必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.227.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.197.227.105.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:35:19 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 105.227.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.227.197.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.1.26 attackbotsspam
Feb 11 14:44:03 zulu412 sshd\[13116\]: Invalid user ooa from 193.112.1.26 port 49262
Feb 11 14:44:03 zulu412 sshd\[13116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.1.26
Feb 11 14:44:05 zulu412 sshd\[13116\]: Failed password for invalid user ooa from 193.112.1.26 port 49262 ssh2
...
2020-02-12 02:26:14
51.68.123.192 attack
Feb 11 10:56:34 ws22vmsma01 sshd[234877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.192
Feb 11 10:56:37 ws22vmsma01 sshd[234877]: Failed password for invalid user qjz from 51.68.123.192 port 35940 ssh2
...
2020-02-12 02:35:14
204.11.53.222 attack
Port scan on 3 port(s): 1719 3128 8081
2020-02-12 01:59:49
41.75.123.49 attack
Automatic report - XMLRPC Attack
2020-02-12 01:57:34
106.37.223.54 attack
Feb 11 18:02:32 163-172-32-151 sshd[11613]: Invalid user ljh from 106.37.223.54 port 47825
...
2020-02-12 02:41:16
62.133.142.18 attackspam
Feb 11 13:44:47 sshgateway sshd\[8403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic62-133-142-018.ostnet.pl  user=root
Feb 11 13:44:49 sshgateway sshd\[8403\]: Failed password for root from 62.133.142.18 port 53655 ssh2
Feb 11 13:44:52 sshgateway sshd\[8403\]: Failed password for root from 62.133.142.18 port 53655 ssh2
2020-02-12 02:00:45
120.210.134.49 attackbotsspam
Feb 10 05:26:01 HOST sshd[21771]: Failed password for invalid user baq from 120.210.134.49 port 53496 ssh2
Feb 10 05:26:01 HOST sshd[21771]: Received disconnect from 120.210.134.49: 11: Bye Bye [preauth]
Feb 10 05:44:46 HOST sshd[22378]: Failed password for invalid user zlx from 120.210.134.49 port 49562 ssh2
Feb 10 05:44:46 HOST sshd[22378]: Received disconnect from 120.210.134.49: 11: Bye Bye [preauth]
Feb 10 05:48:02 HOST sshd[22538]: Failed password for invalid user gsl from 120.210.134.49 port 40294 ssh2
Feb 10 05:48:02 HOST sshd[22538]: Received disconnect from 120.210.134.49: 11: Bye Bye [preauth]
Feb 10 05:51:29 HOST sshd[22631]: Failed password for invalid user hjw from 120.210.134.49 port 59376 ssh2
Feb 10 05:51:29 HOST sshd[22631]: Received disconnect from 120.210.134.49: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=120.210.134.49
2020-02-12 02:34:48
62.28.180.46 attack
NOQUEUE: reject: RCPT from remote.lusomotos.com[62.28.180.46]: 450 4.7.1
2020-02-12 02:34:22
218.92.0.178 attackspambots
SSH login attempts
2020-02-12 02:32:36
176.106.186.35 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-12 02:44:09
220.143.0.95 attackspam
" "
2020-02-12 02:25:07
51.75.16.138 attack
Feb 11 11:15:22 plusreed sshd[27338]: Invalid user rpb from 51.75.16.138
...
2020-02-12 02:01:53
121.157.82.202 attackspambots
Feb 11 11:53:58 plusreed sshd[5124]: Invalid user oku from 121.157.82.202
...
2020-02-12 01:56:57
212.92.245.21 attackbotsspam
Port probing on unauthorized port 23
2020-02-12 02:42:40
89.212.162.78 attack
$f2bV_matches
2020-02-12 02:01:19

最近上报的IP列表

138.197.226.239 138.197.227.142 138.197.227.191 138.197.227.3
138.197.228.39 138.197.228.51 138.197.227.62 138.197.228.219
138.197.229.196 118.175.175.142 138.197.229.215 138.197.229.200
138.197.229.77 138.197.229.4 138.197.227.201 138.197.230.51
138.197.230.56 138.197.230.77 138.197.230.82 138.197.230.94