必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Toronto

省份(region): Ontario

国家(country): Canada

运营商(isp): ALO

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.197.131.66 attackbotsspam
138.197.131.66 - - [10/Sep/2020:16:34:59 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [10/Sep/2020:16:35:01 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [10/Sep/2020:16:35:02 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-11 01:12:33
138.197.131.66 attack
138.197.131.66 - - [10/Sep/2020:09:37:17 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [10/Sep/2020:09:40:59 +0200] "POST /xmlrpc.php HTTP/1.1" 403 13510 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-10 16:32:12
138.197.131.66 attack
Automatic report - XMLRPC Attack
2020-09-10 07:09:41
138.197.131.66 attackspambots
Automatic report - XMLRPC Attack
2020-09-08 06:26:08
138.197.131.66 attack
138.197.131.66 - - [14/Aug/2020:00:07:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1791 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [14/Aug/2020:00:07:06 +0100] "POST /wp-login.php HTTP/1.1" 200 1772 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [14/Aug/2020:00:07:06 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 07:37:23
138.197.131.66 attackbots
138.197.131.66 - - [09/Aug/2020:21:12:12 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [09/Aug/2020:21:12:15 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [09/Aug/2020:21:12:16 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-10 03:22:46
138.197.131.66 attack
138.197.131.66 - - [08/Aug/2020:08:35:58 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [08/Aug/2020:08:36:01 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [08/Aug/2020:08:36:02 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-08 18:30:52
138.197.131.66 attackbotsspam
138.197.131.66 - - [25/Jul/2020:21:36:15 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [25/Jul/2020:21:36:16 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [25/Jul/2020:21:36:17 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-26 04:41:52
138.197.131.66 attackbotsspam
138.197.131.66 - - [20/Jul/2020:05:35:20 +0200] "POST /xmlrpc.php HTTP/1.1" 403 611 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [20/Jul/2020:05:55:39 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-20 13:48:54
138.197.131.66 attackbots
138.197.131.66 - - [23/Jun/2020:09:22:27 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [23/Jun/2020:09:22:30 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [23/Jun/2020:09:22:31 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-23 17:00:22
138.197.131.66 attackspam
138.197.131.66 - - [14/Jun/2020:23:27:11 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [14/Jun/2020:23:27:12 +0200] "POST /wp-login.php HTTP/1.1" 200 6684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [14/Jun/2020:23:27:13 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-15 06:49:18
138.197.131.66 attackspam
Attempt to log in with non-existing username: admin
2020-06-03 06:38:44
138.197.131.66 attackbots
138.197.131.66 - - [26/May/2020:01:26:37 +0200] "GET /wp-login.php HTTP/1.1" 200 6614 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [26/May/2020:01:26:38 +0200] "POST /wp-login.php HTTP/1.1" 200 6865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.131.66 - - [26/May/2020:01:26:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-26 09:50:29
138.197.131.66 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-23 20:27:15
138.197.131.249 attackbots
May 20 19:02:19 server sshd[8421]: Failed password for invalid user ypi from 138.197.131.249 port 47900 ssh2
May 20 19:06:11 server sshd[12207]: Failed password for invalid user nqv from 138.197.131.249 port 56856 ssh2
May 20 19:10:06 server sshd[15845]: Failed password for invalid user nke from 138.197.131.249 port 37584 ssh2
2020-05-21 03:25:35
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 138.197.131.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;138.197.131.221.		IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:02:24 CST 2021
;; MSG SIZE  rcvd: 44

'
HOST信息:
Host 221.131.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.131.197.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.105.129.129 attackspam
Dec  6 02:30:23 server sshd\[6937\]: Invalid user ftpuser from 46.105.129.129
Dec  6 02:30:23 server sshd\[6937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip129.ip-46-105-129.eu 
Dec  6 02:30:25 server sshd\[6937\]: Failed password for invalid user ftpuser from 46.105.129.129 port 51420 ssh2
Dec  6 02:36:17 server sshd\[8487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip129.ip-46-105-129.eu  user=root
Dec  6 02:36:19 server sshd\[8487\]: Failed password for root from 46.105.129.129 port 34866 ssh2
...
2019-12-06 08:04:27
78.26.146.132 attackbots
Unauthorized connection attempt from IP address 78.26.146.132 on Port 445(SMB)
2019-12-06 07:37:06
217.181.150.98 attackbotsspam
Unauthorized connection attempt from IP address 217.181.150.98 on Port 445(SMB)
2019-12-06 08:13:23
14.164.214.65 attack
Unauthorized connection attempt from IP address 14.164.214.65 on Port 445(SMB)
2019-12-06 07:59:47
60.29.241.2 attackbots
Dec  5 21:54:06 MK-Soft-VM8 sshd[19426]: Failed password for root from 60.29.241.2 port 24278 ssh2
...
2019-12-06 08:10:03
36.89.225.63 attackspam
Unauthorized connection attempt from IP address 36.89.225.63 on Port 445(SMB)
2019-12-06 08:14:12
106.13.37.203 attackbots
Dec  5 22:01:44 MK-Soft-VM4 sshd[6145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.203 
Dec  5 22:01:46 MK-Soft-VM4 sshd[6145]: Failed password for invalid user www from 106.13.37.203 port 35450 ssh2
...
2019-12-06 07:46:22
222.186.190.2 attackbots
Dec  6 01:07:06 root sshd[19767]: Failed password for root from 222.186.190.2 port 47780 ssh2
Dec  6 01:07:10 root sshd[19767]: Failed password for root from 222.186.190.2 port 47780 ssh2
Dec  6 01:07:14 root sshd[19767]: Failed password for root from 222.186.190.2 port 47780 ssh2
Dec  6 01:07:18 root sshd[19767]: Failed password for root from 222.186.190.2 port 47780 ssh2
...
2019-12-06 08:07:34
139.59.61.134 attackbotsspam
Dec  6 00:58:47 vps691689 sshd[23108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.134
Dec  6 00:58:49 vps691689 sshd[23108]: Failed password for invalid user wanmeig from 139.59.61.134 port 60540 ssh2
...
2019-12-06 08:18:05
132.255.251.29 attack
Unauthorized connection attempt from IP address 132.255.251.29 on Port 445(SMB)
2019-12-06 08:12:02
208.100.26.241 attackspambots
Multiport scan : 7 ports scanned 5986 6379 7077 7777 8000 8080 8083
2019-12-06 07:48:46
51.91.212.81 attack
Multiport scan : 10 ports scanned 25 465 990 995 2080 4433 5432 8081 8082 8088
2019-12-06 07:36:05
137.74.167.250 attackspambots
Dec  6 00:15:18 legacy sshd[8730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250
Dec  6 00:15:20 legacy sshd[8730]: Failed password for invalid user roskelley from 137.74.167.250 port 51597 ssh2
Dec  6 00:20:37 legacy sshd[8920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250
...
2019-12-06 07:53:38
165.22.38.221 attack
$f2bV_matches
2019-12-06 07:46:44
60.190.31.164 attackbots
Unauthorized connection attempt from IP address 60.190.31.164 on Port 445(SMB)
2019-12-06 07:55:47

最近上报的IP列表

182.200.53.6 60.173.243.229 121.35.1.126 182.224.4.49
89.79.208.252 208.110.85.66 59.92.177.191 175.138.30.9
178.125.187.205 121.104.130.14 124.128.80.75 212.237.99.89
5.157.29.64 83.149.101.158 94.109.141.88 140.82.61.27
103.219.82.57 153.63.253.222 184.170.252.201 185.136.148.13