必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.118.214.145 attackbots
Unauthorized connection attempt detected from IP address 138.118.214.145 to port 23
2020-04-13 00:32:13
138.118.214.145 attackspambots
port scan and connect, tcp 23 (telnet)
2020-03-28 00:03:34
138.118.214.145 attackspambots
Unauthorized connection attempt detected from IP address 138.118.214.145 to port 2323
2020-03-16 22:10:08
138.118.214.12 attack
SMB Server BruteForce Attack
2020-01-14 19:56:14
138.118.214.12 attackbotsspam
Unauthorized connection attempt detected from IP address 138.118.214.12 to port 445
2019-12-30 03:56:03
138.118.214.46 attackbots
Unauthorized connection attempt detected from IP address 138.118.214.46 to port 80
2019-12-29 00:47:38
138.118.214.12 attackbots
Fail2Ban Ban Triggered
2019-11-06 06:37:54
138.118.214.71 attackspambots
Nov  2 12:48:33 venus sshd\[13284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71  user=root
Nov  2 12:48:35 venus sshd\[13284\]: Failed password for root from 138.118.214.71 port 56598 ssh2
Nov  2 12:54:12 venus sshd\[13392\]: Invalid user ssingh from 138.118.214.71 port 48136
...
2019-11-02 21:12:34
138.118.214.71 attackspambots
Oct 31 07:19:56 ArkNodeAT sshd\[10336\]: Invalid user graciosa from 138.118.214.71
Oct 31 07:19:56 ArkNodeAT sshd\[10336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71
Oct 31 07:19:58 ArkNodeAT sshd\[10336\]: Failed password for invalid user graciosa from 138.118.214.71 port 37608 ssh2
2019-10-31 14:43:51
138.118.214.12 attackspambots
Unauthorised access (Oct 25) SRC=138.118.214.12 LEN=44 TOS=0x10 PREC=0x40 TTL=239 ID=16723 TCP DPT=1433 WINDOW=1024 SYN
2019-10-25 16:58:26
138.118.214.12 attackbotsspam
firewall-block, port(s): 445/tcp
2019-10-07 15:01:55
138.118.214.71 attackspam
*Port Scan* detected from 138.118.214.71 (AR/Argentina/red118.214.071-ssservicios.com.ar). 4 hits in the last 280 seconds
2019-09-30 07:25:49
138.118.214.71 attackspam
Sep 17 02:54:27 lnxded63 sshd[5696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71
Sep 17 02:54:27 lnxded63 sshd[5696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71
2019-09-17 09:27:38
138.118.214.71 attack
Sep 11 04:26:56 vps647732 sshd[2801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71
Sep 11 04:26:58 vps647732 sshd[2801]: Failed password for invalid user admin from 138.118.214.71 port 60676 ssh2
...
2019-09-11 10:42:20
138.118.214.71 attack
Automatic report - Banned IP Access
2019-08-27 12:50:53
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.118.214.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.118.214.232.		IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:19:50 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
232.214.118.138.in-addr.arpa domain name pointer red.138.118.214.232.ssservicios.com.ar.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
232.214.118.138.in-addr.arpa	name = red.138.118.214.232.ssservicios.com.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.13.7.202 attackbots
Unauthorized connection attempt detected from IP address 60.13.7.202 to port 8443 [J]
2020-01-22 08:18:01
94.23.39.179 attackbots
Unauthorized connection attempt detected from IP address 94.23.39.179 to port 21 [J]
2020-01-22 08:14:02
109.121.161.206 attackbots
Unauthorized connection attempt detected from IP address 109.121.161.206 to port 8080 [J]
2020-01-22 08:11:44
130.61.228.190 attackspam
Unauthorized connection attempt detected from IP address 130.61.228.190 to port 8080 [J]
2020-01-22 07:43:09
170.106.38.97 attackspambots
Unauthorized connection attempt detected from IP address 170.106.38.97 to port 636 [J]
2020-01-22 08:05:30
103.52.217.57 attackbotsspam
Unauthorized connection attempt detected from IP address 103.52.217.57 to port 7778 [J]
2020-01-22 07:48:52
102.40.50.204 attackspambots
Unauthorized connection attempt detected from IP address 102.40.50.204 to port 22 [J]
2020-01-22 07:49:37
31.200.192.96 attackspam
Unauthorized connection attempt detected from IP address 31.200.192.96 to port 23 [J]
2020-01-22 07:56:48
167.114.113.141 attack
Unauthorized connection attempt detected from IP address 167.114.113.141 to port 2220 [J]
2020-01-22 08:06:02
189.14.57.149 attackspambots
Unauthorized connection attempt detected from IP address 189.14.57.149 to port 8080 [J]
2020-01-22 08:02:36
45.148.10.159 attackspambots
Unauthorized connection attempt detected from IP address 45.148.10.159 to port 23 [J]
2020-01-22 07:54:57
157.245.203.50 attackspam
SSH Login Bruteforce
2020-01-22 07:41:44
94.247.248.133 attackbots
Unauthorized connection attempt detected from IP address 94.247.248.133 to port 80 [J]
2020-01-22 08:13:40
220.200.158.189 attackspambots
Unauthorized connection attempt detected from IP address 220.200.158.189 to port 8443 [J]
2020-01-22 07:58:32
8.2.215.75 attackbots
Unauthorized connection attempt detected from IP address 8.2.215.75 to port 23 [J]
2020-01-22 07:57:16

最近上报的IP列表

138.118.214.152 138.118.223.214 138.118.224.203 138.118.224.132
138.118.224.50 138.118.225.110 118.174.62.19 138.118.224.49
138.118.225.112 138.118.225.121 138.118.225.70 138.118.225.4
118.174.62.191 138.118.225.130 138.118.225.202 138.118.225.47
138.118.225.210 138.118.225.24 138.118.226.20 138.118.225.49