必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.150.77.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.150.77.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:34:23 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 3.77.150.138.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 138.150.77.3.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.175.230.209 attack
2020-08-16T19:15:37.975855hostname sshd[30962]: Invalid user administrador from 134.175.230.209 port 38988
2020-08-16T19:15:40.933685hostname sshd[30962]: Failed password for invalid user administrador from 134.175.230.209 port 38988 ssh2
2020-08-16T19:20:18.406332hostname sshd[31585]: Invalid user cloud from 134.175.230.209 port 39102
...
2020-08-17 02:29:09
170.253.0.134 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-17 02:10:45
41.232.89.231 attack
Telnet Server BruteForce Attack
2020-08-17 02:15:58
106.13.44.100 attackspam
2020-08-16T19:56:53.381818ns386461 sshd\[17192\]: Invalid user hacker from 106.13.44.100 port 43304
2020-08-16T19:56:53.386682ns386461 sshd\[17192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100
2020-08-16T19:56:55.334548ns386461 sshd\[17192\]: Failed password for invalid user hacker from 106.13.44.100 port 43304 ssh2
2020-08-16T20:09:03.077891ns386461 sshd\[29015\]: Invalid user li from 106.13.44.100 port 47124
2020-08-16T20:09:03.081999ns386461 sshd\[29015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100
...
2020-08-17 02:18:05
68.183.111.135 attackbotsspam
68.183.111.135 - - [16/Aug/2020:18:15:31 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.111.135 - - [16/Aug/2020:18:15:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1970 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.111.135 - - [16/Aug/2020:18:15:34 +0100] "POST /wp-login.php HTTP/1.1" 200 1973 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-17 02:08:39
135.23.251.14 attack
Aug 16 14:04:33 www sshd[19414]: Invalid user admin from 135.23.251.14
Aug 16 14:04:36 www sshd[19414]: Failed password for invalid user admin from 135.23.251.14 port 35383 ssh2
Aug 16 14:04:37 www sshd[19416]: Invalid user admin from 135.23.251.14
Aug 16 14:04:38 www sshd[19416]: Failed password for invalid user admin from 135.23.251.14 port 35463 ssh2
Aug 16 14:04:39 www sshd[19420]: Invalid user admin from 135.23.251.14
Aug 16 14:04:41 www sshd[19420]: Failed password for invalid user admin from 135.23.251.14 port 35540 ssh2
Aug 16 14:04:42 www sshd[19422]: Invalid user admin from 135.23.251.14
Aug 16 14:04:44 www sshd[19422]: Failed password for invalid user admin from 135.23.251.14 port 35636 ssh2
Aug 16 14:04:45 www sshd[19424]: Invalid user admin from 135.23.251.14
Aug 16 14:04:47 www sshd[19424]: Failed password for invalid user admin from 135.23.251.14 port 35685 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=135.23.251.14
2020-08-17 02:04:06
34.87.95.9 attackspam
Lines containing failures of 34.87.95.9
Aug 16 13:39:31 ntop sshd[31609]: Invalid user oy from 34.87.95.9 port 46376
Aug 16 13:39:31 ntop sshd[31609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.95.9 
Aug 16 13:39:33 ntop sshd[31609]: Failed password for invalid user oy from 34.87.95.9 port 46376 ssh2
Aug 16 13:39:35 ntop sshd[31609]: Received disconnect from 34.87.95.9 port 46376:11: Bye Bye [preauth]
Aug 16 13:39:35 ntop sshd[31609]: Disconnected from invalid user oy 34.87.95.9 port 46376 [preauth]
Aug 16 14:12:24 ntop sshd[2591]: Invalid user tang from 34.87.95.9 port 46946
Aug 16 14:12:24 ntop sshd[2591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.95.9 
Aug 16 14:12:26 ntop sshd[2591]: Failed password for invalid user tang from 34.87.95.9 port 46946 ssh2
Aug 16 14:12:28 ntop sshd[2591]: Received disconnect from 34.87.95.9 port 46946:11: Bye Bye [preauth]
Aug 16 14:12:........
------------------------------
2020-08-17 02:37:31
45.231.12.37 attackbotsspam
2020-08-15T16:00:26.465324hostname sshd[27297]: Failed password for root from 45.231.12.37 port 45110 ssh2
...
2020-08-17 02:11:35
49.234.149.92 attackspambots
SSH Brute-Force. Ports scanning.
2020-08-17 02:20:29
77.247.109.88 attackspam
[2020-08-16 13:48:02] NOTICE[1185][C-00002d22] chan_sip.c: Call from '' (77.247.109.88:60741) to extension '9011442037699492' rejected because extension not found in context 'public'.
[2020-08-16 13:48:02] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-16T13:48:02.027-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442037699492",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.88/60741",ACLName="no_extension_match"
[2020-08-16 13:48:06] NOTICE[1185][C-00002d23] chan_sip.c: Call from '' (77.247.109.88:50251) to extension '01146812400621' rejected because extension not found in context 'public'.
[2020-08-16 13:48:06] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-16T13:48:06.410-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146812400621",SessionID="0x7f10c41b0fe8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-08-17 02:03:05
158.69.210.168 attackspam
Aug 16 19:03:43 fhem-rasp sshd[27553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.210.168
Aug 16 19:03:45 fhem-rasp sshd[27553]: Failed password for invalid user hadi from 158.69.210.168 port 59222 ssh2
...
2020-08-17 02:17:32
219.240.99.110 attack
Aug 16 18:13:16 *** sshd[28547]: Invalid user oracle from 219.240.99.110
2020-08-17 02:13:26
54.37.71.204 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-08-17 02:03:36
103.45.190.181 attack
Lines containing failures of 103.45.190.181
Aug 16 14:14:35 shared04 sshd[31436]: Invalid user tomcat9 from 103.45.190.181 port 57388
Aug 16 14:14:35 shared04 sshd[31436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.190.181
Aug 16 14:14:37 shared04 sshd[31436]: Failed password for invalid user tomcat9 from 103.45.190.181 port 57388 ssh2
Aug 16 14:14:37 shared04 sshd[31436]: Received disconnect from 103.45.190.181 port 57388:11: Bye Bye [preauth]
Aug 16 14:14:37 shared04 sshd[31436]: Disconnected from invalid user tomcat9 103.45.190.181 port 57388 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.45.190.181
2020-08-17 02:22:12
106.54.14.42 attackspam
Aug 16 18:33:58 ajax sshd[26608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.14.42 
Aug 16 18:33:59 ajax sshd[26608]: Failed password for invalid user mdh from 106.54.14.42 port 50680 ssh2
2020-08-17 02:07:20

最近上报的IP列表

43.252.130.247 211.7.23.25 203.101.195.73 169.223.131.36
26.36.173.153 74.24.41.135 99.171.173.44 141.201.179.154
144.42.178.139 243.228.63.126 219.136.183.64 37.1.41.78
27.174.99.45 207.48.64.14 15.167.253.150 39.222.31.78
21.66.121.25 209.158.96.130 8.211.17.5 17.117.133.43