必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.199.21.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.199.21.191.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:36:29 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
191.21.199.138.in-addr.arpa domain name pointer unn-138-199-21-191.datapacket.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
191.21.199.138.in-addr.arpa	name = unn-138-199-21-191.datapacket.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.35.169.22 attack
 UDP 192.35.169.22:44929 -> port 53, len 72
2020-10-03 14:19:19
92.118.161.45 attackbotsspam
 TCP (SYN) 92.118.161.45:61295 -> port 111, len 44
2020-10-03 14:23:30
192.35.169.16 attackspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-03 14:12:58
167.71.47.142 attackspam
Oct  3 08:06:58 ourumov-web sshd\[30430\]: Invalid user test01 from 167.71.47.142 port 60212
Oct  3 08:06:58 ourumov-web sshd\[30430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.142
Oct  3 08:07:00 ourumov-web sshd\[30430\]: Failed password for invalid user test01 from 167.71.47.142 port 60212 ssh2
...
2020-10-03 14:23:05
84.38.184.79 attack
Oct  3 05:47:24 prod4 sshd\[22173\]: Invalid user administrator from 84.38.184.79
Oct  3 05:47:27 prod4 sshd\[22173\]: Failed password for invalid user administrator from 84.38.184.79 port 33508 ssh2
Oct  3 05:50:51 prod4 sshd\[22954\]: Invalid user sce from 84.38.184.79
...
2020-10-03 14:45:38
118.24.122.226 attack
SSH login attempts.
2020-10-03 14:10:50
49.234.131.75 attackspam
Invalid user angela from 49.234.131.75 port 52590
2020-10-03 14:30:49
91.222.239.107 attackspambots
(mod_security) mod_security (id:210730) triggered by 91.222.239.107 (RU/Russia/-): 5 in the last 300 secs
2020-10-03 14:09:00
185.128.81.45 attack
20 attempts against mh-misbehave-ban on pluto
2020-10-03 14:07:18
104.143.83.242 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-03 14:28:36
196.52.43.98 attackspam
srv02 Mass scanning activity detected Target: 2161  ..
2020-10-03 14:26:02
208.68.39.220 attack
 TCP (SYN) 208.68.39.220:53078 -> port 17262, len 44
2020-10-03 14:04:51
89.248.168.220 attackbots
Fail2Ban Ban Triggered
2020-10-03 14:37:27
212.70.149.20 attackbots
Oct  3 08:26:32 srv01 postfix/smtpd\[9270\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 08:26:34 srv01 postfix/smtpd\[967\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 08:26:38 srv01 postfix/smtpd\[9299\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 08:26:40 srv01 postfix/smtpd\[9171\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 08:26:57 srv01 postfix/smtpd\[9297\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-03 14:29:17
89.248.168.157 attackbotsspam
firewall-block, port(s): 1055/tcp
2020-10-03 14:38:29

最近上报的IP列表

37.120.145.44 86.124.64.125 226.8.91.55 85.130.254.82
187.70.51.197 47.137.46.175 106.191.48.214 75.183.170.93
125.240.184.101 189.118.85.48 181.169.208.193 66.252.141.41
67.131.194.113 93.128.183.152 131.34.251.151 229.107.161.145
164.207.229.191 28.188.77.217 13.231.156.232 177.147.110.32