必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.246.70.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.246.70.21.			IN	A

;; AUTHORITY SECTION:
.			233	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122501 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 26 10:41:07 CST 2021
;; MSG SIZE  rcvd: 106
HOST信息:
21.70.246.138.in-addr.arpa domain name pointer dhcp-138-246-70-21.dynamic.eduroam.mwn.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.70.246.138.in-addr.arpa	name = dhcp-138-246-70-21.dynamic.eduroam.mwn.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.255.246.27 attackspam
Multiple failed RDP login attempts
2019-10-17 14:14:55
171.244.43.52 attackspambots
Lines containing failures of 171.244.43.52
Oct 15 15:03:07 shared06 sshd[16529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.52  user=r.r
Oct 15 15:03:09 shared06 sshd[16529]: Failed password for r.r from 171.244.43.52 port 45514 ssh2
Oct 15 15:03:10 shared06 sshd[16529]: Received disconnect from 171.244.43.52 port 45514:11: Bye Bye [preauth]
Oct 15 15:03:10 shared06 sshd[16529]: Disconnected from authenticating user r.r 171.244.43.52 port 45514 [preauth]
Oct 15 15:14:52 shared06 sshd[20255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.52  user=r.r
Oct 15 15:14:54 shared06 sshd[20255]: Failed password for r.r from 171.244.43.52 port 48875 ssh2
Oct 15 15:14:55 shared06 sshd[20255]: Received disconnect from 171.244.43.52 port 48875:11: Bye Bye [preauth]
Oct 15 15:14:55 shared06 sshd[20255]: Disconnected from authenticating user r.r 171.244.43.52 port 48875 [preauth........
------------------------------
2019-10-17 14:28:06
195.31.160.73 attack
Oct 16 20:23:28 web9 sshd\[2120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.31.160.73  user=root
Oct 16 20:23:30 web9 sshd\[2120\]: Failed password for root from 195.31.160.73 port 58820 ssh2
Oct 16 20:27:18 web9 sshd\[2697\]: Invalid user qihaiyang from 195.31.160.73
Oct 16 20:27:18 web9 sshd\[2697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.31.160.73
Oct 16 20:27:20 web9 sshd\[2697\]: Failed password for invalid user qihaiyang from 195.31.160.73 port 44232 ssh2
2019-10-17 14:30:29
106.75.122.81 attackspam
Oct 17 07:28:38 * sshd[7250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.122.81
Oct 17 07:28:40 * sshd[7250]: Failed password for invalid user Cxsd1234 from 106.75.122.81 port 34926 ssh2
2019-10-17 14:19:59
31.204.181.238 attackspambots
0,36-05/06 [bc01/m03] concatform PostRequest-Spammer scoring: harare01_holz
2019-10-17 14:14:24
190.197.76.51 attackbots
(imapd) Failed IMAP login from 190.197.76.51 (BZ/Belize/-): 1 in the last 3600 secs
2019-10-17 14:11:57
36.157.58.171 attack
Fail2Ban - FTP Abuse Attempt
2019-10-17 14:19:09
85.15.226.122 attackbotsspam
...
2019-10-17 14:03:45
23.95.56.162 attackspam
10/17/2019-00:10:52.414761 23.95.56.162 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-17 14:27:12
179.52.21.11 attack
Oct 16 22:50:34 mailman postfix/smtpd[9522]: NOQUEUE: reject: RCPT from unknown[179.52.21.11]: 554 5.7.1 Service unavailable; Client host [179.52.21.11] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/179.52.21.11; from= to= proto=ESMTP helo=<[179.52.21.11]>
Oct 16 22:54:13 mailman postfix/smtpd[9612]: NOQUEUE: reject: RCPT from unknown[179.52.21.11]: 554 5.7.1 Service unavailable; Client host [179.52.21.11] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/179.52.21.11; from= to= proto=ESMTP helo=<[179.52.21.11]>
2019-10-17 14:15:15
180.106.81.168 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-17 14:33:11
110.185.106.195 attackbots
Oct 14 23:31:34 iago sshd[13855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.106.195  user=r.r
Oct 14 23:31:36 iago sshd[13855]: Failed password for r.r from 110.185.106.195 port 57212 ssh2
Oct 14 23:31:36 iago sshd[13856]: Received disconnect from 110.185.106.195: 11: Bye Bye


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=110.185.106.195
2019-10-17 14:32:01
222.186.175.161 attack
DATE:2019-10-17 07:39:24, IP:222.186.175.161, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-10-17 14:08:36
118.25.150.90 attack
2019-10-17T06:18:42.888095abusebot.cloudsearch.cf sshd\[13842\]: Invalid user grime from 118.25.150.90 port 49812
2019-10-17 14:33:35
191.115.17.196 attackbotsspam
Automatic report - Port Scan Attack
2019-10-17 14:30:07

最近上报的IP列表

105.10.132.236 70.237.221.152 253.56.6.9 150.247.76.246
176.205.160.90 151.228.160.25 19.109.0.111 16.15.72.165
134.227.0.168 72.175.12.221 162.249.201.84 232.189.176.233
101.140.214.145 225.218.99.163 86.183.6.80 217.185.168.17
175.240.228.95 225.201.195.47 55.119.96.51 226.43.36.16