必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
132.148.244.122 attackspambots
132.148.244.122 - - [31/Aug/2020:08:40:52 +0100] "POST /wp-login.php HTTP/1.1" 200 1966 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [31/Aug/2020:08:40:54 +0100] "POST /wp-login.php HTTP/1.1" 200 1951 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [31/Aug/2020:08:40:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1947 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-31 16:25:58
132.148.244.122 attackspam
132.148.244.122 - - [24/Aug/2020:13:44:37 +0200] "GET /wp-login.php HTTP/1.1" 200 9040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [24/Aug/2020:13:44:38 +0200] "POST /wp-login.php HTTP/1.1" 200 9291 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [24/Aug/2020:13:44:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-25 03:56:28
132.148.244.122 attackspam
132.148.244.122 - - [15/Aug/2020:14:55:44 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [15/Aug/2020:14:55:47 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [15/Aug/2020:14:55:49 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-16 03:08:37
132.148.244.122 attackspam
Aug  9 06:42:01 b-vps wordpress(gpfans.cz)[13309]: Authentication attempt for unknown user buchtic from 132.148.244.122
...
2020-08-09 14:46:35
132.148.244.122 attack
Aug  5 14:20:23 b-vps wordpress(rreb.cz)[1606]: Authentication attempt for unknown user barbora from 132.148.244.122
...
2020-08-05 20:33:19
132.148.244.122 attackspambots
132.148.244.122 - - [26/Jul/2020:14:57:31 +0100] "POST /wp-login.php HTTP/1.1" 200 1950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [26/Jul/2020:14:57:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1885 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [26/Jul/2020:14:57:51 +0100] "POST /wp-login.php HTTP/1.1" 200 1885 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-26 21:58:18
132.148.244.122 attackspam
132.148.244.122 - - [29/Jun/2020:13:16:46 +0200] "POST /xmlrpc.php HTTP/1.1" 403 10518 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [29/Jun/2020:13:17:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 10519 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-29 21:05:46
132.148.244.122 attackbots
132.148.244.122 - - [11/Jun/2020:15:57:03 +0200] "GET /wp-login.php HTTP/1.1" 200 6183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [11/Jun/2020:15:57:05 +0200] "POST /wp-login.php HTTP/1.1" 200 6434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [11/Jun/2020:15:57:06 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-12 03:04:25
132.148.244.122 attack
132.148.244.122 - - [29/May/2020:22:50:39 +0200] "GET /wp-login.php HTTP/1.1" 200 6042 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [29/May/2020:22:50:41 +0200] "POST /wp-login.php HTTP/1.1" 200 6293 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [29/May/2020:22:50:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-30 05:20:30
132.148.244.122 attackspam
132.148.244.122 - - [14/May/2020:05:47:52 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [14/May/2020:05:47:54 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - [14/May/2020:05:47:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-14 17:44:35
132.148.244.122 attackbots
132.148.244.122 - - \[12/May/2020:23:10:17 +0200\] "POST /wp-login.php HTTP/1.1" 200 9952 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
132.148.244.122 - - \[12/May/2020:23:10:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 9787 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-05-13 09:23:47
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.244.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44754
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.244.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:35:02 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
138.244.148.132.in-addr.arpa domain name pointer 138.244.148.132.host.secureserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.244.148.132.in-addr.arpa	name = 138.244.148.132.host.secureserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.162.166.56 attackbotsspam
1597266189 - 08/12/2020 23:03:09 Host: 188.162.166.56/188.162.166.56 Port: 445 TCP Blocked
2020-08-13 06:02:24
111.92.240.206 attackbots
Automatic report generated by Wazuh
2020-08-13 05:50:30
77.219.4.71 attackbots
77.219.4.71 - - [12/Aug/2020:21:54:01 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
77.219.4.71 - - [12/Aug/2020:21:54:01 +0100] "POST /wp-login.php HTTP/1.1" 302 0 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
77.219.4.71 - - [12/Aug/2020:22:03:46 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
...
