必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.1.49.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61142
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.1.49.162.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042300 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 23:21:58 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 162.49.1.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.49.1.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.246.13 attackspam
Oct  9 09:41:14 lanister sshd[27061]: Invalid user adam from 139.59.246.13
Oct  9 09:41:14 lanister sshd[27061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.246.13
Oct  9 09:41:14 lanister sshd[27061]: Invalid user adam from 139.59.246.13
Oct  9 09:41:16 lanister sshd[27061]: Failed password for invalid user adam from 139.59.246.13 port 42466 ssh2
2020-10-10 02:44:53
140.143.22.116 attackbots
2020-10-09T03:43:11.498031hostname sshd[90383]: Failed password for invalid user deployer from 140.143.22.116 port 46448 ssh2
...
2020-10-10 02:43:01
112.85.42.74 attack
Oct 9 16:38:29 *hidden* sshd[60710]: Failed password for *hidden* from 112.85.42.74 port 63736 ssh2 Oct 9 16:38:33 *hidden* sshd[60710]: Failed password for *hidden* from 112.85.42.74 port 63736 ssh2 Oct 9 16:38:35 *hidden* sshd[60710]: Failed password for *hidden* from 112.85.42.74 port 63736 ssh2
2020-10-10 02:43:16
125.133.32.189 attackspambots
125.133.32.189 (KR/South Korea/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  9 17:45:00 server sshd[3776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.73.239  user=root
Oct  9 17:45:02 server sshd[3776]: Failed password for root from 198.199.73.239 port 45975 ssh2
Oct  9 17:39:45 server sshd[2960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.133.32.189  user=root
Oct  9 17:39:47 server sshd[2960]: Failed password for root from 125.133.32.189 port 9655 ssh2
Oct  9 17:42:36 server sshd[3368]: Failed password for root from 187.188.90.141 port 45730 ssh2
Oct  9 17:55:46 server sshd[5424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.81  user=root

IP Addresses Blocked:

