必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.145.213.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.145.213.69.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 16:07:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 69.213.145.138.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.213.145.138.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.219.10.74 attack
RDP Bruteforce
2020-09-17 06:56:04
138.68.238.155 attackspambots
138.68.238.155 - - [16/Sep/2020:17:59:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.238.155 - - [16/Sep/2020:18:00:01 +0100] "POST /wp-login.php HTTP/1.1" 200 1779 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.238.155 - - [16/Sep/2020:18:00:02 +0100] "POST /wp-login.php HTTP/1.1" 200 1781 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-17 07:08:03
159.65.154.48 attackspam
SSH Invalid Login
2020-09-17 06:52:18
185.56.216.36 attack
DATE:2020-09-16 18:58:23, IP:185.56.216.36, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-17 07:06:49
31.207.89.79 attackspambots
2020-09-17T00:45:36.493322ks3355764 sshd[15497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.207.89.79  user=root
2020-09-17T00:45:38.258275ks3355764 sshd[15497]: Failed password for root from 31.207.89.79 port 38426 ssh2
...
2020-09-17 07:02:33
46.46.85.97 attack
RDP Bruteforce
2020-09-17 06:44:53
103.79.221.146 attack
Lines containing failures of 103.79.221.146
Sep 15 22:08:18 nbi-636 sshd[3785]: User r.r from 103.79.221.146 not allowed because not listed in AllowUsers
Sep 15 22:08:18 nbi-636 sshd[3785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.221.146  user=r.r
Sep 15 22:08:21 nbi-636 sshd[3785]: Failed password for invalid user r.r from 103.79.221.146 port 48542 ssh2
Sep 15 22:08:23 nbi-636 sshd[3785]: Received disconnect from 103.79.221.146 port 48542:11: Bye Bye [preauth]
Sep 15 22:08:23 nbi-636 sshd[3785]: Disconnected from invalid user r.r 103.79.221.146 port 48542 [preauth]
Sep 15 22:18:44 nbi-636 sshd[6090]: Invalid user RPM from 103.79.221.146 port 44170
Sep 15 22:18:44 nbi-636 sshd[6090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.221.146 
Sep 15 22:18:46 nbi-636 sshd[6090]: Failed password for invalid user RPM from 103.79.221.146 port 44170 ssh2
Sep 15 22:18:48 nbi-636 ........
------------------------------
2020-09-17 07:13:19
181.177.231.27 attackbotsspam
2020-09-17T01:14:57.835492mail.broermann.family sshd[31026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.angeplast.com
2020-09-17T01:14:57.831304mail.broermann.family sshd[31026]: Invalid user broermann from 181.177.231.27 port 48396
2020-09-17T01:14:59.690860mail.broermann.family sshd[31026]: Failed password for invalid user broermann from 181.177.231.27 port 48396 ssh2
2020-09-17T01:15:01.244683mail.broermann.family sshd[31028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.angeplast.com  user=mail
2020-09-17T01:15:03.648237mail.broermann.family sshd[31028]: Failed password for mail from 181.177.231.27 port 48883 ssh2
...
2020-09-17 07:15:42
40.71.195.56 attack
firewall-block, port(s): 8022/tcp
2020-09-17 07:13:37
63.224.68.92 attack
RDP Bruteforce
2020-09-17 06:57:26
207.180.205.252 attackbotsspam
Sep 16 23:49:14 mx sshd[731960]: Invalid user zxin10 from 207.180.205.252 port 57358
Sep 16 23:49:14 mx sshd[731960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.205.252 
Sep 16 23:49:14 mx sshd[731960]: Invalid user zxin10 from 207.180.205.252 port 57358
Sep 16 23:49:16 mx sshd[731960]: Failed password for invalid user zxin10 from 207.180.205.252 port 57358 ssh2
Sep 16 23:49:33 mx sshd[731962]: Invalid user zyl from 207.180.205.252 port 44746
...
2020-09-17 07:13:57
186.154.37.55 attackbots
Listed on    zen-spamhaus also abuseat.org and dnsbl-sorbs   / proto=6  .  srcport=54261  .  dstport=23  .     (1112)
2020-09-17 07:22:42
37.19.115.92 attack
RDP Bruteforce
2020-09-17 06:47:22
54.222.193.235 attack
RDP Bruteforce
2020-09-17 06:57:48
103.248.211.146 attack
Repeated RDP login failures. Last user: Administracion
2020-09-17 06:54:34

最近上报的IP列表

81.183.179.120 214.237.144.188 177.116.34.218 251.195.206.63
240.96.138.74 62.79.215.91 19.114.241.73 153.251.178.84
229.58.237.252 239.106.242.80 124.79.186.4 232.149.9.206
236.249.91.72 85.117.249.149 5.107.182.35 44.49.102.230
100.171.220.33 230.32.72.192 208.253.237.4 141.247.57.165