必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.127.5.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.127.5.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 23:13:06 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 138.5.127.132.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 132.127.5.138.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.7.17.61 attackspambots
Sep  4 12:07:29 OPSO sshd\[23045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61  user=root
Sep  4 12:07:31 OPSO sshd\[23045\]: Failed password for root from 189.7.17.61 port 47152 ssh2
Sep  4 12:17:17 OPSO sshd\[25326\]: Invalid user abc1 from 189.7.17.61 port 34704
Sep  4 12:17:17 OPSO sshd\[25326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61
Sep  4 12:17:18 OPSO sshd\[25326\]: Failed password for invalid user abc1 from 189.7.17.61 port 34704 ssh2
2019-09-04 18:48:05
114.231.180.99 attack
Sep  3 23:24:00 localhost kernel: [1305256.810102] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180.99 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=24106 DF PROTO=TCP SPT=57852 DPT=40 WINDOW=64240 RES=0x00 SYN URGP=0 
Sep  3 23:24:00 localhost kernel: [1305256.810129] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180.99 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=24106 DF PROTO=TCP SPT=57852 DPT=40 SEQ=606302255 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402) 
Sep  3 23:24:01 localhost kernel: [1305257.809555] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180.99 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=24107 DF PROTO=TCP SPT=57852 DPT=40 WINDOW=64240 RES=0x00 SYN URGP=0 
Sep  3 23:24:01 localhost kernel: [1305257.809563] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.231.180
2019-09-04 17:49:28
196.27.115.50 attackbots
$f2bV_matches
2019-09-04 18:56:08
189.197.63.14 attackbots
445/tcp 445/tcp 445/tcp...
[2019-07-05/09-04]15pkt,1pt.(tcp)
2019-09-04 19:05:36
114.249.227.157 attackspam
Sep  3 21:19:54 woof sshd[25558]: Invalid user tk from 114.249.227.157
Sep  3 21:19:54 woof sshd[25558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.249.227.157
Sep  3 21:19:56 woof sshd[25558]: Failed password for invalid user tk from 114.249.227.157 port 43528 ssh2
Sep  3 21:19:56 woof sshd[25558]: Received disconnect from 114.249.227.157: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.249.227.157
2019-09-04 17:49:06
24.232.29.188 attackspam
Automated report - ssh fail2ban:
Sep 4 11:29:18 authentication failure 
Sep 4 11:29:20 wrong password, user=before, port=46188, ssh2
Sep 4 11:34:46 authentication failure
2019-09-04 18:27:49
188.6.89.36 attack
Sep  4 02:33:07 wildwolf ssh-honeypotd[26164]: Failed password for admin from 188.6.89.36 port 48464 ssh2 (target: 158.69.100.131:22, password: admin1)
Sep  4 02:33:08 wildwolf ssh-honeypotd[26164]: Failed password for admin from 188.6.89.36 port 48464 ssh2 (target: 158.69.100.131:22, password: admin123)
Sep  4 02:33:08 wildwolf ssh-honeypotd[26164]: Failed password for admin from 188.6.89.36 port 48464 ssh2 (target: 158.69.100.131:22, password: motorola)
Sep  4 02:33:08 wildwolf ssh-honeypotd[26164]: Failed password for admin from 188.6.89.36 port 48464 ssh2 (target: 158.69.100.131:22, password: 12345)
Sep  4 02:33:09 wildwolf ssh-honeypotd[26164]: Failed password for admin from 188.6.89.36 port 48464 ssh2 (target: 158.69.100.131:22, password: admin1234)
Sep  4 02:33:09 wildwolf ssh-honeypotd[26164]: Failed password for admin from 188.6.89.36 port 48464 ssh2 (target: 158.69.100.131:22, password: changeme)
Sep  4 02:33:09 wildwolf ssh-honeypotd[26164]: Failed password fo........
