必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.224.106.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.224.106.172.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 21:16:44 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 172.106.224.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.106.224.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
158.69.192.147 attack
Sep 15 19:48:12 meumeu sshd[10288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.147 
Sep 15 19:48:14 meumeu sshd[10288]: Failed password for invalid user ha from 158.69.192.147 port 43834 ssh2
Sep 15 19:52:23 meumeu sshd[10857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.147 
...
2019-09-16 01:55:21
200.77.186.219 attackspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-16 01:11:27
106.12.120.58 attackspam
Sep 15 12:37:08 ny01 sshd[17287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.58
Sep 15 12:37:10 ny01 sshd[17287]: Failed password for invalid user onie from 106.12.120.58 port 44150 ssh2
Sep 15 12:40:52 ny01 sshd[17902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.58
2019-09-16 01:10:56
128.199.54.252 attackbots
Sep 15 16:21:55 nextcloud sshd\[22122\]: Invalid user ubuntu from 128.199.54.252
Sep 15 16:21:55 nextcloud sshd\[22122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.54.252
Sep 15 16:21:58 nextcloud sshd\[22122\]: Failed password for invalid user ubuntu from 128.199.54.252 port 35244 ssh2
...
2019-09-16 01:40:53
89.28.32.203 attackspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-16 01:50:17
192.99.68.159 attack
Sep 15 20:15:33 yabzik sshd[32681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.68.159
Sep 15 20:15:35 yabzik sshd[32681]: Failed password for invalid user testmei from 192.99.68.159 port 38818 ssh2
Sep 15 20:19:42 yabzik sshd[1646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.68.159
2019-09-16 01:28:21
185.140.29.94 attackspambots
Sep 15 18:43:23 master sshd[28024]: Failed password for invalid user accepted from 185.140.29.94 port 36088 ssh2
Sep 15 18:48:40 master sshd[28043]: Failed password for invalid user takahashi from 185.140.29.94 port 33768 ssh2
Sep 15 18:52:31 master sshd[28047]: Failed password for invalid user oracle from 185.140.29.94 port 50226 ssh2
Sep 15 18:56:19 master sshd[28053]: Failed password for invalid user wp from 185.140.29.94 port 38288 ssh2
Sep 15 19:00:13 master sshd[28359]: Failed password for invalid user s0931 from 185.140.29.94 port 54422 ssh2
Sep 15 19:04:15 master sshd[28365]: Failed password for invalid user saul from 185.140.29.94 port 43128 ssh2
Sep 15 19:08:10 master sshd[28381]: Failed password for invalid user java from 185.140.29.94 port 59960 ssh2
2019-09-16 01:17:06
177.44.18.96 attack
SPF Fail sender not permitted to send mail for @mastercabo.com.br / Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-16 01:27:20
167.71.199.12 attackspambots
Sep 15 19:13:14 MK-Soft-Root2 sshd\[32366\]: Invalid user mathez from 167.71.199.12 port 51704
Sep 15 19:13:14 MK-Soft-Root2 sshd\[32366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.199.12
Sep 15 19:13:17 MK-Soft-Root2 sshd\[32366\]: Failed password for invalid user mathez from 167.71.199.12 port 51704 ssh2
...
2019-09-16 01:21:07
92.222.216.71 attack
Sep 15 19:41:25 MK-Soft-Root1 sshd\[14706\]: Invalid user osmc from 92.222.216.71 port 35512
Sep 15 19:41:25 MK-Soft-Root1 sshd\[14706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.71
Sep 15 19:41:27 MK-Soft-Root1 sshd\[14706\]: Failed password for invalid user osmc from 92.222.216.71 port 35512 ssh2
...
2019-09-16 01:56:06
177.84.22.181 attackbotsspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-16 01:53:03
114.32.153.15 attackspam
k+ssh-bruteforce
2019-09-16 01:04:51
193.32.160.135 attackspam
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.145\]\>
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.145\]\>
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.145\]\>
Sep 15 18:16:24 relay postfix/smtpd\[2612\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.135\]: 554 5.7.1 \
...
2019-09-16 01:44:02
167.71.203.150 attackbots
SSH Brute Force
2019-09-16 01:09:54
62.210.178.245 attackbotsspam
Sep 15 18:45:10 nextcloud sshd\[11135\]: Invalid user admin from 62.210.178.245
Sep 15 18:45:10 nextcloud sshd\[11135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.178.245
Sep 15 18:45:12 nextcloud sshd\[11135\]: Failed password for invalid user admin from 62.210.178.245 port 45122 ssh2
...
2019-09-16 01:41:21

最近上报的IP列表

155.136.36.96 14.62.98.169 127.179.238.4 96.74.136.29
237.115.159.1 148.219.194.207 62.49.161.226 66.99.101.111
50.230.224.103 180.138.150.129 55.73.184.7 73.143.153.46
7.196.232.104 205.37.34.189 47.231.91.168 128.31.102.83
247.41.17.142 184.37.73.94 87.190.244.35 65.75.193.59