必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Itatinga

省份(region): Sao Paulo

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.99.90.113 attack
Jul 25 02:04:03   TCP Attack: SRC=138.99.90.113 DST=[Masked] LEN=449 TOS=0x08 PREC=0x20 TTL=50  DF PROTO=TCP SPT=55327 DPT=80 WINDOW=900 RES=0x00 ACK PSH URGP=0
2019-07-25 16:03:57
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.90.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.99.90.72.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 15 23:43:46 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
72.90.99.138.in-addr.arpa domain name pointer 138-99-90-72.prtelecom.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.90.99.138.in-addr.arpa	name = 138-99-90-72.prtelecom.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.68.5.215 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:43.
2019-11-11 21:01:18
36.83.96.46 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:44.
2019-11-11 20:59:32
103.95.42.225 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:27.
2019-11-11 21:27:33
125.162.21.149 attack
Unauthorized connection attempt from IP address 125.162.21.149 on Port 445(SMB)
2019-11-11 21:20:11
92.222.92.128 attackbotsspam
$f2bV_matches
2019-11-11 20:54:03
107.173.222.159 attackbots
445/tcp 445/tcp
[2019-11-09/10]2pkt
2019-11-11 20:48:39
113.181.150.114 attackspambots
Unauthorized connection attempt from IP address 113.181.150.114 on Port 445(SMB)
2019-11-11 21:25:08
223.205.244.163 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:42.
2019-11-11 21:02:43
49.206.17.163 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:46.
2019-11-11 20:55:49
125.165.18.164 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:31.
2019-11-11 21:19:46
190.54.108.1 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:40.
2019-11-11 21:04:46
182.138.241.185 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:37.
2019-11-11 21:08:08
36.84.227.202 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:44.
2019-11-11 20:59:08
202.187.43.125 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:41.
2019-11-11 21:03:51
37.3.133.50 attackbotsspam
Caught in portsentry honeypot
2019-11-11 21:09:15

最近上报的IP列表

117.57.249.3 146.64.87.233 35.106.56.185 248.56.247.8
49.19.248.49 160.231.29.149 78.89.29.223 125.146.67.110
11.180.136.65 129.40.27.44 68.21.1.194 78.78.226.118
176.0.44.164 161.118.208.252 185.145.94.140 62.171.188.128
198.34.58.129 158.204.59.74 169.178.140.61 144.172.156.29