必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.13.136.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.13.136.149.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:12:47 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.136.13.138.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 138.13.136.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.35.129.125 attackbots
2020-08-29T14:17:32.345461shield sshd\[15781\]: Invalid user test from 187.35.129.125 port 55056
2020-08-29T14:17:32.499443shield sshd\[15781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.129.125
2020-08-29T14:17:34.468628shield sshd\[15781\]: Failed password for invalid user test from 187.35.129.125 port 55056 ssh2
2020-08-29T14:21:24.585971shield sshd\[16370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.129.125  user=root
2020-08-29T14:21:26.404842shield sshd\[16370\]: Failed password for root from 187.35.129.125 port 50304 ssh2
2020-08-30 02:15:00
103.123.8.75 attackbotsspam
Aug 29 14:05:56 kh-dev-server sshd[12274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75
...
2020-08-30 02:06:06
185.142.236.35 attack
Hacking
2020-08-30 02:19:53
119.200.186.168 attackspam
(sshd) Failed SSH login from 119.200.186.168 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 29 13:53:17 amsweb01 sshd[9877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.200.186.168  user=root
Aug 29 13:53:18 amsweb01 sshd[9877]: Failed password for root from 119.200.186.168 port 34158 ssh2
Aug 29 14:01:46 amsweb01 sshd[11295]: Invalid user robert from 119.200.186.168 port 56388
Aug 29 14:01:48 amsweb01 sshd[11295]: Failed password for invalid user robert from 119.200.186.168 port 56388 ssh2
Aug 29 14:05:53 amsweb01 sshd[11923]: Invalid user lynda from 119.200.186.168 port 35134
2020-08-30 02:05:40
109.238.14.74 attackspambots
 UDP 109.238.14.74:5078 -> port 5061, len 442
2020-08-30 02:00:14
51.75.66.142 attack
Aug 29 12:33:17 plex-server sshd[381285]: Invalid user q3server from 51.75.66.142 port 34144
Aug 29 12:33:17 plex-server sshd[381285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142 
Aug 29 12:33:17 plex-server sshd[381285]: Invalid user q3server from 51.75.66.142 port 34144
Aug 29 12:33:19 plex-server sshd[381285]: Failed password for invalid user q3server from 51.75.66.142 port 34144 ssh2
Aug 29 12:37:20 plex-server sshd[383089]: Invalid user caro from 51.75.66.142 port 42208
...
2020-08-30 02:14:40
222.186.3.249 attackbots
Aug 29 20:16:30 minden010 sshd[27667]: Failed password for root from 222.186.3.249 port 35344 ssh2
Aug 29 20:16:32 minden010 sshd[27667]: Failed password for root from 222.186.3.249 port 35344 ssh2
Aug 29 20:16:35 minden010 sshd[27667]: Failed password for root from 222.186.3.249 port 35344 ssh2
...
2020-08-30 02:31:11
47.99.35.235 attack
SSH brutforce
2020-08-30 01:51:57
144.217.92.167 attack
Aug 29 17:38:49 h1745522 sshd[17735]: Invalid user frappe from 144.217.92.167 port 57256
Aug 29 17:38:49 h1745522 sshd[17735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.92.167
Aug 29 17:38:49 h1745522 sshd[17735]: Invalid user frappe from 144.217.92.167 port 57256
Aug 29 17:38:51 h1745522 sshd[17735]: Failed password for invalid user frappe from 144.217.92.167 port 57256 ssh2
Aug 29 17:42:38 h1745522 sshd[18184]: Invalid user vftp from 144.217.92.167 port 35354
Aug 29 17:42:38 h1745522 sshd[18184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.92.167
Aug 29 17:42:38 h1745522 sshd[18184]: Invalid user vftp from 144.217.92.167 port 35354
Aug 29 17:42:40 h1745522 sshd[18184]: Failed password for invalid user vftp from 144.217.92.167 port 35354 ssh2
Aug 29 17:46:29 h1745522 sshd[18657]: Invalid user int from 144.217.92.167 port 41686
...
2020-08-30 02:31:50
192.99.2.41 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-08-30 02:13:19
124.156.64.88 attackbotsspam
Port Scan/VNC login attempt
...
2020-08-30 01:58:00
183.88.172.27 attackspambots
1598702776 - 08/29/2020 14:06:16 Host: 183.88.172.27/183.88.172.27 Port: 445 TCP Blocked
2020-08-30 01:47:36
140.143.228.227 attackbots
Aug 29 14:23:18 vps647732 sshd[30514]: Failed password for root from 140.143.228.227 port 58430 ssh2
...
2020-08-30 02:13:51
192.241.230.223 attack
Web application attack detected by fail2ban
2020-08-30 02:03:12
87.189.118.158 attackspambots
2020-08-29T12:05:55.895634server.espacesoutien.com sshd[29565]: Invalid user osboxes from 87.189.118.158 port 41699
2020-08-29T12:05:57.491637server.espacesoutien.com sshd[29565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.189.118.158
2020-08-29T12:05:55.895634server.espacesoutien.com sshd[29565]: Invalid user osboxes from 87.189.118.158 port 41699
2020-08-29T12:05:59.281004server.espacesoutien.com sshd[29565]: Failed password for invalid user osboxes from 87.189.118.158 port 41699 ssh2
...
2020-08-30 02:02:44

最近上报的IP列表

10.22.95.129 214.205.217.167 128.238.191.205 128.246.185.103
213.174.129.226 161.99.216.86 167.245.73.18 27.75.178.21
253.253.163.203 11.231.170.116 119.84.121.81 9.54.238.80
239.15.214.21 128.28.133.60 163.174.91.123 0.2.31.98
236.240.66.85 108.182.193.37 204.180.148.85 15.211.175.126