必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Salerno

省份(region): Regione Campania

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.41.54.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.41.54.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 18:28:28 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
Host 18.54.41.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.54.41.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.119.41.54 attackspam
15 attempts against mh_ha-mag-login-ban on crop
2020-04-26 02:58:52
35.229.216.125 attack
Apr 25 19:20:03 gw1 sshd[32049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.229.216.125
Apr 25 19:20:06 gw1 sshd[32049]: Failed password for invalid user super from 35.229.216.125 port 57432 ssh2
...
2020-04-26 02:39:10
41.182.149.104 attackspambots
Email rejected due to spam filtering
2020-04-26 02:24:07
95.111.74.98 attackbotsspam
(sshd) Failed SSH login from 95.111.74.98 (BG/Bulgaria/ip-95-111-74-98.home.megalan.bg): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 25 20:13:12 amsweb01 sshd[14121]: Invalid user elsdilokullari from 95.111.74.98 port 51478
Apr 25 20:13:14 amsweb01 sshd[14121]: Failed password for invalid user elsdilokullari from 95.111.74.98 port 51478 ssh2
Apr 25 20:23:21 amsweb01 sshd[15340]: Invalid user deploy from 95.111.74.98 port 59848
Apr 25 20:23:22 amsweb01 sshd[15340]: Failed password for invalid user deploy from 95.111.74.98 port 59848 ssh2
Apr 25 20:27:22 amsweb01 sshd[15772]: Invalid user test from 95.111.74.98 port 43302
2020-04-26 02:28:44
144.131.134.105 attackbotsspam
Apr 25 18:30:45 scw-6657dc sshd[27340]: Failed password for gnats from 144.131.134.105 port 41377 ssh2
Apr 25 18:30:45 scw-6657dc sshd[27340]: Failed password for gnats from 144.131.134.105 port 41377 ssh2
Apr 25 18:36:01 scw-6657dc sshd[27504]: Invalid user shimizu from 144.131.134.105 port 33290
...
2020-04-26 02:43:37
113.66.226.152 attack
Email rejected due to spam filtering
2020-04-26 02:55:07
86.111.95.131 attackspam
k+ssh-bruteforce
2020-04-26 02:45:05
112.33.16.34 attack
Apr 25 19:04:41 itv-usvr-01 sshd[21436]: Invalid user ftp1ftp1 from 112.33.16.34
Apr 25 19:04:41 itv-usvr-01 sshd[21436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.16.34
Apr 25 19:04:41 itv-usvr-01 sshd[21436]: Invalid user ftp1ftp1 from 112.33.16.34
Apr 25 19:04:43 itv-usvr-01 sshd[21436]: Failed password for invalid user ftp1ftp1 from 112.33.16.34 port 36236 ssh2
Apr 25 19:12:24 itv-usvr-01 sshd[21880]: Invalid user commons from 112.33.16.34
2020-04-26 02:30:08
47.74.245.246 attackbotsspam
2020-04-25T12:21:33.763560linuxbox-skyline sshd[66754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.245.246  user=root
2020-04-25T12:21:35.906356linuxbox-skyline sshd[66754]: Failed password for root from 47.74.245.246 port 57592 ssh2
...
2020-04-26 02:41:29
77.28.96.206 attackbots
TCP src-port=40663   dst-port=25   Listed on   abuseat-org barracuda zen-spamhaus       (Project Honey Pot rated Suspicious & Spammer)   (251)
2020-04-26 03:00:52
104.236.211.129 attackbotsspam
Apr 25 02:54:50 foo sshd[22303]: Did not receive identification string from 104.236.211.129
Apr 25 02:57:31 foo sshd[22345]: Invalid user pi from 104.236.211.129
Apr 25 02:57:33 foo sshd[22345]: Failed password for invalid user pi from 104.236.211.129 port 33786 ssh2
Apr 25 02:57:33 foo sshd[22345]: Received disconnect from 104.236.211.129: 11: Normal Shutdown, Thank you for playing [preauth]
Apr 25 02:58:26 foo sshd[22360]: Invalid user pi from 104.236.211.129
Apr 25 02:58:28 foo sshd[22360]: Failed password for invalid user pi from 104.236.211.129 port 45689 ssh2
Apr 25 02:58:28 foo sshd[22360]: Received disconnect from 104.236.211.129: 11: Normal Shutdown, Thank you for playing [preauth]
Apr 25 02:59:27 foo sshd[22366]: Failed password for r.r from 104.236.211.129 port 57592 ssh2
Apr 25 02:59:27 foo sshd[22366]: Received disconnect from 104.236.211.129: 11: Normal Shutdown, Thank you for playing [preauth]
Apr 25 03:00:24 foo sshd[22374]: Failed password for r.r from ........
-------------------------------
2020-04-26 02:24:43
165.227.187.185 attackbotsspam
2020-04-25T20:24:20.028513vps751288.ovh.net sshd\[22557\]: Invalid user dave from 165.227.187.185 port 47516
2020-04-25T20:24:20.036914vps751288.ovh.net sshd\[22557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.187.185
2020-04-25T20:24:21.772625vps751288.ovh.net sshd\[22557\]: Failed password for invalid user dave from 165.227.187.185 port 47516 ssh2
2020-04-25T20:26:56.002395vps751288.ovh.net sshd\[22569\]: Invalid user c from 165.227.187.185 port 40160
2020-04-25T20:26:56.011463vps751288.ovh.net sshd\[22569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.187.185
2020-04-26 02:33:22
198.108.67.36 attackspambots
8858/tcp 2078/tcp 47001/tcp...
[2020-02-25/04-24]101pkt,95pt.(tcp)
2020-04-26 02:44:07
167.114.251.164 attack
Found by fail2ban
2020-04-26 02:49:47
122.165.146.75 attack
Tried sshing with brute force.
2020-04-26 02:35:23

最近上报的IP列表

250.141.137.127 157.80.247.73 249.30.50.188 252.191.145.136
159.228.103.104 16.199.43.106 161.34.94.238 64.242.195.2
58.16.19.110 208.163.251.23 225.244.83.144 239.116.1.197
135.230.87.25 180.131.69.70 39.107.213.19 162.126.82.250
16.12.142.203 77.32.127.61 223.11.72.174 153.53.192.229