------------------------------
2019-09-04 17:37:29
161.10.238.226 attackspambots
Sep  4 05:51:46 vps200512 sshd\[22945\]: Invalid user anand from 161.10.238.226
Sep  4 05:51:46 vps200512 sshd\[22945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.10.238.226
Sep  4 05:51:48 vps200512 sshd\[22945\]: Failed password for invalid user anand from 161.10.238.226 port 44000 ssh2
Sep  4 05:59:01 vps200512 sshd\[23103\]: Invalid user presley from 161.10.238.226
Sep  4 05:59:01 vps200512 sshd\[23103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.10.238.226
2019-09-04 18:16:42
218.98.40.140 attackspam
Sep  4 00:59:24 hanapaa sshd\[16736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.140  user=root
Sep  4 00:59:26 hanapaa sshd\[16736\]: Failed password for root from 218.98.40.140 port 56867 ssh2
Sep  4 00:59:34 hanapaa sshd\[16746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.140  user=root
Sep  4 00:59:37 hanapaa sshd\[16746\]: Failed password for root from 218.98.40.140 port 28148 ssh2
Sep  4 00:59:45 hanapaa sshd\[16764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.140  user=root
2019-09-04 19:13:54
14.207.2.197 attackbots
Sep  4 11:30:49 ns341937 sshd[24006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.2.197
Sep  4 11:30:52 ns341937 sshd[24006]: Failed password for invalid user mall from 14.207.2.197 port 46012 ssh2
Sep  4 11:43:51 ns341937 sshd[26074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.2.197
...
2019-09-04 18:00:47
112.85.42.229 attackspambots
Sep  4 10:44:08 debian sshd\[4795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
Sep  4 10:44:10 debian sshd\[4795\]: Failed password for root from 112.85.42.229 port 37855 ssh2
...
2019-09-04 17:50:34
134.209.48.248 attack
Sep  4 06:59:18 www2 sshd\[27582\]: Invalid user razvan from 134.209.48.248Sep  4 06:59:20 www2 sshd\[27582\]: Failed password for invalid user razvan from 134.209.48.248 port 60586 ssh2Sep  4 07:03:21 www2 sshd\[28159\]: Invalid user fpt from 134.209.48.248
...
2019-09-04 18:56:34
5.196.156.38 attackspam
Sep  3 23:09:46 aiointranet sshd\[21692\]: Invalid user admin from 5.196.156.38
Sep  3 23:09:46 aiointranet sshd\[21692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip38.ip-5-196-156.eu
Sep  3 23:09:48 aiointranet sshd\[21692\]: Failed password for invalid user admin from 5.196.156.38 port 35560 ssh2
Sep  3 23:13:35 aiointranet sshd\[21993\]: Invalid user tom from 5.196.156.38
Sep  3 23:13:35 aiointranet sshd\[21993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip38.ip-5-196-156.eu
2019-09-04 18:28:34
138.68.182.179 attack
Sep  3 21:37:34 auw2 sshd\[2751\]: Invalid user lol from 138.68.182.179
Sep  3 21:37:34 auw2 sshd\[2751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.182.179
Sep  3 21:37:36 auw2 sshd\[2751\]: Failed password for invalid user lol from 138.68.182.179 port 35146 ssh2
Sep  3 21:42:11 auw2 sshd\[3309\]: Invalid user image from 138.68.182.179
Sep  3 21:42:11 auw2 sshd\[3309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.182.179
2019-09-04 17:44:50
153.36.242.143 attackbots
2019-09-04T09:37:07.377942abusebot-4.cloudsearch.cf sshd\[13466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-09-04 17:43:03

最近上报的IP列表

114.122.253.178 40.172.39.209 222.94.11.222 76.192.39.247
144.254.108.149 62.63.194.10 12.204.203.192 89.65.82.89
14.14.92.76 209.188.21.70 226.131.102.71 219.1.30.67
239.212.87.213 97.243.98.104 163.218.198.177 146.201.255.142
207.168.203.30 227.50.52.130 208.143.176.173 240.177.161.246