198.199.73.239 (US/United States/-)
2020-10-10 03:12:57
199.38.121.76 attack
2020-10-08T20:42:54.631983abusebot-5.cloudsearch.cf sshd[31982]: Invalid user admin from 199.38.121.76 port 34303
2020-10-08T20:42:55.087746abusebot-5.cloudsearch.cf sshd[31982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.38.121.76
2020-10-08T20:42:54.631983abusebot-5.cloudsearch.cf sshd[31982]: Invalid user admin from 199.38.121.76 port 34303
2020-10-08T20:42:57.383343abusebot-5.cloudsearch.cf sshd[31982]: Failed password for invalid user admin from 199.38.121.76 port 34303 ssh2
2020-10-08T20:43:00.134258abusebot-5.cloudsearch.cf sshd[31984]: Invalid user admin from 199.38.121.76 port 34306
2020-10-08T20:43:00.508798abusebot-5.cloudsearch.cf sshd[31984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.38.121.76
2020-10-08T20:43:00.134258abusebot-5.cloudsearch.cf sshd[31984]: Invalid user admin from 199.38.121.76 port 34306
2020-10-08T20:43:02.824439abusebot-5.cloudsearch.cf sshd[31984]: Failed
...
2020-10-10 02:46:28
49.232.192.91 attackspambots
SSH Brute-Force Attack
2020-10-10 03:08:15
161.35.99.173 attack
2020-10-09T17:56:12.912055galaxy.wi.uni-potsdam.de sshd[27468]: Failed password for invalid user sage from 161.35.99.173 port 48366 ssh2
2020-10-09T17:57:18.060145galaxy.wi.uni-potsdam.de sshd[27608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.99.173  user=root
2020-10-09T17:57:19.623064galaxy.wi.uni-potsdam.de sshd[27608]: Failed password for root from 161.35.99.173 port 36454 ssh2
2020-10-09T17:58:18.628984galaxy.wi.uni-potsdam.de sshd[27718]: Invalid user backup from 161.35.99.173 port 52770
2020-10-09T17:58:18.633948galaxy.wi.uni-potsdam.de sshd[27718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.99.173
2020-10-09T17:58:18.628984galaxy.wi.uni-potsdam.de sshd[27718]: Invalid user backup from 161.35.99.173 port 52770
2020-10-09T17:58:20.770306galaxy.wi.uni-potsdam.de sshd[27718]: Failed password for invalid user backup from 161.35.99.173 port 52770 ssh2
2020-10-09T17:59:20.599649gal
...
2020-10-10 02:35:57
103.130.213.21 attackspam
web-1 [ssh_2] SSH Attack
2020-10-10 03:02:10
79.137.72.121 attack
(sshd) Failed SSH login from 79.137.72.121 (FR/France/121.ip-79-137-72.eu): 5 in the last 3600 secs
2020-10-10 02:48:39
45.40.199.82 attack
Oct  9 02:46:00 ws24vmsma01 sshd[4324]: Failed password for root from 45.40.199.82 port 52742 ssh2
...
2020-10-10 02:45:34
220.86.96.97 attack
2020-10-09T21:41:36.190732paragon sshd[802568]: Invalid user hadoop from 220.86.96.97 port 7649
2020-10-09T21:41:38.211817paragon sshd[802568]: Failed password for invalid user hadoop from 220.86.96.97 port 7649 ssh2
2020-10-09T21:43:35.505582paragon sshd[802641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.96.97  user=root
2020-10-09T21:43:37.189669paragon sshd[802641]: Failed password for root from 220.86.96.97 port 5104 ssh2
2020-10-09T21:45:35.497531paragon sshd[802707]: Invalid user charles from 220.86.96.97 port 2600
...
2020-10-10 02:46:12
116.85.64.100 attackspam
116.85.64.100 (CN/China/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  9 06:23:47 jbs1 sshd[23194]: Failed password for root from 58.185.183.60 port 59898 ssh2
Oct  9 06:26:45 jbs1 sshd[24140]: Failed password for root from 58.185.183.60 port 46414 ssh2
Oct  9 06:30:11 jbs1 sshd[25196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.64.100  user=root
Oct  9 06:29:34 jbs1 sshd[24965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.24  user=root
Oct  9 06:24:46 jbs1 sshd[23347]: Failed password for root from 3.22.223.189 port 34346 ssh2
Oct  9 06:29:35 jbs1 sshd[24965]: Failed password for root from 177.152.124.24 port 39668 ssh2
Oct  9 06:29:40 jbs1 sshd[25024]: Failed password for root from 58.185.183.60 port 32926 ssh2

IP Addresses Blocked:

58.185.183.60 (SG/Singapore/-)
2020-10-10 02:39:03
130.105.248.152 attackspambots
130.105.248.152 - - [08/Oct/2020:22:03:26 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
130.105.248.152 - - [08/Oct/2020:22:03:27 +0100] "POST /wp-login.php HTTP/1.1" 200 7644 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
130.105.248.152 - - [08/Oct/2020:22:04:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-10-10 03:07:24
183.146.185.57 attackbots
Oct  9 00:19:15 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:19:27 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:19:43 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:20:02 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:20:15 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-10 02:40:43
45.143.221.96 attackspambots
[2020-10-09 14:37:40] NOTICE[1182][C-00002386] chan_sip.c: Call from '' (45.143.221.96:5074) to extension '972595778361' rejected because extension not found in context 'public'.
[2020-10-09 14:37:40] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-09T14:37:40.093-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="972595778361",SessionID="0x7f22f840f098",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.221.96/5074",ACLName="no_extension_match"
[2020-10-09 14:39:25] NOTICE[1182][C-00002388] chan_sip.c: Call from '' (45.143.221.96:5074) to extension '011972595778361' rejected because extension not found in context 'public'.
[2020-10-09 14:39:25] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-09T14:39:25.058-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595778361",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.22
...
2020-10-10 02:41:57

最近上报的IP列表

138.117.76.219 223.29.225.43 24.163.142.175 121.122.41.141
122.176.52.13 45.234.131.3 187.124.225.118 206.163.164.101
0.249.206.32 213.31.21.58 49.216.37.252 21.5.95.68
103.255.4.87 61.137.234.248 211.49.126.166 95.56.13.196
103.72.215.76 36.231.189.72 184.117.201.252 167.211.23.249