必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.158.207.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.158.207.107.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 02:03:21 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
Host 107.207.158.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.207.158.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.112.115.160 attackbotsspam
ssh intrusion attempt
2019-09-24 22:26:09
198.98.62.43 attackspam
09/24/2019-14:44:31.315941 198.98.62.43 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 20
2019-09-24 22:42:22
191.82.169.27 attackspam
Unauthorised access (Sep 24) SRC=191.82.169.27 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=10170 TCP DPT=8080 WINDOW=3435 SYN
2019-09-24 22:37:05
107.180.68.110 attackbots
Sep 24 16:12:42 meumeu sshd[4585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.180.68.110 
Sep 24 16:12:44 meumeu sshd[4585]: Failed password for invalid user jt from 107.180.68.110 port 43692 ssh2
Sep 24 16:16:37 meumeu sshd[5172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.180.68.110 
...
2019-09-24 22:21:46
222.186.15.204 attack
Sep 24 16:00:18 srv206 sshd[31894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204  user=root
Sep 24 16:00:21 srv206 sshd[31894]: Failed password for root from 222.186.15.204 port 44091 ssh2
...
2019-09-24 22:09:32
213.146.203.200 attack
Sep 24 04:33:50 web9 sshd\[11524\]: Invalid user lightdm from 213.146.203.200
Sep 24 04:33:50 web9 sshd\[11524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.146.203.200
Sep 24 04:33:52 web9 sshd\[11524\]: Failed password for invalid user lightdm from 213.146.203.200 port 55524 ssh2
Sep 24 04:38:33 web9 sshd\[12383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.146.203.200  user=root
Sep 24 04:38:35 web9 sshd\[12383\]: Failed password for root from 213.146.203.200 port 48022 ssh2
2019-09-24 22:39:06
43.247.156.168 attackbotsspam
Sep 24 09:57:43 ny01 sshd[17676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.156.168
Sep 24 09:57:44 ny01 sshd[17676]: Failed password for invalid user security from 43.247.156.168 port 41575 ssh2
Sep 24 10:02:39 ny01 sshd[18645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.156.168
2019-09-24 22:03:37
91.121.110.97 attack
Sep 24 15:50:41 core sshd[15814]: Invalid user md from 91.121.110.97 port 40412
Sep 24 15:50:43 core sshd[15814]: Failed password for invalid user md from 91.121.110.97 port 40412 ssh2
...
2019-09-24 21:56:29
60.170.166.189 attack
09/24/2019-14:44:31.063625 60.170.166.189 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 59
2019-09-24 22:42:40
62.234.106.199 attackbots
$f2bV_matches
2019-09-24 21:57:27
188.254.0.113 attackspam
2019-09-24T16:51:15.725514tmaserv sshd\[27771\]: Invalid user skfur from 188.254.0.113 port 42602
2019-09-24T16:51:15.732762tmaserv sshd\[27771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.113
2019-09-24T16:51:17.372916tmaserv sshd\[27771\]: Failed password for invalid user skfur from 188.254.0.113 port 42602 ssh2
2019-09-24T16:55:58.672847tmaserv sshd\[27908\]: Invalid user augusto from 188.254.0.113 port 53470
2019-09-24T16:55:58.683990tmaserv sshd\[27908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.113
2019-09-24T16:56:00.510136tmaserv sshd\[27908\]: Failed password for invalid user augusto from 188.254.0.113 port 53470 ssh2
...
2019-09-24 21:57:49
45.82.33.60 attackspambots
Autoban   45.82.33.60 AUTH/CONNECT
2019-09-24 22:47:35
195.228.22.54 attackspambots
Sep 23 10:31:18 xb0 sshd[20365]: Failed password for invalid user apache from 195.228.22.54 port 25729 ssh2
Sep 23 10:31:18 xb0 sshd[20365]: Received disconnect from 195.228.22.54: 11: Bye Bye [preauth]
Sep 23 10:48:37 xb0 sshd[30472]: Failed password for invalid user ghost from 195.228.22.54 port 7521 ssh2
Sep 23 10:48:37 xb0 sshd[30472]: Received disconnect from 195.228.22.54: 11: Bye Bye [preauth]
Sep 23 10:52:44 xb0 sshd[29065]: Failed password for invalid user teamspeak from 195.228.22.54 port 13985 ssh2
Sep 23 10:52:44 xb0 sshd[29065]: Received disconnect from 195.228.22.54: 11: Bye Bye [preauth]
Sep 23 10:57:06 xb0 sshd[27381]: Failed password for invalid user juliana from 195.228.22.54 port 24450 ssh2
Sep 23 10:57:06 xb0 sshd[27381]: Received disconnect from 195.228.22.54: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.228.22.54
2019-09-24 22:17:13
115.159.198.130 attack
Sep 24 13:53:09  postfix/smtpd: warning: unknown[115.159.198.130]: SASL LOGIN authentication failed
2019-09-24 22:19:33
178.33.216.209 attackbotsspam
Sep 24 12:44:52 thevastnessof sshd[19908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.216.209
...
2019-09-24 22:26:36

最近上报的IP列表

38.1.21.189 30.27.72.150 12.157.111.110 144.197.218.24
148.178.241.238 87.71.180.233 26.177.13.75 223.0.31.13
141.101.212.13 222.223.159.228 237.70.147.6 142.13.222.149
243.29.242.67 39.203.36.231 159.159.10.216 162.95.186.216
235.148.70.36 155.137.127.238 244.71.5.124 252.98.240.149