必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.127.136.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.127.136.142.		IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:38:52 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 142.136.127.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.136.127.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.252.255.5 attackspambots
Jul 27 23:28:10 game-panel sshd[16908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.252.255.5
Jul 27 23:28:12 game-panel sshd[16908]: Failed password for invalid user mengxue from 87.252.255.5 port 46538 ssh2
Jul 27 23:33:02 game-panel sshd[17078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.252.255.5
2020-07-28 07:35:14
27.254.130.67 attackbots
Invalid user chenhaibao from 27.254.130.67 port 59326
2020-07-28 07:17:24
5.180.220.106 attackbotsspam
[2020-07-27 19:15:01] NOTICE[1248][C-00000f57] chan_sip.c: Call from '' (5.180.220.106:64006) to extension '9011972595725668' rejected because extension not found in context 'public'.
[2020-07-27 19:15:01] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-27T19:15:01.666-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011972595725668",SessionID="0x7f2720091a88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.180.220.106/64006",ACLName="no_extension_match"
[2020-07-27 19:21:02] NOTICE[1248][C-00000f59] chan_sip.c: Call from '' (5.180.220.106:59156) to extension '0011972595725668' rejected because extension not found in context 'public'.
[2020-07-27 19:21:02] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-27T19:21:02.768-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0011972595725668",SessionID="0x7f2720091a88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/
...
2020-07-28 07:30:20
177.139.136.73 attackbots
Jul 27 22:36:52 ws26vmsma01 sshd[41633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.136.73
Jul 27 22:36:54 ws26vmsma01 sshd[41633]: Failed password for invalid user sunjingge from 177.139.136.73 port 34168 ssh2
...
2020-07-28 07:49:05
122.51.180.34 attackspam
2020-07-27T19:32:06.021997devel sshd[13022]: Invalid user yangji from 122.51.180.34 port 59466
2020-07-27T19:32:08.176001devel sshd[13022]: Failed password for invalid user yangji from 122.51.180.34 port 59466 ssh2
2020-07-27T19:40:07.425762devel sshd[13659]: Invalid user kevinm from 122.51.180.34 port 58194
2020-07-28 07:40:50
37.187.75.16 attackspam
37.187.75.16 - - [28/Jul/2020:00:01:34 +0100] "POST /wp-login.php HTTP/1.1" 200 5792 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.187.75.16 - - [28/Jul/2020:00:03:37 +0100] "POST /wp-login.php HTTP/1.1" 200 5792 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.187.75.16 - - [28/Jul/2020:00:05:39 +0100] "POST /wp-login.php HTTP/1.1" 200 5792 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-28 07:15:02
218.0.60.235 attackspambots
(sshd) Failed SSH login from 218.0.60.235 (CN/China/235.60.0.218.broad.jx.zj.dynamic.163data.com.cn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 28 00:59:40 amsweb01 sshd[28093]: Invalid user tflaisch from 218.0.60.235 port 47214
Jul 28 00:59:42 amsweb01 sshd[28093]: Failed password for invalid user tflaisch from 218.0.60.235 port 47214 ssh2
Jul 28 01:13:30 amsweb01 sshd[30222]: Invalid user yuewang from 218.0.60.235 port 47894
Jul 28 01:13:32 amsweb01 sshd[30222]: Failed password for invalid user yuewang from 218.0.60.235 port 47894 ssh2
Jul 28 01:16:54 amsweb01 sshd[30690]: Invalid user yuxin from 218.0.60.235 port 39130
2020-07-28 07:21:20
162.243.170.252 attackbotsspam
Jul 28 01:09:56 piServer sshd[12703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.170.252 
Jul 28 01:09:57 piServer sshd[12703]: Failed password for invalid user houy from 162.243.170.252 port 40972 ssh2
Jul 28 01:13:10 piServer sshd[13122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.170.252 
...
2020-07-28 07:18:14
13.233.121.125 attack
Jul 28 00:30:22 abendstille sshd\[18443\]: Invalid user bloopark from 13.233.121.125
Jul 28 00:30:22 abendstille sshd\[18443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.233.121.125
Jul 28 00:30:24 abendstille sshd\[18443\]: Failed password for invalid user bloopark from 13.233.121.125 port 39646 ssh2
Jul 28 00:36:06 abendstille sshd\[24253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.233.121.125  user=root
Jul 28 00:36:08 abendstille sshd\[24253\]: Failed password for root from 13.233.121.125 port 52884 ssh2
...
2020-07-28 07:20:48
111.231.62.191 attackspambots
SSH Invalid Login
2020-07-28 07:34:44
45.90.222.242 attack
malware in spoof invoice attachment Received: from [45.90.222.242] (port=60748 helo=tzwengge.com) (envelope-from )
2020-07-28 07:33:19
113.134.211.242 attack
Jul 27 23:25:18 vps sshd[419702]: Failed password for invalid user aflueg from 113.134.211.242 port 42086 ssh2
Jul 27 23:29:23 vps sshd[435491]: Invalid user wangwentao from 113.134.211.242 port 50082
Jul 27 23:29:23 vps sshd[435491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.242
Jul 27 23:29:25 vps sshd[435491]: Failed password for invalid user wangwentao from 113.134.211.242 port 50082 ssh2
Jul 27 23:33:44 vps sshd[456556]: Invalid user zhai from 113.134.211.242 port 58082
...
2020-07-28 07:25:55
123.204.90.17 attackbotsspam
Port 22 Scan, PTR: None
2020-07-28 07:44:25
178.136.235.119 attack
Jul 27 22:24:38 jumpserver sshd[272910]: Invalid user hp from 178.136.235.119 port 59849
Jul 27 22:24:40 jumpserver sshd[272910]: Failed password for invalid user hp from 178.136.235.119 port 59849 ssh2
Jul 27 22:30:22 jumpserver sshd[273018]: Invalid user zhjnexus from 178.136.235.119 port 60986
...
2020-07-28 07:15:48
183.165.28.71 attackbotsspam
Jul 27 23:01:51 *** sshd[32726]: Invalid user hiwi from 183.165.28.71
2020-07-28 07:14:18

最近上报的IP列表

104.22.46.112 104.22.46.115 104.22.46.118 104.22.46.123
104.22.46.134 182.176.181.241 104.22.46.157 104.22.46.158
104.22.46.160 104.22.46.191 104.22.46.192 104.22.46.209
104.22.46.220 104.22.46.240 104.22.46.241 64.202.103.27
104.22.46.245 104.22.46.73 104.22.46.78 104.22.46.93