkdns2 sshd\[53037\]: Failed password for invalid user ubuntu from 103.219.112.63 port 35326 ssh2
...
2020-05-11 17:09:04
185.50.149.9 attackspam
May 11 11:16:37 relay postfix/smtpd\[2802\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 11:16:50 relay postfix/smtpd\[7894\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 11:20:02 relay postfix/smtpd\[2804\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 11:20:19 relay postfix/smtpd\[7900\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 11:22:04 relay postfix/smtpd\[2804\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-11 17:26:36
118.70.125.224 attackbotsspam
20/5/10@23:51:00: FAIL: Alarm-Network address from=118.70.125.224
...
2020-05-11 17:06:44
222.186.15.158 attackspambots
May 11 09:06:23 localhost sshd[123027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
May 11 09:06:25 localhost sshd[123027]: Failed password for root from 222.186.15.158 port 23173 ssh2
May 11 09:06:27 localhost sshd[123027]: Failed password for root from 222.186.15.158 port 23173 ssh2
May 11 09:06:23 localhost sshd[123027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
May 11 09:06:25 localhost sshd[123027]: Failed password for root from 222.186.15.158 port 23173 ssh2
May 11 09:06:27 localhost sshd[123027]: Failed password for root from 222.186.15.158 port 23173 ssh2
May 11 09:06:23 localhost sshd[123027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
May 11 09:06:25 localhost sshd[123027]: Failed password for root from 222.186.15.158 port 23173 ssh2
May 11 09:06:27 localhost sshd[12
...
2020-05-11 17:22:35

最近上报的IP列表

184.193.234.86 225.41.146.130 84.25.136.146 69.211.32.82
225.157.162.183 255.215.184.114 148.244.203.226 175.14.15.187
215.41.176.247 3.27.139.23 155.203.50.197 179.39.235.70
213.18.249.159 217.69.209.89 246.62.9.209 61.251.192.197
63.180.96.156 59.96.221.195 2.219.193.231 158.107.239.53