必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.198.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.198.21.			IN	A

;; AUTHORITY SECTION:
.			52	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021121901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 20 08:43:04 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
21.198.201.138.in-addr.arpa domain name pointer static.21.198.201.138.clients.your-server.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.198.201.138.in-addr.arpa	name = static.21.198.201.138.clients.your-server.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.5.36.120 attackspambots
Jun 23 09:49:21 MK-Soft-VM5 sshd\[31993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.5.36.120  user=root
Jun 23 09:49:23 MK-Soft-VM5 sshd\[31993\]: Failed password for root from 218.5.36.120 port 9323 ssh2
Jun 23 09:54:54 MK-Soft-VM5 sshd\[32010\]: Invalid user felix from 218.5.36.120 port 28361
...
2019-06-23 23:21:29
95.189.108.107 attack
23/tcp 37215/tcp...
[2019-06-14/23]6pkt,2pt.(tcp)
2019-06-23 23:23:16
191.53.200.63 attackspam
SMTP-sasl brute force
...
2019-06-23 22:36:56
80.82.78.4 attackspambots
Many RDP login attempts detected by IDS script
2019-06-23 23:19:02
213.32.12.3 attackbotsspam
ssh failed login
2019-06-23 23:32:05
23.94.16.121 attack
scan z
2019-06-23 23:19:40
104.236.246.16 attackbotsspam
$f2bV_matches
2019-06-23 23:30:13
119.201.109.155 attackbotsspam
2019-06-23T15:32:37.8922201240 sshd\[25861\]: Invalid user hadoop from 119.201.109.155 port 54806
2019-06-23T15:32:37.8996791240 sshd\[25861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.109.155
2019-06-23T15:32:40.0434971240 sshd\[25861\]: Failed password for invalid user hadoop from 119.201.109.155 port 54806 ssh2
...
2019-06-23 22:41:02
77.252.61.133 attackbots
NAME : PL-NETIA-20070201 CIDR : 77.252.0.0/14 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack Poland - block certain countries :) IP: 77.252.61.133  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 22:49:40
95.69.137.131 attack
SSH invalid-user multiple login try
2019-06-23 22:47:00
191.53.199.151 attackbotsspam
failed_logins
2019-06-23 22:37:28
217.128.177.33 attackbotsspam
SSH invalid-user multiple login attempts
2019-06-23 22:32:17
67.205.131.152 attackbotsspam
67.205.131.152 - - \[23/Jun/2019:11:53:54 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
67.205.131.152 - - \[23/Jun/2019:11:53:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
67.205.131.152 - - \[23/Jun/2019:11:54:06 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
67.205.131.152 - - \[23/Jun/2019:11:54:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
67.205.131.152 - - \[23/Jun/2019:11:54:18 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
67.205.131.152 - - \[23/Jun/2019:11:54:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:6
2019-06-23 23:27:37
87.116.216.82 attackbots
port scan and connect, tcp 23 (telnet)
2019-06-23 22:58:51
209.97.161.96 attack
209.97.161.96 - - \[23/Jun/2019:11:54:18 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.161.96 - - \[23/Jun/2019:11:54:18 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.161.96 - - \[23/Jun/2019:11:54:25 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.161.96 - - \[23/Jun/2019:11:54:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.161.96 - - \[23/Jun/2019:11:54:37 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.161.96 - - \[23/Jun/2019:11:54:42 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-23 23:24:32

最近上报的IP列表

101.32.47.208 216.208.243.52 216.208.243.20 78.10.140.91
167.114.29.166 73.34.225.66 222.90.103.179 114.99.11.80
178.63.103.218 103.197.198.27 105.106.143.229 59.111.198.227
82.215.102.106 96.255.143.42 54.187.132.36 2.57.122.47
10.142.144.206 10.194.91.143 174.138.21.185 139.12.225.153