必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Belize

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): NForce Entertainment B.V.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.99.216.147 attackbots
138.99.216.147 - - [07/Aug/2020:06:50:18 -0400] "GET /403.shtml HTTP/1.1"
2020-08-07 22:54:31
138.99.216.104 attack
SmallBizIT.US 7 packets to tcp(4444,4455,33333,33890,40000,43389,63389)
2020-08-01 14:07:36
138.99.216.171 attack
Multihost portscan.
2020-07-29 19:35:15
138.99.216.147 attackbotsspam
Unauthorized SSH login attempts
2020-07-26 02:39:10
138.99.216.92 attackspambots
SmallBizIT.US 4 packets to tcp(3380,3384,3386,3390)
2020-07-20 06:26:17
138.99.216.147 attackbotsspam
Hacking
2020-07-04 07:16:06
138.99.216.112 attack
Jun 16 01:36:26 mail postfix/postscreen[14633]: DNSBL rank 3 for [138.99.216.112]:61000
...
2020-06-29 04:47:49
138.99.216.147 attackspam
Jun 20 02:05:08 mail postfix/postscreen[22396]: DNSBL rank 3 for [138.99.216.147]:61000
...
2020-06-29 04:46:26
138.99.216.171 attackbots
Jun 17 01:03:35 mail postfix/postscreen[3929]: DNSBL rank 3 for [138.99.216.171]:61000
...
2020-06-29 04:45:58
138.99.216.112 attackbots
Automatic report - Banned IP Access
2020-06-27 20:39:48
138.99.216.171 attack
bad
2020-06-17 18:35:22
138.99.216.92 attack
SmallBizIT.US 7 packets to tcp(3332,3335,3372,3420,3421,5901,11027)
2020-06-16 07:39:19
138.99.216.92 attack
SmallBizIT.US 3 packets to tcp(3372,3503,55389)
2020-06-06 18:19:38
138.99.216.92 attackbotsspam
port
2020-05-29 16:29:26
138.99.216.147 attackspambots
May 27 06:03:38 mail kernel: [926510.604365] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=7979 PROTO=TCP SPT=61000 DPT=2525 WINDOW=1024 RES=0x00 SYN URGP=0 
May 27 06:03:47 mail kernel: [926519.228627] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=52750 PROTO=TCP SPT=61000 DPT=23 WINDOW=1024 RES=0x00 SYN URGP=0 
May 27 06:04:32 mail kernel: [926564.272009] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=17012 PROTO=TCP SPT=61000 DPT=8095 WINDOW=1024 RES=0x00 SYN URGP=0 
May 27 06:04:40 mail kernel: [926572.880879] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=138.99.216.147 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=34444 PROTO=TCP SPT=61000 DPT=20000 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-27 12:32:25
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.216.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27944
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.99.216.7.			IN	A

;; AUTHORITY SECTION:
.			1350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033102 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 01 15:55:43 +08 2019
;; MSG SIZE  rcvd: 116

HOST信息:
Host 7.216.99.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 7.216.99.138.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.23.227.136 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-05 20:51:07
41.160.6.186 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-05 21:04:22
123.200.9.53 attackspam
email spam
2019-11-05 21:20:05
210.221.220.68 attack
Nov  5 09:16:15 SilenceServices sshd[2440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.221.220.68
Nov  5 09:16:17 SilenceServices sshd[2440]: Failed password for invalid user uz5YtIl2zx from 210.221.220.68 port 46325 ssh2
Nov  5 09:20:49 SilenceServices sshd[3741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.221.220.68
2019-11-05 20:41:14
190.255.49.83 attack
Absender hat Spam-Falle ausgel?st
2019-11-05 20:45:00
181.57.98.228 attack
email spam
2019-11-05 21:14:00
212.237.112.106 attackspam
proto=tcp  .  spt=59163  .  dpt=25  .     (Listed on    truncate-gbudb also unsubscore and rbldns-ru)     (336)
2019-11-05 20:40:38
200.77.186.161 attackbotsspam
email spam
2019-11-05 21:09:39
190.205.98.150 attack
email spam
2019-11-05 20:45:35
82.117.212.114 attackspam
email spam
2019-11-05 21:01:11
46.225.128.170 attackbotsspam
email spam
2019-11-05 21:03:12
91.103.31.45 attackbots
email spam
2019-11-05 20:59:53
200.77.186.180 attackbots
email spam
2019-11-05 20:42:35
175.29.177.126 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-11-05 20:52:45
177.10.200.245 attack
email spam
2019-11-05 20:52:00

最近上报的IP列表

178.128.15.116 186.202.63.145 178.128.20.170 170.233.68.108
157.230.25.5 117.102.69.98 77.247.108.32 54.223.190.195
139.162.75.99 111.231.204.127 37.187.110.186 200.148.97.123
165.255.254.46 134.175.111.132 122.162.48.51 77.247.108.28
118.122.95.50 178.128.56.15 113.116.218.223 58.71.87.100