必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.117.129.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.117.129.142.		IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:52:18 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
b'142.129.117.138.in-addr.arpa domain name pointer host142.138-117-129.ach-internet.com.ar.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.129.117.138.in-addr.arpa	name = host142.138-117-129.ach-internet.com.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.29.170.170 attackbotsspam
Aug 28 17:59:56 srv206 sshd[13410]: Invalid user ts3 from 119.29.170.170
...
2019-08-29 00:42:57
115.209.192.168 attack
2019-08-28T21:41:05.019993enmeeting.mahidol.ac.th sshd\[10351\]: User root from 115.209.192.168 not allowed because not listed in AllowUsers
2019-08-28T21:41:05.143607enmeeting.mahidol.ac.th sshd\[10351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.209.192.168  user=root
2019-08-28T21:41:07.451053enmeeting.mahidol.ac.th sshd\[10351\]: Failed password for invalid user root from 115.209.192.168 port 55863 ssh2
...
2019-08-29 00:56:28
210.187.87.185 attackspam
Aug 28 18:30:06 localhost sshd\[15704\]: Invalid user sabayon-admin from 210.187.87.185 port 58818
Aug 28 18:30:06 localhost sshd\[15704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.187.87.185
Aug 28 18:30:07 localhost sshd\[15704\]: Failed password for invalid user sabayon-admin from 210.187.87.185 port 58818 ssh2
2019-08-29 00:37:25
128.134.187.167 attack
Aug 28 18:19:13 mail sshd\[23246\]: Invalid user sgeadmin from 128.134.187.167 port 52830
Aug 28 18:19:13 mail sshd\[23246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.167
Aug 28 18:19:14 mail sshd\[23246\]: Failed password for invalid user sgeadmin from 128.134.187.167 port 52830 ssh2
Aug 28 18:24:07 mail sshd\[23878\]: Invalid user letmein from 128.134.187.167 port 41492
Aug 28 18:24:07 mail sshd\[23878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.167
2019-08-29 00:33:51
51.68.144.199 attack
[ 🇧🇷 ] From root@vft14.cbooplider.com Wed Aug 28 11:19:20 2019
 Received: from vft14.cbooplider.com ([51.68.144.199]:45016)
2019-08-29 00:45:23
220.76.107.50 attack
Aug 28 05:52:31 lcprod sshd\[22269\]: Invalid user planning from 220.76.107.50
Aug 28 05:52:31 lcprod sshd\[22269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
Aug 28 05:52:32 lcprod sshd\[22269\]: Failed password for invalid user planning from 220.76.107.50 port 55914 ssh2
Aug 28 05:57:18 lcprod sshd\[22689\]: Invalid user teamspeak from 220.76.107.50
Aug 28 05:57:18 lcprod sshd\[22689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
2019-08-29 00:06:35
85.119.149.130 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-29 00:09:16
51.38.38.221 attack
Aug 28 16:06:07 hcbbdb sshd\[10972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-51-38-38.eu  user=root
Aug 28 16:06:09 hcbbdb sshd\[10972\]: Failed password for root from 51.38.38.221 port 45690 ssh2
Aug 28 16:10:03 hcbbdb sshd\[11432\]: Invalid user ges from 51.38.38.221
Aug 28 16:10:03 hcbbdb sshd\[11432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-51-38-38.eu
Aug 28 16:10:05 hcbbdb sshd\[11432\]: Failed password for invalid user ges from 51.38.38.221 port 39303 ssh2
2019-08-29 00:21:16
45.138.96.13 attackbots
Spam
2019-08-29 00:04:32
45.72.23.250 attackbotsspam
NAME : NET-45-72-23-240-1 CIDR : 45.72.23.240/28 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack US - block certain countries :) IP: 45.72.23.250  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-29 00:47:38
159.89.166.50 attackspambots
Aug 28 06:13:50 hpm sshd\[19998\]: Invalid user ruben from 159.89.166.50
Aug 28 06:13:50 hpm sshd\[19998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.50
Aug 28 06:13:52 hpm sshd\[19998\]: Failed password for invalid user ruben from 159.89.166.50 port 36778 ssh2
Aug 28 06:19:46 hpm sshd\[20459\]: Invalid user one from 159.89.166.50
Aug 28 06:19:46 hpm sshd\[20459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.50
2019-08-29 00:24:30
130.61.72.90 attackspambots
Aug 28 19:34:59 pkdns2 sshd\[8140\]: Invalid user permlink from 130.61.72.90Aug 28 19:35:00 pkdns2 sshd\[8140\]: Failed password for invalid user permlink from 130.61.72.90 port 50614 ssh2Aug 28 19:39:04 pkdns2 sshd\[8371\]: Invalid user apc from 130.61.72.90Aug 28 19:39:06 pkdns2 sshd\[8371\]: Failed password for invalid user apc from 130.61.72.90 port 39006 ssh2Aug 28 19:43:05 pkdns2 sshd\[8568\]: Invalid user 123456 from 130.61.72.90Aug 28 19:43:07 pkdns2 sshd\[8568\]: Failed password for invalid user 123456 from 130.61.72.90 port 55626 ssh2
...
2019-08-29 00:53:41
139.59.75.241 attack
Aug 28 05:48:42 php1 sshd\[11429\]: Invalid user erich from 139.59.75.241
Aug 28 05:48:42 php1 sshd\[11429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.75.241
Aug 28 05:48:43 php1 sshd\[11429\]: Failed password for invalid user erich from 139.59.75.241 port 37424 ssh2
Aug 28 05:53:38 php1 sshd\[11847\]: Invalid user edward from 139.59.75.241
Aug 28 05:53:38 php1 sshd\[11847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.75.241
2019-08-29 00:09:55
125.22.76.76 attack
Aug 28 15:35:08 localhost sshd\[72767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.76.76  user=root
Aug 28 15:35:10 localhost sshd\[72767\]: Failed password for root from 125.22.76.76 port 51495 ssh2
Aug 28 15:42:48 localhost sshd\[73009\]: Invalid user site from 125.22.76.76 port 53718
Aug 28 15:42:48 localhost sshd\[73009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.76.76
Aug 28 15:42:50 localhost sshd\[73009\]: Failed password for invalid user site from 125.22.76.76 port 53718 ssh2
...
2019-08-28 23:57:18
77.247.181.163 attackspambots
Aug 28 05:09:58 kapalua sshd\[8535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lumumba.torservers.net  user=root
Aug 28 05:10:00 kapalua sshd\[8535\]: Failed password for root from 77.247.181.163 port 12040 ssh2
Aug 28 05:10:02 kapalua sshd\[8535\]: Failed password for root from 77.247.181.163 port 12040 ssh2
Aug 28 05:10:05 kapalua sshd\[8535\]: Failed password for root from 77.247.181.163 port 12040 ssh2
Aug 28 05:10:08 kapalua sshd\[8535\]: Failed password for root from 77.247.181.163 port 12040 ssh2
2019-08-29 00:02:17

最近上报的IP列表

138.117.162.50 138.117.132.60 138.117.179.54 138.117.149.138
138.117.17.144 138.117.211.220 138.117.179.182 138.117.77.170
138.117.23.11 138.117.90.113 138.117.89.201 138.118.116.159
138.118.100.90 138.117.90.208 138.118.101.58 138.118.150.217
138.118.101.90 138.118.226.18 238.141.184.204 138.118.235.151