必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.196.138.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.196.138.90.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:31:23 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
90.138.196.131.in-addr.arpa domain name pointer 131-196-138-90.customer.invistanet.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
90.138.196.131.in-addr.arpa	name = 131-196-138-90.customer.invistanet.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.211.139.159 attackbots
Dec  4 20:59:10 Ubuntu-1404-trusty-64-minimal sshd\[3766\]: Invalid user rivedal from 80.211.139.159
Dec  4 20:59:10 Ubuntu-1404-trusty-64-minimal sshd\[3766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.139.159
Dec  4 20:59:12 Ubuntu-1404-trusty-64-minimal sshd\[3766\]: Failed password for invalid user rivedal from 80.211.139.159 port 57690 ssh2
Dec  4 21:08:28 Ubuntu-1404-trusty-64-minimal sshd\[14172\]: Invalid user eley from 80.211.139.159
Dec  4 21:08:28 Ubuntu-1404-trusty-64-minimal sshd\[14172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.139.159
2019-12-05 06:37:16
1.1.187.162 attack
Honeypot attack, port: 23, PTR: node-bs2.pool-1-1.dynamic.totinternet.net.
2019-12-05 06:58:02
144.217.242.111 attackbotsspam
Dec  4 22:23:37 marvibiene sshd[52697]: Invalid user sr from 144.217.242.111 port 56548
Dec  4 22:23:37 marvibiene sshd[52697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111
Dec  4 22:23:37 marvibiene sshd[52697]: Invalid user sr from 144.217.242.111 port 56548
Dec  4 22:23:39 marvibiene sshd[52697]: Failed password for invalid user sr from 144.217.242.111 port 56548 ssh2
...
2019-12-05 06:33:44
138.68.148.177 attackspam
Dec  4 19:04:52 XXX sshd[981]: Invalid user plumley from 138.68.148.177 port 34354
2019-12-05 06:52:30
1.173.224.173 attackbots
Honeypot attack, port: 23, PTR: 1-173-224-173.dynamic-ip.hinet.net.
2019-12-05 07:09:58
218.92.0.180 attackspambots
Dec  4 22:33:42 hcbbdb sshd\[16454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
Dec  4 22:33:45 hcbbdb sshd\[16454\]: Failed password for root from 218.92.0.180 port 61155 ssh2
Dec  4 22:34:01 hcbbdb sshd\[16501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
Dec  4 22:34:03 hcbbdb sshd\[16501\]: Failed password for root from 218.92.0.180 port 25868 ssh2
Dec  4 22:34:23 hcbbdb sshd\[16531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
2019-12-05 06:45:16
118.71.13.181 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-05 06:39:29
176.9.104.140 attack
Dec  4 23:32:00 vps691689 sshd[3989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.9.104.140
Dec  4 23:32:02 vps691689 sshd[3989]: Failed password for invalid user mirror04 from 176.9.104.140 port 58997 ssh2
...
2019-12-05 07:02:31
138.197.5.191 attackspam
2019-12-04T22:36:19.815043shield sshd\[16978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191  user=root
2019-12-04T22:36:21.016139shield sshd\[16978\]: Failed password for root from 138.197.5.191 port 42526 ssh2
2019-12-04T22:42:16.855197shield sshd\[19044\]: Invalid user vcsa from 138.197.5.191 port 53160
2019-12-04T22:42:16.859461shield sshd\[19044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191
2019-12-04T22:42:18.406310shield sshd\[19044\]: Failed password for invalid user vcsa from 138.197.5.191 port 53160 ssh2
2019-12-05 06:50:41
134.175.154.22 attackspam
Dec  4 12:26:34 web9 sshd\[29595\]: Invalid user karlberg from 134.175.154.22
Dec  4 12:26:34 web9 sshd\[29595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.22
Dec  4 12:26:36 web9 sshd\[29595\]: Failed password for invalid user karlberg from 134.175.154.22 port 49758 ssh2
Dec  4 12:34:32 web9 sshd\[30935\]: Invalid user clintick from 134.175.154.22
Dec  4 12:34:32 web9 sshd\[30935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.22
2019-12-05 06:38:36
218.92.0.134 attackbotsspam
Dec  4 23:32:59 srv206 sshd[25180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.134  user=root
Dec  4 23:33:01 srv206 sshd[25180]: Failed password for root from 218.92.0.134 port 29038 ssh2
...
2019-12-05 07:00:30
86.56.11.228 attackspambots
Dec  4 19:29:31 firewall sshd[25886]: Invalid user homer from 86.56.11.228
Dec  4 19:29:32 firewall sshd[25886]: Failed password for invalid user homer from 86.56.11.228 port 58522 ssh2
Dec  4 19:35:13 firewall sshd[26015]: Invalid user test from 86.56.11.228
...
2019-12-05 07:00:16
103.121.26.150 attackspambots
Dec  4 19:41:22 zeus sshd[3774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 
Dec  4 19:41:24 zeus sshd[3774]: Failed password for invalid user laksov from 103.121.26.150 port 6060 ssh2
Dec  4 19:48:41 zeus sshd[4014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 
Dec  4 19:48:43 zeus sshd[4014]: Failed password for invalid user guest from 103.121.26.150 port 29596 ssh2
2019-12-05 07:03:43
40.87.127.217 attackspambots
2019-12-04T22:44:23.610794stark.klein-stark.info sshd\[14437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.87.127.217  user=root
2019-12-04T22:44:25.710282stark.klein-stark.info sshd\[14437\]: Failed password for root from 40.87.127.217 port 56818 ssh2
2019-12-04T22:53:15.179540stark.klein-stark.info sshd\[15060\]: Invalid user kummet from 40.87.127.217 port 37098
2019-12-04T22:53:15.186692stark.klein-stark.info sshd\[15060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.87.127.217
...
2019-12-05 06:43:56
159.203.201.228 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-12-05 07:10:33

最近上报的IP列表

131.196.138.98 131.196.14.11 131.196.138.97 51.175.201.240
131.196.138.9 118.172.236.80 131.196.14.116 131.196.14.114
131.196.14.159 131.196.14.149 131.196.14.203 131.196.141.1
131.196.14.231 131.196.14.235 131.196.14.232 131.196.141.100
131.196.14.82 131.196.141.10 118.172.237.113 131.196.141.103