必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.168.34.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.168.34.56.			IN	A

;; AUTHORITY SECTION:
.			397	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 17:20:24 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 56.34.168.138.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
b'56.34.168.138.in-addr.arpa	canonical name = 254.255.168.138.in-addr.arpa.
254.255.168.138.in-addr.arpa	name = 138-168-host.usmc.mil.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
209.97.179.52 attackspam
xmlrpc attack
2020-09-23 18:20:08
128.199.21.230 attackspam
Automatic report - XMLRPC Attack
2020-09-23 18:12:22
14.37.8.148 attackbotsspam
Sep 22 17:01:11 ssh2 sshd[20436]: User root from 14.37.8.148 not allowed because not listed in AllowUsers
Sep 22 17:01:11 ssh2 sshd[20436]: Failed password for invalid user root from 14.37.8.148 port 57478 ssh2
Sep 22 17:01:11 ssh2 sshd[20436]: Connection closed by invalid user root 14.37.8.148 port 57478 [preauth]
...
2020-09-23 18:29:03
190.64.64.75 attackbotsspam
Sep 23 03:02:35 r.ca sshd[28482]: Failed password for invalid user isabella from 190.64.64.75 port 36781 ssh2
2020-09-23 18:34:29
111.229.76.239 attackbots
Sep 22 23:55:35 r.ca sshd[11973]: Failed password for invalid user deepak from 111.229.76.239 port 35334 ssh2
2020-09-23 18:10:25
49.248.38.94 attackspam
Unauthorized connection attempt from IP address 49.248.38.94 on Port 445(SMB)
2020-09-23 18:31:34
138.197.180.102 attackspam
2020-09-23T02:33:48.923517sorsha.thespaminator.com sshd[31831]: Invalid user rustserver from 138.197.180.102 port 40132
2020-09-23T02:33:50.524974sorsha.thespaminator.com sshd[31831]: Failed password for invalid user rustserver from 138.197.180.102 port 40132 ssh2
...
2020-09-23 18:38:31
170.106.3.225 attack
Sep 22 21:16:47 php1 sshd\[27804\]: Invalid user test2 from 170.106.3.225
Sep 22 21:16:47 php1 sshd\[27804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.3.225
Sep 22 21:16:49 php1 sshd\[27804\]: Failed password for invalid user test2 from 170.106.3.225 port 53976 ssh2
Sep 22 21:22:45 php1 sshd\[28286\]: Invalid user sftpuser from 170.106.3.225
Sep 22 21:22:45 php1 sshd\[28286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.3.225
2020-09-23 18:29:52
192.241.231.103 attack
Fail2Ban Ban Triggered
2020-09-23 18:13:16
3.90.106.190 attack
[portscan] Port scan
2020-09-23 18:31:01
134.175.129.204 attackbotsspam
Invalid user test from 134.175.129.204 port 60836
2020-09-23 18:35:02
18.222.225.213 attack
Sep 23 01:45:16 r.ca sshd[8363]: Failed password for root from 18.222.225.213 port 46974 ssh2
2020-09-23 18:33:45
194.146.230.158 attack
Listed on    barracudaCentral   / proto=6  .  srcport=53569  .  dstport=21  .     (3053)
2020-09-23 18:15:09
195.200.244.80 attack
bruteforce detected
2020-09-23 18:08:23
58.153.112.215 attackbotsspam
Sep 22 20:00:13 scw-focused-cartwright sshd[27815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.153.112.215
Sep 22 20:00:15 scw-focused-cartwright sshd[27815]: Failed password for invalid user admin from 58.153.112.215 port 48295 ssh2
2020-09-23 18:09:08

最近上报的IP列表

175.62.190.192 133.219.140.20 116.251.27.23 79.207.206.125
162.239.133.231 11.24.152.153 197.233.173.138 221.10.31.54
211.178.152.11 252.48.21.195 182.234.184.193 245.58.57.147
171.167.234.57 223.38.172.243 168.47.248.172 19.81.175.94
230.3.111.117 144.111.214.201 186.129.72.203 253.193.102.215