必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.118.235.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.118.235.142.		IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:28:03 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
142.235.118.138.in-addr.arpa domain name pointer 138-118-235-142.wantel.net.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.235.118.138.in-addr.arpa	name = 138-118-235-142.wantel.net.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.252.239.5 attack
Invalid user zl from 122.252.239.5 port 49308
2019-08-23 22:26:00
112.132.89.81 attack
Invalid user ubuntu from 112.132.89.81 port 53138
2019-08-23 22:35:18
111.230.247.243 attack
Invalid user user1 from 111.230.247.243 port 51977
2019-08-23 22:36:36
180.76.57.7 attack
Aug 23 16:44:53 server sshd\[19244\]: Invalid user user from 180.76.57.7 port 38812
Aug 23 16:44:53 server sshd\[19244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.57.7
Aug 23 16:44:55 server sshd\[19244\]: Failed password for invalid user user from 180.76.57.7 port 38812 ssh2
Aug 23 16:47:38 server sshd\[17964\]: Invalid user elena from 180.76.57.7 port 60226
Aug 23 16:47:38 server sshd\[17964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.57.7
2019-08-23 22:05:32
182.74.217.122 attackbotsspam
Invalid user lilli from 182.74.217.122 port 45034
2019-08-23 22:04:16
80.211.78.252 attackbots
Aug 23 17:44:43 server sshd\[3382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.252  user=www-data
Aug 23 17:44:45 server sshd\[3382\]: Failed password for www-data from 80.211.78.252 port 33232 ssh2
Aug 23 17:49:01 server sshd\[13050\]: Invalid user support from 80.211.78.252 port 49304
Aug 23 17:49:01 server sshd\[13050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.252
Aug 23 17:49:03 server sshd\[13050\]: Failed password for invalid user support from 80.211.78.252 port 49304 ssh2
2019-08-23 22:51:17
178.116.159.202 attackspam
$f2bV_matches
2019-08-23 22:06:16
159.65.7.56 attackbots
$f2bV_matches_ltvn
2019-08-23 22:14:53
123.21.204.40 attack
Invalid user admin from 123.21.204.40 port 33800
2019-08-23 22:25:35
222.217.61.70 attackbotsspam
Invalid user ts1 from 222.217.61.70 port 2946
2019-08-23 21:49:50
103.72.167.198 attack
Invalid user teamspeak from 103.72.167.198 port 53578
2019-08-23 22:44:45
124.64.123.126 attack
Invalid user admin from 124.64.123.126 port 26016
2019-08-23 22:23:54
58.250.174.73 attackspambots
Invalid user user from 58.250.174.73 port 45201
2019-08-23 22:57:25
197.61.89.136 attack
Invalid user admin from 197.61.89.136 port 41440
2019-08-23 21:56:28
183.101.66.45 attackspambots
2019-08-23T12:43:08.887Z CLOSE host=183.101.66.45 port=33837 fd=4 time=1140.283 bytes=2086
...
2019-08-23 22:03:42

最近上报的IP列表

175.176.33.113 91.237.25.13 95.161.198.6 128.201.159.72
154.198.193.131 93.147.182.82 190.147.175.28 175.24.29.104
205.169.39.108 178.204.122.168 181.46.249.3 195.140.227.206
46.123.236.11 201.237.43.9 189.213.150.206 143.244.133.7
213.230.116.60 88.7.68.141 178.252.175.5 185.136.192.217