必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.145.138.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.145.138.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:05:21 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 138.138.145.138.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 138.145.138.138.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.254.205.6 attack
Feb 16 15:16:56 game-panel sshd[4100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
Feb 16 15:16:58 game-panel sshd[4100]: Failed password for invalid user super from 51.254.205.6 port 56990 ssh2
Feb 16 15:19:26 game-panel sshd[4236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
2020-02-17 02:51:19
70.28.105.52 attackspam
Unauthorized connection attempt from IP address 70.28.105.52 on Port 445(SMB)
2020-02-17 02:58:01
185.53.88.125 attackspambots
185.53.88.125 was recorded 8 times by 8 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 8, 23, 207
2020-02-17 03:22:42
51.254.122.71 attackspambots
Feb 16 23:37:22 gw1 sshd[17962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.122.71
Feb 16 23:37:24 gw1 sshd[17962]: Failed password for invalid user git from 51.254.122.71 port 60798 ssh2
...
2020-02-17 02:56:59
62.122.103.86 attack
Feb 16 13:21:16 mail sshd\[22052\]: Invalid user attila from 62.122.103.86
Feb 16 13:21:16 mail sshd\[22052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.103.86
...
2020-02-17 03:06:50
185.103.246.192 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 02:44:41
61.54.2.103 attackspam
Unauthorised access (Feb 16) SRC=61.54.2.103 LEN=40 TTL=241 ID=29175 TCP DPT=1433 WINDOW=1024 SYN
2020-02-17 03:24:44
185.103.138.65 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 03:00:44
107.189.10.145 attack
Feb 16 18:41:41 localhost sshd\[9643\]: Invalid user thiago from 107.189.10.145 port 46670
Feb 16 18:41:41 localhost sshd\[9643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.145
Feb 16 18:41:43 localhost sshd\[9643\]: Failed password for invalid user thiago from 107.189.10.145 port 46670 ssh2
...
2020-02-17 02:48:19
43.231.61.197 attackbots
Unauthorized connection attempt from IP address 43.231.61.197 on Port 445(SMB)
2020-02-17 03:14:01
61.19.127.43 attack
Unauthorized connection attempt from IP address 61.19.127.43 on Port 445(SMB)
2020-02-17 02:46:00
154.117.181.78 attack
Feb 16 14:52:04 vbuntu sshd[21930]: refused connect from 154.117.181.78 (154.117.181.78)
Feb 16 14:52:06 vbuntu sshd[21931]: refused connect from 154.117.181.78 (154.117.181.78)
Feb 16 14:52:06 vbuntu sshd[21932]: refused connect from 154.117.181.78 (154.117.181.78)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=154.117.181.78
2020-02-17 03:14:18
222.186.15.166 attackbots
Feb 16 20:00:57 OPSO sshd\[29480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
Feb 16 20:00:59 OPSO sshd\[29480\]: Failed password for root from 222.186.15.166 port 15335 ssh2
Feb 16 20:01:01 OPSO sshd\[29480\]: Failed password for root from 222.186.15.166 port 15335 ssh2
Feb 16 20:01:03 OPSO sshd\[29480\]: Failed password for root from 222.186.15.166 port 15335 ssh2
Feb 16 20:01:32 OPSO sshd\[29520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
2020-02-17 03:11:21
192.99.56.117 attackspam
Feb 16 19:31:49 dcd-gentoo sshd[19337]: Invalid user ubuntu from 192.99.56.117 port 59186
Feb 16 19:35:51 dcd-gentoo sshd[19472]: Invalid user admin from 192.99.56.117 port 60966
Feb 16 19:39:49 dcd-gentoo sshd[19612]: User postgres from 192.99.56.117 not allowed because none of user's groups are listed in AllowGroups
...
2020-02-17 02:52:17
86.82.165.230 attackbots
Lines containing failures of 86.82.165.230
Feb 12 04:48:03 nextcloud sshd[19919]: Invalid user aquser from 86.82.165.230 port 48868
Feb 12 04:48:03 nextcloud sshd[19919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.82.165.230
Feb 12 04:48:05 nextcloud sshd[19919]: Failed password for invalid user aquser from 86.82.165.230 port 48868 ssh2
Feb 12 04:48:05 nextcloud sshd[19919]: Received disconnect from 86.82.165.230 port 48868:11: Bye Bye [preauth]
Feb 12 04:48:05 nextcloud sshd[19919]: Disconnected from invalid user aquser 86.82.165.230 port 48868 [preauth]
Feb 12 05:15:14 nextcloud sshd[22220]: Invalid user ts3 from 86.82.165.230 port 60306
Feb 12 05:15:14 nextcloud sshd[22220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.82.165.230
Feb 12 05:15:16 nextcloud sshd[22220]: Failed password for invalid user ts3 from 86.82.165.230 port 60306 ssh2
Feb 12 05:15:16 nextcloud sshd[22220]........
------------------------------
2020-02-17 03:12:20

最近上报的IP列表

152.150.125.68 145.73.197.237 33.184.134.5 31.204.112.124
32.239.223.233 168.215.12.22 66.65.83.38 184.232.25.5
157.73.93.11 32.137.167.101 167.18.249.211 211.141.235.82
178.130.39.226 74.220.139.152 103.213.5.174 198.167.98.153
33.127.120.214 78.229.154.76 147.25.68.228 135.246.151.108