必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.42.196.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.42.196.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 02:28:30 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 138.196.42.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.196.42.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.70.39.239 attackbotsspam
(sshd) Failed SSH login from 81.70.39.239 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 00:58:44 server sshd[922]: Invalid user leo from 81.70.39.239 port 51168
Sep 26 00:58:46 server sshd[922]: Failed password for invalid user leo from 81.70.39.239 port 51168 ssh2
Sep 26 01:10:51 server sshd[4185]: Invalid user user from 81.70.39.239 port 49594
Sep 26 01:10:53 server sshd[4185]: Failed password for invalid user user from 81.70.39.239 port 49594 ssh2
Sep 26 01:16:00 server sshd[5532]: Invalid user test from 81.70.39.239 port 44532
2020-09-26 14:18:39
1.119.131.102 attackspambots
(sshd) Failed SSH login from 1.119.131.102 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 01:25:27 jbs1 sshd[30935]: Invalid user usuario1 from 1.119.131.102
Sep 26 01:25:27 jbs1 sshd[30935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.131.102 
Sep 26 01:25:30 jbs1 sshd[30935]: Failed password for invalid user usuario1 from 1.119.131.102 port 18185 ssh2
Sep 26 01:47:08 jbs1 sshd[6092]: Invalid user ali from 1.119.131.102
Sep 26 01:47:08 jbs1 sshd[6092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.131.102
2020-09-26 13:55:12
1.119.44.250 attackspambots
2020-03-07T17:33:47.461003suse-nuc sshd[8491]: Invalid user 22 from 1.119.44.250 port 32796
...
2020-09-26 13:51:42
46.37.188.139 attack
$f2bV_matches
2020-09-26 14:07:37
212.64.114.217 attackspambots
2020-09-26T11:46:08.271120billing sshd[1215]: Invalid user Duck from 212.64.114.217 port 56300
2020-09-26T11:46:10.006169billing sshd[1215]: Failed password for invalid user Duck from 212.64.114.217 port 56300 ssh2
2020-09-26T11:50:57.260979billing sshd[12055]: Invalid user carl from 212.64.114.217 port 54016
...
2020-09-26 14:05:47
190.104.157.142 attackspambots
Sep 26 04:01:23 prox sshd[7293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.157.142 
Sep 26 04:01:24 prox sshd[7293]: Failed password for invalid user admin from 190.104.157.142 port 57958 ssh2
2020-09-26 13:49:18
164.160.33.164 attackbots
SSH auth scanning - multiple failed logins
2020-09-26 14:22:33
1.175.79.130 attackspam
2020-08-22T12:03:17.558341suse-nuc sshd[30426]: User root from 1.175.79.130 not allowed because listed in DenyUsers
...
2020-09-26 13:40:17
51.161.32.211 attack
Sep 26 02:23:35 firewall sshd[10415]: Invalid user mirror from 51.161.32.211
Sep 26 02:23:36 firewall sshd[10415]: Failed password for invalid user mirror from 51.161.32.211 port 47446 ssh2
Sep 26 02:27:32 firewall sshd[10559]: Invalid user ftp from 51.161.32.211
...
2020-09-26 13:53:14
112.85.42.174 attackspam
Sep 26 07:33:25 sso sshd[26900]: Failed password for root from 112.85.42.174 port 31282 ssh2
Sep 26 07:33:35 sso sshd[26900]: Failed password for root from 112.85.42.174 port 31282 ssh2
...
2020-09-26 13:39:28
1.119.150.195 attackspam
2019-11-08T21:37:14.836259suse-nuc sshd[25736]: Invalid user lidio from 1.119.150.195 port 50630
...
2020-09-26 13:54:48
161.35.148.75 attackspam
Invalid user user from 161.35.148.75 port 47978
2020-09-26 13:40:53
1.172.134.218 attack
2020-09-24T13:07:41.768220suse-nuc sshd[10002]: Invalid user admin from 1.172.134.218 port 40320
...
2020-09-26 13:41:11
201.151.59.210 attackspambots
Icarus honeypot on github
2020-09-26 14:19:08
49.233.160.141 attackspambots
Sep 25 22:39:56 askasleikir sshd[23675]: Failed password for invalid user webmaster from 49.233.160.141 port 51298 ssh2
2020-09-26 13:55:40

最近上报的IP列表

176.217.50.116 93.21.170.94 37.29.25.205 244.248.126.71
114.237.172.232 21.212.104.201 134.138.18.105 160.8.78.87
24.97.17.218 201.33.246.212 49.53.152.149 187.58.88.20
58.171.201.198 114.201.107.167 34.135.199.199 238.104.49.180
42.22.180.92 12.160.248.241 250.81.17.248 74.23.171.35