必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.118.86.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.118.86.94.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:21:38 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
94.86.118.138.in-addr.arpa domain name pointer 138-118-86-94.inbnet.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.86.118.138.in-addr.arpa	name = 138-118-86-94.inbnet.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.174.119.173 attackspam
failed_logins
2020-05-28 04:23:18
159.65.77.254 attackbots
May 27 16:27:29 vps46666688 sshd[14070]: Failed password for root from 159.65.77.254 port 40164 ssh2
...
2020-05-28 03:56:44
87.251.74.114 attackspambots
05/27/2020-14:57:52.648976 87.251.74.114 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-28 04:20:17
187.26.165.62 attackbots
May 27 20:17:16 db01 sshd[20719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-26-165-62.3g.claro.net.br  user=r.r
May 27 20:17:19 db01 sshd[20719]: Failed password for r.r from 187.26.165.62 port 24351 ssh2
May 27 20:17:19 db01 sshd[20719]: Received disconnect from 187.26.165.62: 11: Bye Bye [preauth]
May 27 20:17:21 db01 sshd[20721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-26-165-62.3g.claro.net.br  user=r.r
May 27 20:17:24 db01 sshd[20721]: Failed password for r.r from 187.26.165.62 port 24352 ssh2
May 27 20:17:24 db01 sshd[20721]: Received disconnect from 187.26.165.62: 11: Bye Bye [preauth]
May 27 20:17:26 db01 sshd[20723]: Invalid user ubnt from 187.26.165.62
May 27 20:17:26 db01 sshd[20723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-26-165-62.3g.claro.net.br 
May 27 20:17:28 db01 sshd[20723]: Failed password for inva........
-------------------------------
2020-05-28 04:07:01
42.159.228.125 attackspam
May 27 20:15:11 electroncash sshd[40977]: Failed password for invalid user sako from 42.159.228.125 port 62227 ssh2
May 27 20:20:04 electroncash sshd[42460]: Invalid user allen from 42.159.228.125 port 10289
May 27 20:20:04 electroncash sshd[42460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.228.125 
May 27 20:20:04 electroncash sshd[42460]: Invalid user allen from 42.159.228.125 port 10289
May 27 20:20:06 electroncash sshd[42460]: Failed password for invalid user allen from 42.159.228.125 port 10289 ssh2
...
2020-05-28 04:15:46
51.77.177.206 attack
spam
2020-05-28 03:51:27
187.206.227.64 attackbotsspam
May 27 18:06:28 Server1 sshd[18484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.206.227.64  user=uucp
May 27 18:06:30 Server1 sshd[18484]: Failed password for uucp from 187.206.227.64 port 37677 ssh2
May 27 18:06:30 Server1 sshd[18484]: Received disconnect from 187.206.227.64 port 37677:11: Bye Bye [preauth]
May 27 18:06:30 Server1 sshd[18484]: Disconnected from authenticating user uucp 187.206.227.64 port 37677 [preauth]
May 27 18:11:22 Server1 sshd[18642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.206.227.64  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.206.227.64
2020-05-28 03:53:49
104.131.52.16 attackspam
2020-05-27T19:37:48.043223shield sshd\[2051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.52.16  user=root
2020-05-27T19:37:49.805876shield sshd\[2051\]: Failed password for root from 104.131.52.16 port 56850 ssh2
2020-05-27T19:41:05.062076shield sshd\[2782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.52.16  user=root
2020-05-27T19:41:07.868744shield sshd\[2782\]: Failed password for root from 104.131.52.16 port 59372 ssh2
2020-05-27T19:44:16.243548shield sshd\[3309\]: Invalid user 987654321 from 104.131.52.16 port 33660
2020-05-28 03:53:01
218.92.0.203 attackspam
2020-05-27T22:25:27.948709vps751288.ovh.net sshd\[28633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-05-27T22:25:29.535833vps751288.ovh.net sshd\[28633\]: Failed password for root from 218.92.0.203 port 21736 ssh2
2020-05-27T22:25:31.929514vps751288.ovh.net sshd\[28633\]: Failed password for root from 218.92.0.203 port 21736 ssh2
2020-05-27T22:25:34.067190vps751288.ovh.net sshd\[28633\]: Failed password for root from 218.92.0.203 port 21736 ssh2
2020-05-27T22:27:03.310296vps751288.ovh.net sshd\[28637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-05-28 04:27:50
190.109.168.19 attackbots
Unauthorized connection attempt from IP address 190.109.168.19 on Port 445(SMB)
2020-05-28 03:57:41
45.77.82.109 attackbotsspam
(sshd) Failed SSH login from 45.77.82.109 (US/United States/45.77.82.109.vultr.com): 5 in the last 3600 secs
2020-05-28 03:55:03
182.61.173.121 attack
Automatic report - Port Scan
2020-05-28 04:20:41
14.249.230.134 attack
failed_logins
2020-05-28 04:27:36
192.241.200.17 attackbotsspam
" "
2020-05-28 04:12:13
51.254.87.76 attackbotsspam
Tor exit node
2020-05-28 04:07:17

最近上报的IP列表

118.174.69.189 138.118.86.85 138.118.86.91 138.118.86.92
138.118.86.9 138.118.87.59 138.118.86.97 138.118.87.29
138.118.87.1 138.118.89.18 138.118.89.13 138.12.4.195
138.118.93.118 118.174.69.20 138.121.1.126 138.121.1.24
138.118.87.53 138.121.104.216 138.121.113.210 138.121.113.246