必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Clifton

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): DigitalOcean, LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.197.43.206 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-07-14 07:51:33
138.197.43.206 attackbotsspam
138.197.43.206 - - [12/Jul/2020:16:37:42 +0200] "POST /xmlrpc.php HTTP/1.1" 403 21861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [12/Jul/2020:16:46:20 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-13 01:06:01
138.197.43.206 attackspambots
WordPress vulnerability sniffing (looking for /wp-login.php)
2020-07-12 12:42:54
138.197.43.206 attack
138.197.43.206 - - [05/Jul/2020:07:55:55 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [05/Jul/2020:07:55:57 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [05/Jul/2020:07:55:58 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-05 17:37:46
138.197.43.206 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-06-25 21:48:46
138.197.43.206 attack
138.197.43.206 - - \[01/Jun/2020:17:14:33 +0200\] "POST /wp-login.php HTTP/1.0" 200 6390 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - \[01/Jun/2020:17:14:35 +0200\] "POST /wp-login.php HTTP/1.0" 200 6359 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - \[01/Jun/2020:17:14:36 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-06-02 00:43:10
138.197.43.206 attackspambots
138.197.43.206 - - [31/May/2020:05:49:22 +0200] "GET /wp-login.php HTTP/1.1" 200 6364 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [31/May/2020:05:49:23 +0200] "POST /wp-login.php HTTP/1.1" 200 6615 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [31/May/2020:05:49:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-31 17:36:31
138.197.43.206 attack
marleenrecords.breidenba.ch 138.197.43.206 [24/May/2020:22:30:15 +0200] "POST /wp-login.php HTTP/1.1" 200 6135 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
marleenrecords.breidenba.ch 138.197.43.206 [24/May/2020:22:30:16 +0200] "POST /wp-login.php HTTP/1.1" 200 6095 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-25 06:42:27
138.197.43.206 attackspambots
WordPress wp-login brute force :: 138.197.43.206 0.100 - [12/May/2020:23:39:30  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1837 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-05-13 08:17:57
138.197.47.165 attackbotsspam
Automatic report - Port Scan
2020-03-14 02:14:33
138.197.43.206 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-03-07 04:01:05
138.197.43.206 attackbotsspam
138.197.43.206 - - \[06/Feb/2020:19:13:54 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - \[06/Feb/2020:19:13:56 +0100\] "POST /wp-login.php HTTP/1.0" 200 4402 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - \[06/Feb/2020:19:13:56 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-02-07 03:30:12
138.197.4.42 attackspambots
138.197.4.42 - - \[31/Dec/2019:15:50:39 +0100\] "GET / HTTP/1.0" 200 926 "-" "Mozilla/5.0 \(compatible\; NetcraftSurveyAgent/1.0\; +info@netcraft.com\)"
...
2020-01-01 01:14:57
138.197.43.206 attack
138.197.43.206 - - [18/Dec/2019:23:40:15 +0100] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [18/Dec/2019:23:40:16 +0100] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [18/Dec/2019:23:40:16 +0100] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [18/Dec/2019:23:40:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1508 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [18/Dec/2019:23:40:18 +0100] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.43.206 - - [18/Dec/2019:23:40:19 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-19 07:06:08
138.197.43.206 attackbots
138.197.43.206 has been banned for [WebApp Attack]
...
2019-12-05 00:06:58
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.4.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20082
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.197.4.214.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 12:21:02 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 214.4.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 214.4.197.138.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.15.158 attackbotsspam
May 21 20:34:04 php1 sshd\[5239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
May 21 20:34:07 php1 sshd\[5239\]: Failed password for root from 222.186.15.158 port 40317 ssh2
