必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.140.187.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.140.187.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031601 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 17 04:07:47 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 94.187.140.138.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 138.140.187.94.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.75.5.180 attack
Jun 17 22:58:23 dignus sshd[31572]: Invalid user administrator from 106.75.5.180 port 53608
Jun 17 22:58:23 dignus sshd[31572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.5.180
Jun 17 22:58:24 dignus sshd[31572]: Failed password for invalid user administrator from 106.75.5.180 port 53608 ssh2
Jun 17 23:02:45 dignus sshd[31992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.5.180  user=root
Jun 17 23:02:46 dignus sshd[31992]: Failed password for root from 106.75.5.180 port 44202 ssh2
...
2020-06-18 19:05:34
103.79.143.228 attackbotsspam
Unauthorized connection attempt from IP address 103.79.143.228 on Port 3389(RDP)
2020-06-18 18:43:46
183.134.90.250 attackspambots
2020-06-18T10:36:07.784999mail.csmailer.org sshd[12669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.90.250
2020-06-18T10:36:07.779395mail.csmailer.org sshd[12669]: Invalid user scheduler from 183.134.90.250 port 60316
2020-06-18T10:36:10.126797mail.csmailer.org sshd[12669]: Failed password for invalid user scheduler from 183.134.90.250 port 60316 ssh2
2020-06-18T10:39:45.122641mail.csmailer.org sshd[13257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.90.250  user=root
2020-06-18T10:39:47.393897mail.csmailer.org sshd[13257]: Failed password for root from 183.134.90.250 port 48428 ssh2
...
2020-06-18 18:51:09
111.231.33.135 attackspam
Invalid user production from 111.231.33.135 port 46042
2020-06-18 18:58:33
200.155.158.126 attack
Invalid user n from 200.155.158.126 port 34301
2020-06-18 19:12:13
46.101.174.188 attackbots
Invalid user bitbucket from 46.101.174.188 port 43282
2020-06-18 18:50:54
37.187.22.227 attackspam
Invalid user sftp from 37.187.22.227 port 38530
2020-06-18 18:47:05
5.39.95.38 attackspambots
Invalid user deployer from 5.39.95.38 port 42242
2020-06-18 19:11:54
49.235.163.198 attack
Jun 18 12:17:49 host sshd[27901]: Invalid user mail1 from 49.235.163.198 port 45312
...
2020-06-18 18:59:54
49.235.216.107 attackspam
2020-06-17 UTC: (148x) - admin(2x),admin1,amir,andrey,artin,ashley,asus,bao,beam,bill,bitbucket,bobi,business,bx,cmsadmin,dana,dev,dkp,dolphin,dpc,dwf,eco,ema,emu,epg,eric,etherpad,ewg,fabian,football,freedom,ftp,git,globe,gogs,gv,ignacio,isp,jessie,jetty,jiangtao,jmd,joel,johannes,john,jordan,josh,jtd,juanita,kd,kirk(2x),kll,kross,kuber,leela,lgi,ljl,marissa,masha,mc,music,mysql,name,nba,nelson,newadmin,nexus,nfs,nitin,node,oracle,paco,phim18h,platform,postgres(2x),prueba1,ram,raquel,report,rise,rona,root(35x),salvatore,sandeep,saroj,seneca,service,shing,shreya1,smb,soi,sonar,swc,system,team4,test10,test123,training,ts3,ubuntu(3x),user(2x),veronica,vlado,vnc,willy,wm,wpadmin,zxincsap
2020-06-18 18:57:51
139.59.7.105 attack
$f2bV_matches
2020-06-18 18:51:31
133.130.97.166 attack
Jun 18 12:39:16 lukav-desktop sshd\[22453\]: Invalid user academy from 133.130.97.166
Jun 18 12:39:16 lukav-desktop sshd\[22453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.97.166
Jun 18 12:39:18 lukav-desktop sshd\[22453\]: Failed password for invalid user academy from 133.130.97.166 port 57714 ssh2
Jun 18 12:42:39 lukav-desktop sshd\[22518\]: Invalid user kristina from 133.130.97.166
Jun 18 12:42:39 lukav-desktop sshd\[22518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.97.166
2020-06-18 18:42:54
52.141.32.160 attackspam
Jun 18 13:18:25 lukav-desktop sshd\[931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.141.32.160  user=root
Jun 18 13:18:26 lukav-desktop sshd\[931\]: Failed password for root from 52.141.32.160 port 41336 ssh2
Jun 18 13:21:22 lukav-desktop sshd\[975\]: Invalid user wmz from 52.141.32.160
Jun 18 13:21:22 lukav-desktop sshd\[975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.141.32.160
Jun 18 13:21:24 lukav-desktop sshd\[975\]: Failed password for invalid user wmz from 52.141.32.160 port 46352 ssh2
2020-06-18 18:50:34
129.204.115.246 attackbotsspam
Jun 18 05:48:37 mail sshd[24303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.115.246
Jun 18 05:48:39 mail sshd[24303]: Failed password for invalid user sebastian from 129.204.115.246 port 48748 ssh2
...
2020-06-18 18:43:16
123.58.251.38 attack
Brute-force attempt banned
2020-06-18 18:59:42

最近上报的IP列表

33.154.227.198 114.180.106.126 158.101.67.149 226.196.177.8
120.159.231.180 71.24.58.131 52.22.11.42 117.77.188.228
143.245.66.86 138.192.152.243 143.78.2.93 93.190.25.235
20.175.255.209 43.22.100.128 82.36.23.141 95.199.181.148
202.118.212.44 138.211.53.205 178.194.7.163 65.188.86.174