必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.222.34.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34771
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.222.34.243.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:23:55 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 243.34.222.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.34.222.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.209.40.69 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 10:10:26,269 INFO [amun_request_handler] PortScan Detected on Port: 445 (85.209.40.69)
2019-09-08 01:15:25
106.12.221.86 attack
Sep  7 05:46:26 php1 sshd\[22765\]: Invalid user mcadmin from 106.12.221.86
Sep  7 05:46:26 php1 sshd\[22765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.86
Sep  7 05:46:28 php1 sshd\[22765\]: Failed password for invalid user mcadmin from 106.12.221.86 port 52970 ssh2
Sep  7 05:50:17 php1 sshd\[23090\]: Invalid user developer1234 from 106.12.221.86
Sep  7 05:50:17 php1 sshd\[23090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.86
2019-09-08 00:56:42
82.99.196.134 attack
Unauthorized connection attempt from IP address 82.99.196.134 on Port 445(SMB)
2019-09-08 01:45:17
140.143.249.234 attack
Sep  7 18:04:48 nextcloud sshd\[6867\]: Invalid user tsts from 140.143.249.234
Sep  7 18:04:48 nextcloud sshd\[6867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.234
Sep  7 18:04:50 nextcloud sshd\[6867\]: Failed password for invalid user tsts from 140.143.249.234 port 58062 ssh2
...
2019-09-08 01:28:25
167.88.10.229 attackspambots
Received: from shortedtim.kueller-koermani.biz (167.88.10.229)
mike@hiketraffic.tech
mailto:nisha.pims@gmail.com
2019-09-08 01:37:36
181.129.14.218 attack
Sep  7 16:46:02 hcbbdb sshd\[31666\]: Invalid user its from 181.129.14.218
Sep  7 16:46:02 hcbbdb sshd\[31666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
Sep  7 16:46:04 hcbbdb sshd\[31666\]: Failed password for invalid user its from 181.129.14.218 port 23184 ssh2
Sep  7 16:51:22 hcbbdb sshd\[32238\]: Invalid user 123456 from 181.129.14.218
Sep  7 16:51:22 hcbbdb sshd\[32238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
2019-09-08 00:51:29
207.154.218.16 attack
Sep  7 11:52:54 game-panel sshd[10211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.218.16
Sep  7 11:52:56 game-panel sshd[10211]: Failed password for invalid user admin1 from 207.154.218.16 port 48596 ssh2
Sep  7 11:57:29 game-panel sshd[10377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.218.16
2019-09-08 01:23:00
159.65.219.48 attack
Sep  7 01:45:47 lcprod sshd\[18760\]: Invalid user daniel from 159.65.219.48
Sep  7 01:45:47 lcprod sshd\[18760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.48
Sep  7 01:45:49 lcprod sshd\[18760\]: Failed password for invalid user daniel from 159.65.219.48 port 57058 ssh2
Sep  7 01:51:21 lcprod sshd\[19265\]: Invalid user teamspeak3 from 159.65.219.48
Sep  7 01:51:21 lcprod sshd\[19265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.48
2019-09-08 00:27:59
46.229.168.149 attackspambots
Automatic report - Banned IP Access
2019-09-08 01:52:11
122.171.25.106 attackspambots
Sep  7 07:12:28 hcbb sshd\[11407\]: Invalid user testftp from 122.171.25.106
Sep  7 07:12:28 hcbb sshd\[11407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.171.25.106
Sep  7 07:12:29 hcbb sshd\[11407\]: Failed password for invalid user testftp from 122.171.25.106 port 36840 ssh2
Sep  7 07:18:23 hcbb sshd\[11900\]: Invalid user ubuntu from 122.171.25.106
Sep  7 07:18:23 hcbb sshd\[11900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.171.25.106
2019-09-08 01:34:24
177.128.80.73 attackbotsspam
Sep  7 17:14:39 xeon sshd[4906]: Failed password for postgres from 177.128.80.73 port 36420 ssh2
2019-09-08 01:49:06
159.203.199.200 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 10:10:04,456 INFO [amun_request_handler] PortScan Detected on Port: 143 (159.203.199.200)
2019-09-08 01:38:15
201.116.12.217 attackspambots
Jan 16 21:46:05 vtv3 sshd\[25596\]: Invalid user mailtest from 201.116.12.217 port 50802
Jan 16 21:46:05 vtv3 sshd\[25596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.12.217
Jan 16 21:46:07 vtv3 sshd\[25596\]: Failed password for invalid user mailtest from 201.116.12.217 port 50802 ssh2
Jan 16 21:50:46 vtv3 sshd\[27143\]: Invalid user test from 201.116.12.217 port 37244
Jan 16 21:50:46 vtv3 sshd\[27143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.12.217
Jan 25 04:12:59 vtv3 sshd\[11169\]: Invalid user sftp from 201.116.12.217 port 41935
Jan 25 04:12:59 vtv3 sshd\[11169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.12.217
Jan 25 04:13:01 vtv3 sshd\[11169\]: Failed password for invalid user sftp from 201.116.12.217 port 41935 ssh2
Jan 25 04:17:25 vtv3 sshd\[12470\]: Invalid user om from 201.116.12.217 port 57580
Jan 25 04:17:25 vtv3 sshd\[12470
2019-09-08 01:35:42
115.49.146.71 attackspam
Unauthorised access (Sep  7) SRC=115.49.146.71 LEN=40 TTL=50 ID=49107 TCP DPT=23 WINDOW=10911 SYN
2019-09-08 01:40:31
123.206.18.14 attackbotsspam
2019-09-07T17:33:30.540828abusebot-8.cloudsearch.cf sshd\[4836\]: Invalid user password from 123.206.18.14 port 48420
2019-09-08 01:39:09

最近上报的IP列表

42.31.43.124 96.154.136.189 218.114.72.139 116.149.83.245
206.25.184.72 248.139.63.89 43.124.162.0 63.193.48.116
79.204.168.31 82.5.255.57 124.20.173.145 58.200.67.140
216.70.251.202 241.249.160.10 74.178.221.93 18.1.224.183
199.143.223.9 9.134.34.75 129.201.11.17 29.87.112.255