May 21 20:34:12 php1 sshd\[5254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
May 21 20:34:14 php1 sshd\[5254\]: Failed password for root from 222.186.15.158 port 56636 ssh2
May 21 20:34:20 php1 sshd\[5257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
2020-05-22 14:38:22
189.112.179.115 attackbotsspam
bruteforce detected
2020-05-22 14:26:53
128.14.134.134 attackspam
port scan and connect, tcp 443 (https)
2020-05-22 14:30:28
190.210.42.209 attackspam
May 22 08:19:24 ArkNodeAT sshd\[6623\]: Invalid user deepir from 190.210.42.209
May 22 08:19:24 ArkNodeAT sshd\[6623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209
May 22 08:19:26 ArkNodeAT sshd\[6623\]: Failed password for invalid user deepir from 190.210.42.209 port 12380 ssh2
2020-05-22 14:23:51
113.193.243.35 attackbots
May 22 08:16:59 meumeu sshd[2922]: Invalid user xcv from 113.193.243.35 port 33290
May 22 08:16:59 meumeu sshd[2922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35 
May 22 08:16:59 meumeu sshd[2922]: Invalid user xcv from 113.193.243.35 port 33290
May 22 08:17:00 meumeu sshd[2922]: Failed password for invalid user xcv from 113.193.243.35 port 33290 ssh2
May 22 08:21:23 meumeu sshd[5286]: Invalid user fmf from 113.193.243.35 port 39824
May 22 08:21:23 meumeu sshd[5286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35 
May 22 08:21:23 meumeu sshd[5286]: Invalid user fmf from 113.193.243.35 port 39824
May 22 08:21:25 meumeu sshd[5286]: Failed password for invalid user fmf from 113.193.243.35 port 39824 ssh2
May 22 08:25:45 meumeu sshd[5800]: Invalid user vwf from 113.193.243.35 port 46352
...
2020-05-22 14:30:59
46.238.122.54 attack
k+ssh-bruteforce
2020-05-22 14:34:21
111.10.43.244 attackspambots
Unauthorized SSH login attempts
2020-05-22 14:48:42
49.234.182.55 attack
May 22 06:14:44 h2779839 sshd[26387]: Invalid user tfb from 49.234.182.55 port 33674
May 22 06:14:44 h2779839 sshd[26387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.182.55
May 22 06:14:44 h2779839 sshd[26387]: Invalid user tfb from 49.234.182.55 port 33674
May 22 06:14:46 h2779839 sshd[26387]: Failed password for invalid user tfb from 49.234.182.55 port 33674 ssh2
May 22 06:19:14 h2779839 sshd[26440]: Invalid user bqe from 49.234.182.55 port 58262
May 22 06:19:14 h2779839 sshd[26440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.182.55
May 22 06:19:14 h2779839 sshd[26440]: Invalid user bqe from 49.234.182.55 port 58262
May 22 06:19:16 h2779839 sshd[26440]: Failed password for invalid user bqe from 49.234.182.55 port 58262 ssh2
May 22 06:23:53 h2779839 sshd[26498]: Invalid user gao from 49.234.182.55 port 54618
...
2020-05-22 14:12:42
89.187.168.161 attackbots
fell into ViewStateTrap:essen
2020-05-22 14:29:49
91.134.173.100 attackspam
May 22 07:48:21 ajax sshd[21510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.100 
May 22 07:48:23 ajax sshd[21510]: Failed password for invalid user ya from 91.134.173.100 port 48156 ssh2
2020-05-22 14:51:41
49.234.192.24 attack
k+ssh-bruteforce
2020-05-22 14:41:51
115.124.68.39 attackbotsspam
Invalid user aiv from 115.124.68.39 port 41512
2020-05-22 14:45:07
124.158.184.3 attack
Port Scanner
2020-05-22 14:36:00
14.235.171.191 attackbotsspam
1590119759 - 05/22/2020 05:55:59 Host: 14.235.171.191/14.235.171.191 Port: 445 TCP Blocked
2020-05-22 14:28:33
182.150.44.41 attack
Lines containing failures of 182.150.44.41
May 22 05:50:40 *** sshd[98784]: Invalid user xxx from 182.150.44.41 port 39790
May 22 05:50:40 *** sshd[98784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.150.44.41
May 22 05:50:42 *** sshd[98784]: Failed password for invalid user xxx from 182.150.44.41 port 39790 ssh2
May 22 05:50:42 *** sshd[98784]: Received disconnect from 182.150.44.41 port 39790:11: Bye Bye [preauth]
May 22 05:50:42 *** sshd[98784]: Disconnected from invalid user xxx 182.150.44.41 port 39790 [preauth]
May 22 05:53:22 *** sshd[99091]: Invalid user upo from 182.150.44.41 port 52872
May 22 05:53:22 *** sshd[99091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.150.44.41


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.150.44.41
2020-05-22 14:51:04

最近上报的IP列表

96.186.189.48 2.177.120.131 197.86.11.25 37.210.74.46
189.241.179.89 64.251.208.4 120.126.56.120 220.191.29.253
196.32.11.84 195.81.7.221 42.61.41.114 75.171.180.151
185.43.61.223 102.115.22.142 175.200.156.160 139.59.252.30
81.184.195.207 157.24.99.142 86.187.183.7 38.185.180.138