2020-08-13 05:36:22
47.92.200.30 attackspambots
2020-08-12T22:58:59.359513v22018076590370373 sshd[24043]: Failed password for root from 47.92.200.30 port 59150 ssh2
2020-08-12T23:01:20.064757v22018076590370373 sshd[5504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.92.200.30  user=root
2020-08-12T23:01:21.790408v22018076590370373 sshd[5504]: Failed password for root from 47.92.200.30 port 39654 ssh2
2020-08-12T23:03:44.067130v22018076590370373 sshd[17897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.92.200.30  user=root
2020-08-12T23:03:46.895513v22018076590370373 sshd[17897]: Failed password for root from 47.92.200.30 port 48408 ssh2
...
2020-08-13 05:34:46
152.136.170.27 attackspambots
Aug 12 22:57:38 vps639187 sshd\[11488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.170.27  user=root
Aug 12 22:57:39 vps639187 sshd\[11488\]: Failed password for root from 152.136.170.27 port 56036 ssh2
Aug 12 23:03:40 vps639187 sshd\[11598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.170.27  user=root
...
2020-08-13 05:38:27
62.28.253.197 attackbots
Aug 12 22:29:28 rocket sshd[15285]: Failed password for root from 62.28.253.197 port 46615 ssh2
Aug 12 22:33:10 rocket sshd[15955]: Failed password for root from 62.28.253.197 port 18559 ssh2
...
2020-08-13 05:33:27
218.92.0.190 attack
Aug 12 23:58:36 dcd-gentoo sshd[11497]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Aug 12 23:58:38 dcd-gentoo sshd[11497]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Aug 12 23:58:38 dcd-gentoo sshd[11497]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.190 port 64672 ssh2
...
2020-08-13 05:59:46
119.28.32.60 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-13 05:31:38
200.133.39.84 attackbotsspam
Aug 12 21:16:28 game-panel sshd[28659]: Failed password for root from 200.133.39.84 port 60958 ssh2
Aug 12 21:19:46 game-panel sshd[28752]: Failed password for root from 200.133.39.84 port 53150 ssh2
2020-08-13 05:41:34
92.238.162.25 attack
92.238.162.25 - - [12/Aug/2020:21:59:25 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
92.238.162.25 - - [12/Aug/2020:22:01:07 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
92.238.162.25 - - [12/Aug/2020:22:03:55 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-08-13 05:28:14
111.231.135.220 attackspambots
Web application attack detected by fail2ban
2020-08-13 05:42:24
203.128.94.226 attackspam
Dovecot Invalid User Login Attempt.
2020-08-13 05:48:35
113.206.141.5 attack
[Thu Aug 13 04:03:34.797619 2020] [:error] [pid 3529:tid 140197865977600] [client 113.206.141.5:56224] [client 113.206.141.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "127.0.0.1:80"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "127.0.0.1"] [uri "/shell"] [unique_id "XzRZJoqBmYA0JFMXc6nlZgAAAks"]
...
2020-08-13 05:43:32
110.83.40.209 attackbotsspam
Email rejected due to spam filtering
2020-08-13 06:03:04
222.185.241.130 attack
2020-08-13T04:03:13.365165hostname sshd[100532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.185.241.130  user=root
2020-08-13T04:03:15.937938hostname sshd[100532]: Failed password for root from 222.185.241.130 port 37950 ssh2
...
2020-08-13 05:54:33

最近上报的IP列表

74.34.31.104 56.86.125.36 166.248.37.234 170.167.122.111
188.60.35.45 95.40.103.24 245.103.211.25 116.170.162.177
85.126.65.189 204.226.222.146 121.214.64.61 41.53.33.159
161.40.242.147 41.132.199.164 53.147.240.240 63.41.75.207
159.214.149.38 133.149.255.69 71.114.192.209 227.165.153.173