必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.204.66.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.204.66.2.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:40:46 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 2.66.204.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.66.204.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.97.241.37 attackspam
Sep  8 04:42:19 ns382633 sshd\[23233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 04:42:21 ns382633 sshd\[23233\]: Failed password for root from 138.97.241.37 port 47262 ssh2
Sep  8 04:47:18 ns382633 sshd\[24132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 04:47:20 ns382633 sshd\[24132\]: Failed password for root from 138.97.241.37 port 58364 ssh2
Sep  8 04:51:08 ns382633 sshd\[24920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
2020-09-08 13:11:24
218.92.0.247 attackbotsspam
Sep  7 19:16:19 hanapaa sshd\[15915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
Sep  7 19:16:21 hanapaa sshd\[15915\]: Failed password for root from 218.92.0.247 port 53367 ssh2
Sep  7 19:16:24 hanapaa sshd\[15915\]: Failed password for root from 218.92.0.247 port 53367 ssh2
Sep  7 19:16:41 hanapaa sshd\[15919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
Sep  7 19:16:44 hanapaa sshd\[15919\]: Failed password for root from 218.92.0.247 port 17154 ssh2
2020-09-08 13:20:01
220.132.186.178 attack
Icarus honeypot on github
2020-09-08 13:16:59
138.91.184.167 attackbots
WordPress XMLRPC scan :: 138.91.184.167 0.340 - [08/Sep/2020:00:22:57  0000] www.[censored_1] "POST //xmlrpc.php HTTP/1.1" 503 18229 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" "HTTP/1.1"
2020-09-08 13:32:18
95.167.178.149 attackspambots
95.167.178.149 (RU/Russia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  7 19:54:35 server5 sshd[20590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.178.149  user=root
Sep  7 19:54:34 server5 sshd[20586]: Failed password for root from 164.132.54.215 port 59464 ssh2
Sep  7 19:49:00 server5 sshd[18280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.138.148  user=root
Sep  7 19:49:02 server5 sshd[18280]: Failed password for root from 193.112.138.148 port 54412 ssh2
Sep  7 19:45:27 server5 sshd[16669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.247.238  user=root
Sep  7 19:45:29 server5 sshd[16669]: Failed password for root from 142.93.247.238 port 49712 ssh2

IP Addresses Blocked:
2020-09-08 13:16:33
192.241.235.210 attack
/wp-load.php?wp-blog-header=1&daksldlkdsadas=1
2020-09-08 13:22:26
58.187.9.166 attackbots
Unauthorised access (Sep  7) SRC=58.187.9.166 LEN=40 TTL=245 ID=18868 TCP DPT=445 WINDOW=1024 SYN
2020-09-08 13:02:03
144.217.72.135 attackbots
5 failed smtp login attempts in 3600s
2020-09-08 13:18:10
51.75.202.218 attackbotsspam
2020-09-08T03:40:33.148790ks3355764 sshd[28382]: Invalid user ftpuser from 51.75.202.218 port 41852
2020-09-08T03:40:35.049405ks3355764 sshd[28382]: Failed password for invalid user ftpuser from 51.75.202.218 port 41852 ssh2
...
2020-09-08 13:35:12
120.53.24.160 attackspam
(sshd) Failed SSH login from 120.53.24.160 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  8 00:19:24 optimus sshd[972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.24.160  user=root
Sep  8 00:19:27 optimus sshd[972]: Failed password for root from 120.53.24.160 port 35840 ssh2
Sep  8 00:24:13 optimus sshd[3151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.24.160  user=root
Sep  8 00:24:15 optimus sshd[3151]: Failed password for root from 120.53.24.160 port 60120 ssh2
Sep  8 00:29:04 optimus sshd[5434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.24.160  user=root
2020-09-08 13:09:06
197.248.147.79 spamattackproxynormal
spamming
2020-09-08 13:16:03
83.97.20.35 attackspam
2020-09-07 11:11 Reject access to port(s):873,49154 2 times a day
2020-09-08 13:23:46
115.159.153.180 attackbots
$f2bV_matches
2020-09-08 13:09:38
217.171.92.195 attackspam
1599497676 - 09/07/2020 18:54:36 Host: 217.171.92.195/217.171.92.195 Port: 445 TCP Blocked
2020-09-08 13:03:45
103.18.169.58 attackspam
lee-12 : Block return, carriage return, ... characters=>/appels-d-offres?site=3'A=0(')
2020-09-08 13:30:27

最近上报的IP列表

138.204.65.133 138.204.67.234 118.175.228.206 138.204.59.67
138.204.69.129 138.204.69.136 138.204.69.140 138.204.69.146
138.204.69.144 138.204.69.164 138.204.69.165 118.175.228.207
138.204.69.16 138.204.69.110 138.204.69.174 138.204.69.176
138.204.69.178 118.175.228.208 138.204.69.207 138.204.69.190