必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.9.114.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.9.114.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:56:38 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 43.114.9.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.114.9.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
154.85.35.253 attackbotsspam
2020-06-22T22:56:31.345053abusebot-7.cloudsearch.cf sshd[4762]: Invalid user liam from 154.85.35.253 port 48072
2020-06-22T22:56:31.350278abusebot-7.cloudsearch.cf sshd[4762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.35.253
2020-06-22T22:56:31.345053abusebot-7.cloudsearch.cf sshd[4762]: Invalid user liam from 154.85.35.253 port 48072
2020-06-22T22:56:32.861312abusebot-7.cloudsearch.cf sshd[4762]: Failed password for invalid user liam from 154.85.35.253 port 48072 ssh2
2020-06-22T23:04:06.247776abusebot-7.cloudsearch.cf sshd[4954]: Invalid user nrpe from 154.85.35.253 port 45514
2020-06-22T23:04:06.251478abusebot-7.cloudsearch.cf sshd[4954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.35.253
2020-06-22T23:04:06.247776abusebot-7.cloudsearch.cf sshd[4954]: Invalid user nrpe from 154.85.35.253 port 45514
2020-06-22T23:04:08.224357abusebot-7.cloudsearch.cf sshd[4954]: Failed password for
...
2020-06-23 08:28:55
194.26.29.21 attackspambots
Unauthorized connection attempt from IP address 194.26.29.21 on Port 3306(MYSQL)
2020-06-23 08:10:15
49.233.105.41 attackbotsspam
Jun 22 22:47:29 srv-ubuntu-dev3 sshd[62982]: Invalid user pascal from 49.233.105.41
Jun 22 22:47:29 srv-ubuntu-dev3 sshd[62982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.105.41
Jun 22 22:47:29 srv-ubuntu-dev3 sshd[62982]: Invalid user pascal from 49.233.105.41
Jun 22 22:47:31 srv-ubuntu-dev3 sshd[62982]: Failed password for invalid user pascal from 49.233.105.41 port 53480 ssh2
Jun 22 22:51:37 srv-ubuntu-dev3 sshd[63633]: Invalid user nvm from 49.233.105.41
Jun 22 22:51:37 srv-ubuntu-dev3 sshd[63633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.105.41
Jun 22 22:51:37 srv-ubuntu-dev3 sshd[63633]: Invalid user nvm from 49.233.105.41
Jun 22 22:51:39 srv-ubuntu-dev3 sshd[63633]: Failed password for invalid user nvm from 49.233.105.41 port 47020 ssh2
Jun 22 22:55:34 srv-ubuntu-dev3 sshd[64215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233
...
2020-06-23 07:50:54
203.159.249.215 attack
Invalid user upload from 203.159.249.215 port 47228
2020-06-23 08:06:55
175.101.60.101 attackbotsspam
Port probing on unauthorized port 27699
2020-06-23 07:59:21
184.105.247.194 attackbots
Unauthorized connection attempt detected from IP address 184.105.247.194 to port 445
2020-06-23 08:16:19
140.249.30.203 attackbots
2020-06-22T23:58:40.966762shield sshd\[7727\]: Invalid user crh from 140.249.30.203 port 60442
2020-06-22T23:58:40.970634shield sshd\[7727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.30.203
2020-06-22T23:58:43.073353shield sshd\[7727\]: Failed password for invalid user crh from 140.249.30.203 port 60442 ssh2
2020-06-23T00:02:24.188498shield sshd\[9052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.30.203  user=root
2020-06-23T00:02:26.381014shield sshd\[9052\]: Failed password for root from 140.249.30.203 port 53432 ssh2
2020-06-23 08:08:00
165.169.241.28 attackbots
$f2bV_matches
2020-06-23 08:26:42
159.203.168.167 attackspambots
$f2bV_matches
2020-06-23 08:25:08
104.248.161.10 attackspambots
Invalid user test2 from 104.248.161.10 port 34810
2020-06-23 08:20:17
139.162.23.47 attack
 TCP (SYN) 139.162.23.47:49971 -> port 28928, len 44
2020-06-23 08:06:23
185.85.162.242 attackspambots
0,48-01/01 [bc01/m16] PostRequest-Spammer scoring: brussels
2020-06-23 08:02:06
61.72.255.26 attackbots
Jun 22 18:13:48 ny01 sshd[13213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.255.26
Jun 22 18:13:50 ny01 sshd[13213]: Failed password for invalid user xerox from 61.72.255.26 port 51548 ssh2
Jun 22 18:17:33 ny01 sshd[13656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.255.26
2020-06-23 08:18:21
58.233.240.94 attack
Jun 22 21:30:22 rocket sshd[26831]: Failed password for root from 58.233.240.94 port 60296 ssh2
Jun 22 21:33:52 rocket sshd[26855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.233.240.94
...
2020-06-23 08:31:25
70.37.56.225 attackbotsspam
Invalid user patria from 70.37.56.225 port 36658
2020-06-23 07:58:49

最近上报的IP列表

199.40.2.35 76.173.254.180 73.134.212.71 8.34.86.251
142.7.86.13 235.128.238.178 251.0.24.77 14.117.198.140
19.40.55.15 38.254.203.208 64.251.20.237 12.236.182.84
123.66.230.109 172.57.67.59 149.159.75.93 41.164.219.233
57.194.184.247 59.22.251.251 65.133.6.54 39.196.230.187