必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.230.213.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.230.213.242.		IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052401 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 05:27:21 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 242.213.230.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.213.230.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.217.168.98 attackbots
Spam
2020-05-14 05:57:04
106.13.52.234 attackspambots
bruteforce detected
2020-05-14 05:56:21
137.117.170.24 attackspambots
05/13/2020-18:13:27.713593 137.117.170.24 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-14 06:14:11
222.186.175.167 attackbots
$f2bV_matches
2020-05-14 06:32:48
103.76.190.210 attack
Brute force attempt
2020-05-14 06:03:40
80.82.77.33 attack
16992/tcp 9191/tcp 5985/tcp...
[2020-03-13/05-13]595pkt,255pt.(tcp),48pt.(udp)
2020-05-14 05:54:10
51.83.45.65 attack
May 14 00:14:52 vps639187 sshd\[31874\]: Invalid user zym from 51.83.45.65 port 41042
May 14 00:14:52 vps639187 sshd\[31874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.65
May 14 00:14:54 vps639187 sshd\[31874\]: Failed password for invalid user zym from 51.83.45.65 port 41042 ssh2
...
2020-05-14 06:21:34
35.198.119.117 attackspam
Invalid user spring from 35.198.119.117 port 39180
2020-05-14 06:13:26
82.209.209.202 attackspam
Invalid user 22b from 82.209.209.202 port 40124
2020-05-14 06:07:00
212.129.152.27 attack
SSH Invalid Login
2020-05-14 05:59:28
37.49.226.211 attackspambots
May 14 00:14:53 srv01 sshd[24687]: Did not receive identification string from 37.49.226.211 port 58092
May 14 00:15:09 srv01 sshd[24705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.211  user=root
May 14 00:15:12 srv01 sshd[24705]: Failed password for root from 37.49.226.211 port 49942 ssh2
May 14 00:15:23 srv01 sshd[24717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.211  user=root
May 14 00:15:25 srv01 sshd[24717]: Failed password for root from 37.49.226.211 port 47262 ssh2
...
2020-05-14 06:30:01
122.51.49.32 attackbots
May 13 22:08:51 ip-172-31-61-156 sshd[30976]: Failed password for invalid user vegeta from 122.51.49.32 port 48658 ssh2
May 13 22:08:49 ip-172-31-61-156 sshd[30976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.32
May 13 22:08:49 ip-172-31-61-156 sshd[30976]: Invalid user vegeta from 122.51.49.32
May 13 22:08:51 ip-172-31-61-156 sshd[30976]: Failed password for invalid user vegeta from 122.51.49.32 port 48658 ssh2
May 13 22:14:41 ip-172-31-61-156 sshd[31280]: Invalid user adm from 122.51.49.32
...
2020-05-14 06:22:43
203.150.113.144 attackspambots
Invalid user postgres from 203.150.113.144 port 52112
2020-05-14 06:25:20
176.56.56.132 attack
Wordpress Admin Login attack
2020-05-14 06:28:37
191.252.195.45 attackbots
May 13 18:02:45 firewall sshd[31792]: Failed password for invalid user apotre from 191.252.195.45 port 39534 ssh2
May 13 18:08:28 firewall sshd[31906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.195.45  user=root
May 13 18:08:29 firewall sshd[31906]: Failed password for root from 191.252.195.45 port 33158 ssh2
...
2020-05-14 05:59:55

最近上报的IP列表

114.141.201.100 114.141.204.11 114.141.204.123 114.141.27.135
114.142.158.40 114.142.159.22 114.142.161.153 114.142.171.30
114.142.219.209 114.143.57.12 114.143.57.164 114.147.29.117
68.155.86.57 69.190.180.57 114.147.35.136 114.156.40.42
114.160.88.98 114.166.67.220 114.179.15.97 114.179.215.234