必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.127.12.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.127.12.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 04:05:08 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 138.12.127.131.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.12.127.131.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
105.157.71.52 attack
DATE:2020-05-07 05:55:26, IP:105.157.71.52, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-07 14:22:56
118.25.14.19 attackspambots
(sshd) Failed SSH login from 118.25.14.19 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  7 06:44:06 s1 sshd[15608]: Invalid user admin from 118.25.14.19 port 60706
May  7 06:44:08 s1 sshd[15608]: Failed password for invalid user admin from 118.25.14.19 port 60706 ssh2
May  7 06:50:21 s1 sshd[15721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.14.19  user=root
May  7 06:50:23 s1 sshd[15721]: Failed password for root from 118.25.14.19 port 44800 ssh2
May  7 06:55:28 s1 sshd[15821]: Invalid user Joshua from 118.25.14.19 port 48138
2020-05-07 14:18:48
197.51.248.90 attackbotsspam
2020-05-07T06:51:58.486579ns386461 sshd\[12377\]: Invalid user bob from 197.51.248.90 port 35593
2020-05-07T06:51:58.491215ns386461 sshd\[12377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.248.90
2020-05-07T06:51:59.714490ns386461 sshd\[12377\]: Failed password for invalid user bob from 197.51.248.90 port 35593 ssh2
2020-05-07T07:55:15.399261ns386461 sshd\[4961\]: Invalid user acer from 197.51.248.90 port 35593
2020-05-07T07:55:15.405322ns386461 sshd\[4961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.248.90
...
2020-05-07 14:00:06
222.253.33.14 attackspambots
May  6 03:24:48 vayu sshd[713511]: Address 222.253.33.14 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May  6 03:24:48 vayu sshd[713511]: Invalid user stuser from 222.253.33.14
May  6 03:24:48 vayu sshd[713511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.253.33.14 
May  6 03:24:51 vayu sshd[713511]: Failed password for invalid user stuser from 222.253.33.14 port 49983 ssh2
May  6 03:24:51 vayu sshd[713511]: Received disconnect from 222.253.33.14: 11: Bye Bye [preauth]
May  6 03:29:18 vayu sshd[715232]: Address 222.253.33.14 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May  6 03:29:18 vayu sshd[715232]: Invalid user qin from 222.253.33.14
May  6 03:29:18 vayu sshd[715232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.253.33.14 


........
-----------------------------------------------
https://www.blocklist.de/en/view.
2020-05-07 14:04:05
94.73.253.29 attackspambots
May  7 04:59:54 game-panel sshd[2347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.73.253.29
May  7 04:59:56 game-panel sshd[2347]: Failed password for invalid user test from 94.73.253.29 port 36170 ssh2
May  7 05:04:01 game-panel sshd[2499]: Failed password for root from 94.73.253.29 port 45762 ssh2
2020-05-07 14:05:50
188.166.21.197 attack
May  7 08:03:54 meumeu sshd[23785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.21.197 
May  7 08:03:55 meumeu sshd[23785]: Failed password for invalid user test1 from 188.166.21.197 port 43716 ssh2
May  7 08:08:08 meumeu sshd[24478]: Failed password for root from 188.166.21.197 port 53528 ssh2
...
2020-05-07 14:17:22
121.229.26.104 attack
May  7 06:42:21 web01 sshd[18814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.26.104 
May  7 06:42:23 web01 sshd[18814]: Failed password for invalid user teste from 121.229.26.104 port 44194 ssh2
...
2020-05-07 14:03:19
45.226.15.6 attackspam
port scan and connect, tcp 23 (telnet)
2020-05-07 14:09:11
195.154.167.170 attackbots
tried to spam in our blog comments: argumentative essay conclusion format 
buy an essay cheap 
a grade a level english literature essay example 
essay writer online 
how to write critical essay higher english
2020-05-07 13:53:34
106.12.51.110 attackbotsspam
2020-05-07T05:50:33.295362ns386461 sshd\[21247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.51.110  user=root
2020-05-07T05:50:35.962560ns386461 sshd\[21247\]: Failed password for root from 106.12.51.110 port 45481 ssh2
2020-05-07T05:52:36.954794ns386461 sshd\[23034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.51.110  user=root
2020-05-07T05:52:38.841353ns386461 sshd\[23034\]: Failed password for root from 106.12.51.110 port 53739 ssh2
2020-05-07T05:55:34.387282ns386461 sshd\[25609\]: Invalid user hww from 106.12.51.110 port 38179
...
2020-05-07 14:15:55
46.101.158.75 attack
" "
2020-05-07 13:29:41
106.13.175.211 attackbots
May  7 07:41:18 ns381471 sshd[29163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.175.211
May  7 07:41:19 ns381471 sshd[29163]: Failed password for invalid user alex from 106.13.175.211 port 43676 ssh2
2020-05-07 13:42:24
35.184.155.136 attackbotsspam
2020-05-07T00:09:35.816090linuxbox-skyline sshd[231470]: Invalid user miwa from 35.184.155.136 port 33230
...
2020-05-07 14:19:01
49.234.31.158 attackbots
May  7 06:30:34 vpn01 sshd[14290]: Failed password for root from 49.234.31.158 port 46684 ssh2
...
2020-05-07 13:44:13
106.13.132.192 attack
May  7 05:14:09 ip-172-31-61-156 sshd[10579]: Invalid user xuan from 106.13.132.192
May  7 05:14:09 ip-172-31-61-156 sshd[10579]: Invalid user xuan from 106.13.132.192
May  7 05:14:09 ip-172-31-61-156 sshd[10579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.132.192
May  7 05:14:09 ip-172-31-61-156 sshd[10579]: Invalid user xuan from 106.13.132.192
May  7 05:14:11 ip-172-31-61-156 sshd[10579]: Failed password for invalid user xuan from 106.13.132.192 port 52094 ssh2
...
2020-05-07 14:11:30

最近上报的IP列表

199.88.79.31 231.88.174.119 192.1.174.161 135.84.24.184
90.160.164.183 127.139.205.68 8.231.7.211 194.8.133.31
150.72.103.193 35.11.127.249 209.192.97.200 140.186.212.204
14.81.53.238 91.204.82.220 7.107.186.79 141.133.168.70
94.112.103.253 148.8.102.181 135.90.112.235 121.232.201.131