必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Teixeira de Freitas

省份(region): Bahia

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.121.36.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.121.36.49.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011800 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 04:32:18 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
49.36.121.138.in-addr.arpa domain name pointer 138-121-36-49.tdf.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.36.121.138.in-addr.arpa	name = 138-121-36-49.tdf.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.51.37.107 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-20 21:01:17
159.203.201.79 attackspambots
11/20/2019-03:46:22.516621 159.203.201.79 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-20 20:39:52
117.67.126.255 attackspambots
badbot
2019-11-20 21:00:42
117.63.117.247 attackbotsspam
badbot
2019-11-20 20:51:20
219.131.85.31 attackspambots
badbot
2019-11-20 21:14:28
49.232.171.28 attackbotsspam
SSH Bruteforce attack
2019-11-20 21:13:17
95.178.216.15 attack
Telnetd brute force attack detected by fail2ban
2019-11-20 21:16:21
177.103.223.147 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2019-11-20 21:04:31
103.203.132.167 attackbots
Port 1433 Scan
2019-11-20 21:01:38
195.143.103.194 attackspambots
2019-11-20T13:21:45.105596scmdmz1 sshd\[19267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.143.103.194  user=root
2019-11-20T13:21:47.136642scmdmz1 sshd\[19267\]: Failed password for root from 195.143.103.194 port 40708 ssh2
2019-11-20T13:26:45.605608scmdmz1 sshd\[19674\]: Invalid user bwalker from 195.143.103.194 port 59115
...
2019-11-20 20:35:37
134.209.237.55 attackbotsspam
Nov 19 22:50:25 kapalua sshd\[15489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.55  user=mysql
Nov 19 22:50:27 kapalua sshd\[15489\]: Failed password for mysql from 134.209.237.55 port 44552 ssh2
Nov 19 22:55:52 kapalua sshd\[15927\]: Invalid user sherwan from 134.209.237.55
Nov 19 22:55:52 kapalua sshd\[15927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.55
Nov 19 22:55:54 kapalua sshd\[15927\]: Failed password for invalid user sherwan from 134.209.237.55 port 38864 ssh2
2019-11-20 20:46:30
59.72.112.47 attackbots
2019-11-20T07:40:49.714658abusebot-5.cloudsearch.cf sshd\[6605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.112.47  user=root
2019-11-20 20:39:20
78.128.113.130 attackbots
Nov 20 13:36:19 dedicated sshd[27835]: Invalid user admin from 78.128.113.130 port 43296
2019-11-20 20:54:11
112.85.42.173 attackspam
Nov 20 01:50:45 linuxvps sshd\[965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Nov 20 01:50:47 linuxvps sshd\[965\]: Failed password for root from 112.85.42.173 port 61352 ssh2
Nov 20 01:51:01 linuxvps sshd\[965\]: Failed password for root from 112.85.42.173 port 61352 ssh2
Nov 20 01:51:05 linuxvps sshd\[1162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Nov 20 01:51:08 linuxvps sshd\[1162\]: Failed password for root from 112.85.42.173 port 18295 ssh2
2019-11-20 21:08:56
180.168.70.190 attack
Triggered by Fail2Ban at Ares web server
2019-11-20 21:15:10

最近上报的IP列表

185.164.225.29 32.184.19.144 220.50.141.77 139.178.87.85
74.7.221.252 100.2.224.148 72.103.154.150 81.53.93.196
81.245.139.74 47.116.86.101 193.159.231.59 2.205.13.136
177.239.218.235 45.172.192.153 103.120.209.25 184.16.212.249
129.213.32.126 78.25.249.101 195.22.9.60 223.11.45.51