必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Marseille

省份(region): Provence-Alpes-Côte d'Azur

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.199.14.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.199.14.149.			IN	A

;; AUTHORITY SECTION:
.			124	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 03 23:01:07 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
149.14.199.138.in-addr.arpa domain name pointer unn-138-199-14-149.datapacket.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.14.199.138.in-addr.arpa	name = unn-138-199-14-149.datapacket.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.142.125.39 attackspambots
Unauthorized IMAP connection attempt
2020-09-01 01:53:38
117.245.139.98 attackspambots
Unauthorized connection attempt from IP address 117.245.139.98 on Port 445(SMB)
2020-09-01 02:22:53
41.33.53.162 attack
Unauthorized connection attempt from IP address 41.33.53.162 on Port 445(SMB)
2020-09-01 02:26:00
177.106.245.120 attack
SMB Server BruteForce Attack
2020-09-01 02:05:23
165.227.45.249 attackbots
$f2bV_matches
2020-09-01 01:50:37
186.77.56.215 attack
Port probing on unauthorized port 445
2020-09-01 02:16:53
179.222.96.70 attack
Aug 31 15:59:08 vps-51d81928 sshd[129334]: Invalid user flow from 179.222.96.70 port 33983
Aug 31 15:59:08 vps-51d81928 sshd[129334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.222.96.70 
Aug 31 15:59:08 vps-51d81928 sshd[129334]: Invalid user flow from 179.222.96.70 port 33983
Aug 31 15:59:11 vps-51d81928 sshd[129334]: Failed password for invalid user flow from 179.222.96.70 port 33983 ssh2
Aug 31 16:03:29 vps-51d81928 sshd[129399]: Invalid user starbound from 179.222.96.70 port 47146
...
2020-09-01 01:57:53
187.68.107.84 attackspam
SSH/22 MH Probe, BF, Hack -
2020-09-01 01:52:14
43.226.40.89 attackspam
Spam from cddy.xyz / dmas.xyz
2020-09-01 01:52:36
78.36.200.186 attack
Unauthorized connection attempt from IP address 78.36.200.186 on Port 445(SMB)
2020-09-01 02:19:39
192.241.231.187 attackbotsspam
45000/tcp 50070/tcp 3389/tcp...
[2020-06-30/08-31]16pkt,16pt.(tcp)
2020-09-01 02:12:28
156.146.63.149 attackspam
0,17-02/06 [bc01/m11] PostRequest-Spammer scoring: zurich
2020-09-01 01:56:16
165.227.39.151 attackbotsspam
Wordpress attack
2020-09-01 02:06:40
51.91.77.109 attackspam
Aug 31 14:47:49 home sshd[3548375]: Failed password for root from 51.91.77.109 port 46874 ssh2
Aug 31 14:52:04 home sshd[3549958]: Invalid user admin from 51.91.77.109 port 55274
Aug 31 14:52:04 home sshd[3549958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.77.109 
Aug 31 14:52:04 home sshd[3549958]: Invalid user admin from 51.91.77.109 port 55274
Aug 31 14:52:06 home sshd[3549958]: Failed password for invalid user admin from 51.91.77.109 port 55274 ssh2
...
2020-09-01 01:58:46
194.87.139.115 attackbotsspam
Bruteforce SSH attempt
2020-09-01 02:09:00

最近上报的IP列表

29.246.116.238 243.18.189.66 147.14.218.233 147.23.133.208
4.143.129.167 109.12.149.83 217.93.58.149 5.19.71.223
142.29.14.103 57.56.78.150 191.103.104.185 131.55.114.155
87.188.5.176 187.141.60.221 197.238.5.111 97.202.8.114
88.25.52.21 234.86.20.71 152.138.96.76 143.72.68.5