必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): São João da Boa Vista

省份(region): Sao Paulo

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.94.47.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11213
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.94.47.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 12:14:33 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
66.47.94.138.in-addr.arpa domain name pointer untelecom.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.47.94.138.in-addr.arpa	name = untelecom.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.172.15 attackspambots
Aug 13 02:41:27 roadrisk sshd[32231]: Address 89.248.172.15 maps to no-reveeclipse-dns-configured.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug 13 02:41:29 roadrisk sshd[32231]: Failed password for invalid user admin from 89.248.172.15 port 37186 ssh2
Aug 13 02:41:29 roadrisk sshd[32231]: Received disconnect from 89.248.172.15: 11: Bye Bye [preauth]
Aug 13 03:01:01 roadrisk sshd[32503]: Address 89.248.172.15 maps to no-reveeclipse-dns-configured.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug 13 03:01:01 roadrisk sshd[32503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.248.172.15  user=r.r
Aug 13 03:01:03 roadrisk sshd[32503]: Failed password for r.r from 89.248.172.15 port 35518 ssh2
Aug 13 03:01:03 roadrisk sshd[32503]: Received disconnect from 89.248.172.15: 11: Bye Bye [preauth]
Aug 13 03:05:17 roadrisk sshd[32608]: Address 89.248.172.15 maps to no-reveec........
-------------------------------
2019-08-14 11:02:05
37.139.16.227 attackbots
Aug 14 01:56:59 XXX sshd[24509]: Invalid user laravel from 37.139.16.227 port 35274
2019-08-14 10:35:47
222.88.199.173 attackspambots
Unauthorized connection attempt from IP address 222.88.199.173 on Port 445(SMB)
2019-08-14 11:16:40
175.140.138.193 attackspambots
Aug 14 05:21:50 yabzik sshd[30737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.138.193
Aug 14 05:21:52 yabzik sshd[30737]: Failed password for invalid user kapaul from 175.140.138.193 port 48243 ssh2
Aug 14 05:26:25 yabzik sshd[32268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.138.193
2019-08-14 10:36:32
212.91.121.114 attackbots
proto=tcp  .  spt=44585  .  dpt=25  .     (listed on Blocklist de  Aug 13)     (701)
2019-08-14 10:36:11
189.5.193.238 attack
Aug 14 04:57:48 vps691689 sshd[9829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.193.238
Aug 14 04:57:50 vps691689 sshd[9829]: Failed password for invalid user info4 from 189.5.193.238 port 60280 ssh2
...
2019-08-14 11:10:31
192.81.215.176 attack
Aug 13 22:49:37 TORMINT sshd\[11762\]: Invalid user min from 192.81.215.176
Aug 13 22:49:37 TORMINT sshd\[11762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.215.176
Aug 13 22:49:39 TORMINT sshd\[11762\]: Failed password for invalid user min from 192.81.215.176 port 47202 ssh2
...
2019-08-14 10:58:48
70.88.209.53 attack
proto=tcp  .  spt=57579  .  dpt=25  .     (listed on Blocklist de  Aug 13)     (700)
2019-08-14 10:40:01
82.221.128.73 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-14 10:38:27
112.217.150.113 attackspambots
$f2bV_matches
2019-08-14 10:48:16
66.249.79.70 attackbotsspam
Automatic report - Banned IP Access
2019-08-14 11:04:38
160.153.156.141 attack
WordPress login Brute force / Web App Attack on client site.
2019-08-14 11:01:33
147.135.161.142 attack
Aug 14 04:19:27 SilenceServices sshd[13046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.161.142
Aug 14 04:19:28 SilenceServices sshd[13046]: Failed password for invalid user watcher from 147.135.161.142 port 39388 ssh2
Aug 14 04:24:06 SilenceServices sshd[16789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.161.142
2019-08-14 10:37:02
195.158.250.249 attackspam
proto=tcp  .  spt=53351  .  dpt=25  .     (listed on Blocklist de  Aug 13)     (695)
2019-08-14 10:51:36
187.210.47.131 attackbots
Unauthorized connection attempt from IP address 187.210.47.131 on Port 445(SMB)
2019-08-14 11:08:41

最近上报的IP列表

98.120.148.211 157.198.171.57 129.83.162.102 230.148.36.65
116.75.106.200 147.103.74.53 149.188.5.254 185.195.164.211
82.19.107.4 185.79.238.231 174.191.253.52 66.4.37.147
33.44.136.78 89.221.148.7 187.133.206.135 15.157.152.198
184.86.56.226 136.94.83.82 205.253.139.164 233.148.55.107