必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.0.76.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.0.76.66.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:17:22 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 66.76.0.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.76.0.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.121.22.235 attack
Failed password for invalid user vnc from 88.121.22.235 port 55323 ssh2
2020-09-07 13:11:37
112.85.42.89 attackspam
Sep  7 04:33:41 plex-server sshd[2620209]: Failed password for root from 112.85.42.89 port 48843 ssh2
Sep  7 04:35:25 plex-server sshd[2620971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep  7 04:35:26 plex-server sshd[2620971]: Failed password for root from 112.85.42.89 port 62583 ssh2
Sep  7 04:36:17 plex-server sshd[2621332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep  7 04:36:19 plex-server sshd[2621332]: Failed password for root from 112.85.42.89 port 54444 ssh2
...
2020-09-07 12:48:16
129.226.117.160 attackbotsspam
Sep  7 02:09:34 webhost01 sshd[21115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.117.160
Sep  7 02:09:36 webhost01 sshd[21115]: Failed password for invalid user admin from 129.226.117.160 port 34998 ssh2
...
2020-09-07 13:03:22
190.211.240.227 attackbots
Honeypot attack, port: 445, PTR: fujikura.com.py.
2020-09-07 12:49:44
164.132.3.146 attackbotsspam
Failed password for invalid user test from 164.132.3.146 port 51039 ssh2
2020-09-07 13:11:04
45.142.120.78 attackspambots
Sep  7 07:16:03 relay postfix/smtpd\[4916\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 07:16:48 relay postfix/smtpd\[3919\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 07:17:18 relay postfix/smtpd\[5970\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 07:17:58 relay postfix/smtpd\[5972\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 07:18:48 relay postfix/smtpd\[29264\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-07 13:23:06
139.186.77.46 attack
Sep  7 02:48:18 ns382633 sshd\[29896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.77.46  user=root
Sep  7 02:48:21 ns382633 sshd\[29896\]: Failed password for root from 139.186.77.46 port 57744 ssh2
Sep  7 03:00:27 ns382633 sshd\[32262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.77.46  user=root
Sep  7 03:00:29 ns382633 sshd\[32262\]: Failed password for root from 139.186.77.46 port 57746 ssh2
Sep  7 03:03:04 ns382633 sshd\[32461\]: Invalid user pakistan1000 from 139.186.77.46 port 35508
Sep  7 03:03:04 ns382633 sshd\[32461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.77.46
2020-09-07 13:19:00
217.182.192.217 attack
Sep  7 04:48:58 mavik sshd[19935]: Failed password for root from 217.182.192.217 port 35126 ssh2
Sep  7 04:49:01 mavik sshd[19935]: Failed password for root from 217.182.192.217 port 35126 ssh2
Sep  7 04:49:03 mavik sshd[19935]: Failed password for root from 217.182.192.217 port 35126 ssh2
Sep  7 04:49:06 mavik sshd[19935]: Failed password for root from 217.182.192.217 port 35126 ssh2
Sep  7 04:49:07 mavik sshd[19935]: Failed password for root from 217.182.192.217 port 35126 ssh2
...
2020-09-07 12:43:40
218.245.1.169 attackbotsspam
Ssh brute force
2020-09-07 12:57:04
162.158.165.46 attackbots
srv02 DDoS Malware Target(80:http) ..
2020-09-07 13:01:46
140.143.210.92 attackspambots
2020-09-06T19:25:55.004707morrigan.ad5gb.com sshd[1771623]: Failed password for root from 140.143.210.92 port 43050 ssh2
2020-09-06T19:25:55.836174morrigan.ad5gb.com sshd[1771623]: Disconnected from authenticating user root 140.143.210.92 port 43050 [preauth]
2020-09-07 13:26:41
112.85.42.74 attackspam
Sep  7 11:46:57 webhost01 sshd[29171]: Failed password for root from 112.85.42.74 port 41446 ssh2
...
2020-09-07 13:03:52
106.12.59.23 attackbotsspam
$f2bV_matches
2020-09-07 13:13:44
141.98.10.209 attack
$f2bV_matches
2020-09-07 13:24:22
165.22.60.7 attackspambots
SSH login attempts.
2020-09-07 12:51:17

最近上报的IP列表

118.174.233.26 138.0.73.26 138.0.73.170 138.0.74.185
138.0.74.156 138.0.73.46 138.0.73.193 138.0.71.182
138.0.74.186 138.0.74.234 138.0.74.40 138.0.88.197
118.174.233.3 138.0.88.228 138.0.88.242 138.0.88.251
138.0.88.253 138.0.88.254 138.0.89.110 138.0.88.245