必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.159.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43410
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.159.97.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:37:24 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
97.159.201.138.in-addr.arpa domain name pointer static.97.159.201.138.clients.your-server.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.159.201.138.in-addr.arpa	name = static.97.159.201.138.clients.your-server.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.167.141 attack
Apr 25 19:50:05 debian-2gb-nbg1-2 kernel: \[10095944.671759\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.167.141 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=3392 PROTO=TCP SPT=55793 DPT=5068 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-26 01:54:33
1.52.30.135 attackbotsspam
Unauthorized connection attempt detected from IP address 1.52.30.135 to port 80 [T]
2020-04-26 01:51:26
79.77.48.143 attackbotsspam
79.77.48.143 has been banned for [spam]
...
2020-04-26 02:18:01
129.213.161.202 attackbots
General vulnerability scan.
2020-04-26 02:09:58
128.0.129.192 attack
Apr 21 21:01:27 server4-pi sshd[2273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.129.192 
Apr 21 21:01:28 server4-pi sshd[2273]: Failed password for invalid user yn from 128.0.129.192 port 54576 ssh2
2020-04-26 01:48:02
91.241.19.42 attackbotsspam
2020-04-25T12:44:16.179045abusebot-5.cloudsearch.cf sshd[18771]: Invalid user admin from 91.241.19.42 port 14063
2020-04-25T12:44:16.194606abusebot-5.cloudsearch.cf sshd[18771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.241.19.42
2020-04-25T12:44:16.179045abusebot-5.cloudsearch.cf sshd[18771]: Invalid user admin from 91.241.19.42 port 14063
2020-04-25T12:44:18.148774abusebot-5.cloudsearch.cf sshd[18771]: Failed password for invalid user admin from 91.241.19.42 port 14063 ssh2
2020-04-25T12:44:18.297623abusebot-5.cloudsearch.cf sshd[18773]: Invalid user admin from 91.241.19.42 port 14618
2020-04-25T12:44:18.310821abusebot-5.cloudsearch.cf sshd[18773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.241.19.42
2020-04-25T12:44:18.297623abusebot-5.cloudsearch.cf sshd[18773]: Invalid user admin from 91.241.19.42 port 14618
2020-04-25T12:44:20.204947abusebot-5.cloudsearch.cf sshd[18773]: Failed passwo
...
2020-04-26 02:23:40
188.226.167.212 attack
Apr 25 14:04:54 DAAP sshd[20439]: Invalid user asakura from 188.226.167.212 port 35114
Apr 25 14:04:54 DAAP sshd[20439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.167.212
Apr 25 14:04:54 DAAP sshd[20439]: Invalid user asakura from 188.226.167.212 port 35114
Apr 25 14:04:56 DAAP sshd[20439]: Failed password for invalid user asakura from 188.226.167.212 port 35114 ssh2
Apr 25 14:13:10 DAAP sshd[20572]: Invalid user ftpadmin from 188.226.167.212 port 35672
...
2020-04-26 01:58:04
92.242.126.154 attackspambots
proto=tcp  .  spt=43177  .  dpt=25  .     Listed on    dnsbl-sorbs plus abuseat-org and barracuda     (255)
2020-04-26 02:21:47
108.189.182.190 attackbotsspam
Automatic report - Port Scan Attack
2020-04-26 02:10:29
111.231.226.87 attackspambots
Apr 25 17:31:27 ns381471 sshd[16564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.226.87
Apr 25 17:31:29 ns381471 sshd[16564]: Failed password for invalid user bot2 from 111.231.226.87 port 41368 ssh2
2020-04-26 02:20:47
218.88.164.159 attackspam
prod11
...
2020-04-26 01:51:41
150.107.207.137 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-04-26 02:07:45
46.34.227.238 attackbots
Email rejected due to spam filtering
2020-04-26 02:05:07
14.244.211.115 attackspam
1587816780 - 04/25/2020 14:13:00 Host: 14.244.211.115/14.244.211.115 Port: 445 TCP Blocked
2020-04-26 02:06:19
68.174.97.69 attackspam
1587816749 - 04/25/2020 14:12:29 Host: 68.174.97.69/68.174.97.69 Port: 445 TCP Blocked
2020-04-26 02:27:59

最近上报的IP列表

138.201.158.240 138.201.159.242 138.201.16.110 138.201.16.233
138.201.16.133 138.201.16.222 138.201.160.170 138.201.161.149
138.201.161.42 118.175.175.252 138.201.161.45 138.201.161.66
138.201.161.70 10.130.56.21 138.201.162.163 138.201.163.143
138.201.164.225 138.201.163.84 118.175.175.26 138.201.164.229