必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.14.67.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.14.67.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 12:01:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 116.67.14.138.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 138.14.67.116.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.105.127.247 attackbotsspam
Unauthorised access (Jul 26) SRC=85.105.127.247 LEN=44 TTL=49 ID=5394 TCP DPT=23 WINDOW=42148 SYN
2019-07-27 04:40:20
187.248.55.10 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-26 18:58:30,898 INFO [amun_request_handler] PortScan Detected on Port: 445 (187.248.55.10)
2019-07-27 04:29:30
91.121.7.107 attack
Jul 26 23:25:42 yabzik sshd[24261]: Failed password for root from 91.121.7.107 port 47166 ssh2
Jul 26 23:29:52 yabzik sshd[25351]: Failed password for root from 91.121.7.107 port 42100 ssh2
2019-07-27 04:39:54
51.77.220.183 attack
Jul 26 21:49:14 tux-35-217 sshd\[9489\]: Invalid user wewU\*98kH from 51.77.220.183 port 45348
Jul 26 21:49:14 tux-35-217 sshd\[9489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183
Jul 26 21:49:16 tux-35-217 sshd\[9489\]: Failed password for invalid user wewU\*98kH from 51.77.220.183 port 45348 ssh2
Jul 26 21:53:19 tux-35-217 sshd\[9508\]: Invalid user 1234567890 from 51.77.220.183 port 40566
Jul 26 21:53:19 tux-35-217 sshd\[9508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183
...
2019-07-27 04:02:19
137.74.152.138 attack
26.07.2019 20:10:35 SSH access blocked by firewall
2019-07-27 04:10:57
180.93.165.31 attackbots
Unauthorised access (Jul 26) SRC=180.93.165.31 LEN=44 PREC=0x20 TTL=49 ID=15926 TCP DPT=23 WINDOW=24741 SYN
2019-07-27 04:33:44
165.90.21.49 attackbotsspam
Jul 26 19:47:06 MK-Soft-VM3 sshd\[28053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.90.21.49  user=root
Jul 26 19:47:09 MK-Soft-VM3 sshd\[28053\]: Failed password for root from 165.90.21.49 port 4720 ssh2
Jul 26 19:53:14 MK-Soft-VM3 sshd\[28396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.90.21.49  user=root
...
2019-07-27 04:05:41
216.221.79.110 attack
Jul 26 23:30:10 server sshd\[6782\]: User root from 216.221.79.110 not allowed because listed in DenyUsers
Jul 26 23:30:10 server sshd\[6782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.221.79.110  user=root
Jul 26 23:30:12 server sshd\[6782\]: Failed password for invalid user root from 216.221.79.110 port 60794 ssh2
Jul 26 23:34:27 server sshd\[11753\]: User root from 216.221.79.110 not allowed because listed in DenyUsers
Jul 26 23:34:27 server sshd\[11753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.221.79.110  user=root
2019-07-27 04:37:40
213.152.161.74 attackspam
Bruteforce on SSH Honeypot
2019-07-27 04:09:32
153.36.242.143 attackspam
2019-07-26T21:54:50.153188stark.klein-stark.info sshd\[14985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-07-26T21:54:52.700974stark.klein-stark.info sshd\[14985\]: Failed password for root from 153.36.242.143 port 20372 ssh2
2019-07-26T21:54:55.377175stark.klein-stark.info sshd\[14985\]: Failed password for root from 153.36.242.143 port 20372 ssh2
...
2019-07-27 04:24:40
200.107.241.50 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-26 19:01:53,565 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.107.241.50)
2019-07-27 03:59:59
189.163.201.144 attackbotsspam
Jul 26 21:33:55 mail sshd[25888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.163.201.144  user=root
Jul 26 21:33:57 mail sshd[25888]: Failed password for root from 189.163.201.144 port 13607 ssh2
Jul 26 21:48:07 mail sshd[27775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.163.201.144  user=root
Jul 26 21:48:09 mail sshd[27775]: Failed password for root from 189.163.201.144 port 15663 ssh2
Jul 26 21:52:51 mail sshd[28246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.163.201.144  user=root
Jul 26 21:52:53 mail sshd[28246]: Failed password for root from 189.163.201.144 port 11864 ssh2
...
2019-07-27 04:23:09
80.208.234.150 attack
Jul 26 12:31:27 mail sshd[11812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.208.234.150  user=r.r
Jul 26 12:31:29 mail sshd[11812]: Failed password for r.r from 80.208.234.150 port 54300 ssh2
Jul 26 12:31:29 mail sshd[11812]: Received disconnect from 80.208.234.150: 11: Bye Bye [preauth]
Jul 26 12:46:09 mail sshd[14325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.208.234.150  user=r.r
Jul 26 12:46:11 mail sshd[14325]: Failed password for r.r from 80.208.234.150 port 47112 ssh2
Jul 26 12:46:11 mail sshd[14325]: Received disconnect from 80.208.234.150: 11: Bye Bye [preauth]
Jul 26 12:50:22 mail sshd[14990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.208.234.150  user=r.r
Jul 26 12:50:23 mail sshd[14990]: Failed password for r.r from 80.208.234.150 port 43040 ssh2
Jul 26 12:50:23 mail sshd[14990]: Received disconnect from 80.208.2........
-------------------------------
2019-07-27 04:13:36
158.69.25.36 attackspam
Jul 26 21:29:45 Ubuntu-1404-trusty-64-minimal sshd\[1754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.25.36  user=root
Jul 26 21:29:48 Ubuntu-1404-trusty-64-minimal sshd\[1754\]: Failed password for root from 158.69.25.36 port 46222 ssh2
Jul 26 21:49:06 Ubuntu-1404-trusty-64-minimal sshd\[12375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.25.36  user=root
Jul 26 21:49:09 Ubuntu-1404-trusty-64-minimal sshd\[12375\]: Failed password for root from 158.69.25.36 port 44350 ssh2
Jul 26 21:53:12 Ubuntu-1404-trusty-64-minimal sshd\[16102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.25.36  user=root
2019-07-27 04:07:48
103.23.100.217 attack
Jul 26 21:21:11 icinga sshd[12181]: Failed password for root from 103.23.100.217 port 60056 ssh2
...
2019-07-27 04:03:07

最近上报的IP列表

25.3.7.184 31.139.14.247 64.185.129.24 138.112.181.187
204.142.35.1 32.134.247.91 19.90.167.166 67.229.252.175
198.15.168.7 230.226.90.215 78.170.193.107 57.52.82.74
210.121.36.160 48.190.74.229 123.12.117.188 13.125.92.156
239.152.25.109 140.15.29.223 159.173.78.127 168.97.16.104