必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): Hetzner Online AG

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
Forbidden directory scan :: 2020/01/24 12:36:14 [error] 1008#1008: *738018 access forbidden by rule, client: 138.201.129.164, server: [censored_1], request: "GET /knowledge-base/tech-tips-tricks/... HTTP/1.1", host: "www.[censored_1]"
2020-01-24 23:56:17
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.129.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44041
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.201.129.164.		IN	A

;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012400 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 23:56:13 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
164.129.201.138.in-addr.arpa domain name pointer static.164.129.201.138.clients.your-server.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.129.201.138.in-addr.arpa	name = static.164.129.201.138.clients.your-server.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.18.237.223 attackspambots
20/6/25@00:16:25: FAIL: Alarm-Network address from=123.18.237.223
...
2020-06-25 12:56:19
111.125.70.22 attackspambots
20 attempts against mh-ssh on pluto
2020-06-25 13:14:57
51.105.7.70 attack
Invalid user charity from 51.105.7.70 port 53382
2020-06-25 12:53:59
1.212.118.130 attack
Jun 24 13:53:47 our-server-hostname sshd[3068]: Invalid user ds from 1.212.118.130
Jun 24 13:53:47 our-server-hostname sshd[3068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.212.118.130 
Jun 24 13:53:49 our-server-hostname sshd[3068]: Failed password for invalid user ds from 1.212.118.130 port 57375 ssh2
Jun 24 14:00:13 our-server-hostname sshd[4243]: Invalid user test1 from 1.212.118.130
Jun 24 14:00:13 our-server-hostname sshd[4243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.212.118.130 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1.212.118.130
2020-06-25 12:58:44
49.130.61.39 attackspambots
Distributed brute force attack
2020-06-25 13:02:02
75.130.124.90 attackspam
Jun 25 06:01:32 tuxlinux sshd[51580]: Invalid user xti from 75.130.124.90 port 65295
Jun 25 06:01:32 tuxlinux sshd[51580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90 
Jun 25 06:01:32 tuxlinux sshd[51580]: Invalid user xti from 75.130.124.90 port 65295
Jun 25 06:01:32 tuxlinux sshd[51580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90 
Jun 25 06:01:32 tuxlinux sshd[51580]: Invalid user xti from 75.130.124.90 port 65295
Jun 25 06:01:32 tuxlinux sshd[51580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90 
Jun 25 06:01:34 tuxlinux sshd[51580]: Failed password for invalid user xti from 75.130.124.90 port 65295 ssh2
...
2020-06-25 12:55:14
114.32.142.148 attackbotsspam
Port Scan detected!
...
2020-06-25 12:57:13
193.95.247.90 attack
2020-06-25T05:56:39.377665  sshd[31959]: Invalid user order from 193.95.247.90 port 50026
2020-06-25T05:56:39.393786  sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.95.247.90
2020-06-25T05:56:39.377665  sshd[31959]: Invalid user order from 193.95.247.90 port 50026
2020-06-25T05:56:41.187904  sshd[31959]: Failed password for invalid user order from 193.95.247.90 port 50026 ssh2
...
2020-06-25 12:42:12
139.155.82.119 attackbotsspam
2020-06-25T03:51:54.147926ionos.janbro.de sshd[31935]: Invalid user mysql from 139.155.82.119 port 36764
2020-06-25T03:51:56.591257ionos.janbro.de sshd[31935]: Failed password for invalid user mysql from 139.155.82.119 port 36764 ssh2
2020-06-25T03:54:06.789213ionos.janbro.de sshd[31945]: Invalid user nelson from 139.155.82.119 port 39430
2020-06-25T03:54:07.006456ionos.janbro.de sshd[31945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.82.119
2020-06-25T03:54:06.789213ionos.janbro.de sshd[31945]: Invalid user nelson from 139.155.82.119 port 39430
2020-06-25T03:54:08.796987ionos.janbro.de sshd[31945]: Failed password for invalid user nelson from 139.155.82.119 port 39430 ssh2
2020-06-25T03:56:21.954227ionos.janbro.de sshd[31959]: Invalid user ventura from 139.155.82.119 port 42098
2020-06-25T03:56:22.188777ionos.janbro.de sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.82.119
...
2020-06-25 12:48:22
111.160.46.10 attackspam
2020-06-25T05:13:17.157886mail.csmailer.org sshd[641]: Invalid user joker from 111.160.46.10 port 47120
2020-06-25T05:13:17.160835mail.csmailer.org sshd[641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.160.46.10
2020-06-25T05:13:17.157886mail.csmailer.org sshd[641]: Invalid user joker from 111.160.46.10 port 47120
2020-06-25T05:13:18.512387mail.csmailer.org sshd[641]: Failed password for invalid user joker from 111.160.46.10 port 47120 ssh2
2020-06-25T05:16:23.068640mail.csmailer.org sshd[1199]: Invalid user jdebruin from 111.160.46.10 port 40874
...
2020-06-25 13:20:37
51.89.68.141 attack
Failed password for root from 51.89.68.141 port 59248 ssh2
Invalid user mysql from 51.89.68.141 port 57214
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip141.ip-51-89-68.eu
Invalid user mysql from 51.89.68.141 port 57214
Failed password for invalid user mysql from 51.89.68.141 port 57214 ssh2
2020-06-25 12:57:44
222.186.42.7 attackspambots
Jun 25 14:47:15 localhost sshd[2885717]: Disconnected from 222.186.42.7 port 26038 [preauth]
...
2020-06-25 12:47:50
89.250.148.154 attack
Jun 24 21:55:10 dignus sshd[4469]: Failed password for root from 89.250.148.154 port 57116 ssh2
Jun 24 21:58:28 dignus sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.250.148.154  user=root
Jun 24 21:58:30 dignus sshd[4761]: Failed password for root from 89.250.148.154 port 56628 ssh2
Jun 24 22:01:47 dignus sshd[5075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.250.148.154  user=root
Jun 24 22:01:48 dignus sshd[5075]: Failed password for root from 89.250.148.154 port 56142 ssh2
...
2020-06-25 13:05:56
51.77.215.227 attack
Invalid user cms from 51.77.215.227 port 37338
2020-06-25 13:07:16
218.92.0.248 attackspambots
Jun 25 07:17:21 sso sshd[7912]: Failed password for root from 218.92.0.248 port 45296 ssh2
Jun 25 07:17:25 sso sshd[7912]: Failed password for root from 218.92.0.248 port 45296 ssh2
...
2020-06-25 13:19:32

最近上报的IP列表

84.203.33.126 10.3.84.189 218.28.141.91 206.189.81.62
105.112.224.85 132.145.92.151 34.228.214.164 27.221.97.4
5.27.186.71 190.195.15.240 79.33.46.5 149.129.34.166
103.221.235.159 45.143.222.221 3.231.222.198 192.144.191.17
37.48.122.47 198.8.81.92 47.247.72.33 81.174.139.145