必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.138.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.138.138.		IN	A

;; AUTHORITY SECTION:
.			244	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 151 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:35:57 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
138.138.148.132.in-addr.arpa domain name pointer ip-132-148-138-138.ip.secureserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.138.148.132.in-addr.arpa	name = ip-132-148-138-138.ip.secureserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.206.67.153 attackbotsspam
Unauthorised access (Jul 16) SRC=106.206.67.153 LEN=52 TOS=0x08 PREC=0x60 TTL=110 ID=13598 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-17 02:19:36
175.24.18.134 attackspambots
Automatic report - Banned IP Access
2020-07-17 02:20:15
94.217.103.88 attackspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-17 02:13:44
191.235.64.211 attack
Honeypot hit.
2020-07-17 02:35:08
62.220.210.145 attack
Unauthorized connection attempt from IP address 62.220.210.145 on Port 445(SMB)
2020-07-17 02:06:24
124.192.225.179 attackbots
Jul 16 18:27:52 fhem-rasp sshd[24424]: Invalid user lachlan from 124.192.225.179 port 49168
...
2020-07-17 02:04:30
106.12.148.74 attackbots
Jul 16 18:46:07 gw1 sshd[6033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.74
Jul 16 18:46:08 gw1 sshd[6033]: Failed password for invalid user serverpilot from 106.12.148.74 port 41760 ssh2
...
2020-07-17 02:11:58
80.169.29.92 attackspambots
Unauthorized connection attempt from IP address 80.169.29.92 on Port 445(SMB)
2020-07-17 02:09:14
195.54.160.163 attack
SQL Injection in QueryString parameter: 387 AND 4719=(SELECT (CASE WHEN (4719=4719) THEN 4719 ELSE (SELECT 6311 UNION SELECT 1410) END))-- FIte
2020-07-17 02:12:56
221.155.59.5 attackspambots
Invalid user database from 221.155.59.5 port 44054
2020-07-17 02:38:04
103.99.102.217 attackbotsspam
Unauthorized connection attempt from IP address 103.99.102.217 on Port 445(SMB)
2020-07-17 02:10:54
177.23.104.38 attackspambots
Unauthorized connection attempt from IP address 177.23.104.38 on Port 445(SMB)
2020-07-17 02:17:18
104.244.78.107 attack
Unauthorized connection attempt detected from IP address 104.244.78.107 to port 80
2020-07-17 02:38:36
79.124.62.122 attack
[H1.VM1] Blocked by UFW
2020-07-17 02:38:54
134.122.111.162 attackspambots
2020-07-16T14:20:21.392958sorsha.thespaminator.com sshd[20726]: Invalid user vps from 134.122.111.162 port 43572
2020-07-16T14:20:23.964865sorsha.thespaminator.com sshd[20726]: Failed password for invalid user vps from 134.122.111.162 port 43572 ssh2
...
2020-07-17 02:41:58

最近上报的IP列表

132.145.155.245 132.148.149.227 132.145.210.196 132.148.149.48
132.148.15.109 132.148.150.175 132.148.150.201 132.148.151.45
132.148.153.67 132.145.251.226 132.148.154.97 132.148.154.69
132.148.100.0 132.148.156.177 132.148.156.237 132.148.112.12
132.148.156.30 132.148.112.75 132.148.157.210 132.148.157.228