必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.128.187.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.128.187.242.		IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:28:46 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
242.187.128.138.in-addr.arpa domain name pointer server.ashtelstudios.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.187.128.138.in-addr.arpa	name = server.ashtelstudios.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.226.2 attackspam
Aug  5 01:04:23 lukav-desktop sshd\[13098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
Aug  5 01:04:26 lukav-desktop sshd\[13098\]: Failed password for root from 178.128.226.2 port 43711 ssh2
Aug  5 01:07:33 lukav-desktop sshd\[19572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
Aug  5 01:07:36 lukav-desktop sshd\[19572\]: Failed password for root from 178.128.226.2 port 43329 ssh2
Aug  5 01:10:52 lukav-desktop sshd\[25600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-08-05 06:13:50
117.33.137.19 attackspam
Aug  4 22:14:58 abendstille sshd\[15961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.137.19  user=root
Aug  4 22:15:01 abendstille sshd\[15961\]: Failed password for root from 117.33.137.19 port 36241 ssh2
Aug  4 22:17:54 abendstille sshd\[18605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.137.19  user=root
Aug  4 22:17:57 abendstille sshd\[18605\]: Failed password for root from 117.33.137.19 port 55386 ssh2
Aug  4 22:20:45 abendstille sshd\[21549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.137.19  user=root
...
2020-08-05 06:12:00
1.34.200.167 attackspam
Port probing on unauthorized port 9530
2020-08-05 06:13:34
218.92.0.203 attack
2020-08-04T23:48:15.811895vps751288.ovh.net sshd\[26465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-08-04T23:48:17.600785vps751288.ovh.net sshd\[26465\]: Failed password for root from 218.92.0.203 port 41634 ssh2
2020-08-04T23:48:20.278356vps751288.ovh.net sshd\[26465\]: Failed password for root from 218.92.0.203 port 41634 ssh2
2020-08-04T23:48:22.368866vps751288.ovh.net sshd\[26465\]: Failed password for root from 218.92.0.203 port 41634 ssh2
2020-08-04T23:53:14.859665vps751288.ovh.net sshd\[26537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-08-05 06:26:37
37.187.104.135 attack
2020-08-05T00:26:10.239845n23.at sshd[2578372]: Failed password for root from 37.187.104.135 port 37918 ssh2
2020-08-05T00:29:46.386622n23.at sshd[2580683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.104.135  user=root
2020-08-05T00:29:48.145321n23.at sshd[2580683]: Failed password for root from 37.187.104.135 port 49072 ssh2
...
2020-08-05 06:36:52
222.186.175.216 attackspam
Aug  4 22:24:17 marvibiene sshd[4376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Aug  4 22:24:19 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
Aug  4 22:24:23 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
Aug  4 22:24:17 marvibiene sshd[4376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Aug  4 22:24:19 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
Aug  4 22:24:23 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
2020-08-05 06:27:27
45.236.128.93 attackspambots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-08-05 06:21:40
112.85.42.104 attackbotsspam
nginx/honey/a4a6f
2020-08-05 06:01:55
40.121.34.50 attackbotsspam
[Tue Aug 04 13:13:55 2020] - Syn Flood From IP: 40.121.34.50 Port: 80
2020-08-05 06:10:49
125.141.139.9 attackbots
Aug  4 22:19:17 onepixel sshd[1409840]: Failed password for root from 125.141.139.9 port 46868 ssh2
Aug  4 22:20:58 onepixel sshd[1410709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.9  user=root
Aug  4 22:21:00 onepixel sshd[1410709]: Failed password for root from 125.141.139.9 port 41268 ssh2
Aug  4 22:22:48 onepixel sshd[1411614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.9  user=root
Aug  4 22:22:49 onepixel sshd[1411614]: Failed password for root from 125.141.139.9 port 35654 ssh2
2020-08-05 06:30:25
124.251.110.164 attackbotsspam
Bruteforce detected by fail2ban
2020-08-05 06:22:55
46.101.151.97 attackbotsspam
Aug  4 16:54:49 ws19vmsma01 sshd[61757]: Failed password for root from 46.101.151.97 port 39284 ssh2
Aug  4 17:47:39 ws19vmsma01 sshd[68912]: Failed password for root from 46.101.151.97 port 42689 ssh2
...
2020-08-05 06:38:34
106.12.204.174 attack
106.12.204.174 - - [04/Aug/2020:21:58:16 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
106.12.204.174 - - [04/Aug/2020:21:58:17 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
106.12.204.174 - - [04/Aug/2020:22:13:16 +0100] "POST /wp-login.php HTTP/1.1" 200 1949 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-05 06:23:13
159.89.114.40 attack
2020-08-05T03:59:28.592153billing sshd[3858]: Failed password for root from 159.89.114.40 port 38756 ssh2
2020-08-05T04:03:20.215908billing sshd[10966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.114.40  user=root
2020-08-05T04:03:22.361218billing sshd[10966]: Failed password for root from 159.89.114.40 port 50206 ssh2
...
2020-08-05 06:10:17
36.67.106.109 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-05 06:06:14

最近上报的IP列表

138.128.240.187 138.128.244.208 138.128.188.66 138.128.59.186
138.185.190.53 138.185.8.194 138.185.181.174 138.185.244.194
138.186.138.223 138.186.104.31 138.186.9.53 138.185.224.96
138.128.59.224 138.186.178.62 138.19.84.75 104.22.28.228
138.19.93.177 138.197.109.140 138.197.108.45 138.197.101.255