必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.173.138.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.173.138.75.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 15 18:43:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 75.138.173.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.138.173.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.163.186.176 attackbots
Honeypot attack, port: 445, PTR: 118-163-186-176.HINET-IP.hinet.net.
2020-04-05 01:21:18
222.186.173.226 attackspambots
Apr  4 19:06:21 * sshd[802]: Failed password for root from 222.186.173.226 port 32338 ssh2
Apr  4 19:06:36 * sshd[802]: error: maximum authentication attempts exceeded for root from 222.186.173.226 port 32338 ssh2 [preauth]
2020-04-05 01:15:08
141.98.81.182 attackspam
2020-04-04T17:12:48.444182shield sshd\[23538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.182  user=root
2020-04-04T17:12:51.110251shield sshd\[23538\]: Failed password for root from 141.98.81.182 port 35537 ssh2
2020-04-04T17:13:31.256225shield sshd\[23654\]: Invalid user admin from 141.98.81.182 port 43263
2020-04-04T17:13:31.258851shield sshd\[23654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.182
2020-04-04T17:13:32.494671shield sshd\[23654\]: Failed password for invalid user admin from 141.98.81.182 port 43263 ssh2
2020-04-05 01:13:49
142.93.202.159 attack
Apr  4 18:10:43 host sshd[54635]: Invalid user chenwk from 142.93.202.159 port 43368
...
2020-04-05 00:31:35
113.140.72.198 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-05 00:39:56
98.110.74.69 attackspam
Apr  4 18:27:29 vps sshd[656651]: Invalid user ze from 98.110.74.69 port 60252
Apr  4 18:27:29 vps sshd[656651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-98-110-74-69.cmdnnj.fios.verizon.net
Apr  4 18:27:32 vps sshd[656651]: Failed password for invalid user ze from 98.110.74.69 port 60252 ssh2
Apr  4 18:31:04 vps sshd[677104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-98-110-74-69.cmdnnj.fios.verizon.net  user=root
Apr  4 18:31:06 vps sshd[677104]: Failed password for root from 98.110.74.69 port 39752 ssh2
...
2020-04-05 00:56:33
77.71.16.37 attackbotsspam
Honeypot attack, port: 81, PTR: ip-37-16-71-77.bgwan.com.
2020-04-05 01:17:30
183.82.34.162 attackbotsspam
Apr  4 18:58:59 silence02 sshd[15421]: Failed password for root from 183.82.34.162 port 44318 ssh2
Apr  4 19:04:02 silence02 sshd[15677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.34.162
Apr  4 19:04:04 silence02 sshd[15677]: Failed password for invalid user Tlhua from 183.82.34.162 port 60020 ssh2
2020-04-05 01:05:40
159.65.172.240 attack
Apr  4 13:50:50 game-panel sshd[9258]: Failed password for root from 159.65.172.240 port 44454 ssh2
Apr  4 13:54:45 game-panel sshd[9506]: Failed password for root from 159.65.172.240 port 52792 ssh2
Apr  4 13:58:43 game-panel sshd[9697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.172.240
2020-04-05 01:12:31
171.34.197.241 attackbots
Apr  4 17:08:26 mout sshd[31700]: Invalid user zhouwenya from 171.34.197.241 port 49363
2020-04-05 00:55:30
103.25.200.185 attackbots
Automatic report - Port Scan Attack
2020-04-05 00:56:06
185.175.93.18 attackbots
04/04/2020-12:42:16.154330 185.175.93.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-05 01:22:10
51.178.16.227 attackbotsspam
Apr  4 14:25:30 master sshd[3763]: Failed password for root from 51.178.16.227 port 60106 ssh2
Apr  4 14:37:00 master sshd[3809]: Failed password for root from 51.178.16.227 port 50044 ssh2
Apr  4 14:40:39 master sshd[3813]: Failed password for root from 51.178.16.227 port 53398 ssh2
Apr  4 14:44:14 master sshd[3815]: Failed password for root from 51.178.16.227 port 56754 ssh2
Apr  4 14:47:44 master sshd[3840]: Failed password for root from 51.178.16.227 port 60110 ssh2
Apr  4 14:51:07 master sshd[3850]: Failed password for root from 51.178.16.227 port 35234 ssh2
Apr  4 14:54:34 master sshd[3854]: Failed password for root from 51.178.16.227 port 38588 ssh2
Apr  4 14:58:02 master sshd[3861]: Failed password for root from 51.178.16.227 port 41942 ssh2
Apr  4 15:01:38 master sshd[3886]: Failed password for root from 51.178.16.227 port 45300 ssh2
Apr  4 15:05:00 master sshd[3895]: Failed password for root from 51.178.16.227 port 48654 ssh2
2020-04-05 01:02:10
132.232.52.86 attack
Apr  4 16:24:05 *** sshd[9747]: User root from 132.232.52.86 not allowed because not listed in AllowUsers
2020-04-05 00:48:50
91.207.40.42 attackspambots
Apr  4 18:29:56 h2779839 sshd[31940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.42  user=root
Apr  4 18:29:58 h2779839 sshd[31940]: Failed password for root from 91.207.40.42 port 55856 ssh2
Apr  4 18:34:03 h2779839 sshd[32008]: Invalid user ts from 91.207.40.42 port 36944
Apr  4 18:34:03 h2779839 sshd[32008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.42
Apr  4 18:34:03 h2779839 sshd[32008]: Invalid user ts from 91.207.40.42 port 36944
Apr  4 18:34:05 h2779839 sshd[32008]: Failed password for invalid user ts from 91.207.40.42 port 36944 ssh2
Apr  4 18:38:12 h2779839 sshd[32041]: Invalid user ts from 91.207.40.42 port 46490
Apr  4 18:38:12 h2779839 sshd[32041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.42
Apr  4 18:38:12 h2779839 sshd[32041]: Invalid user ts from 91.207.40.42 port 46490
Apr  4 18:38:14 h2779839 sshd[32041
...
2020-04-05 01:08:55

最近上报的IP列表

249.158.178.71 217.41.199.21 84.104.254.64 157.143.181.91
181.100.182.247 217.220.157.207 219.146.110.222 249.122.52.21
84.208.136.205 62.42.211.254 167.89.106.6 34.31.105.103
51.0.92.34 253.167.94.53 193.142.146.35 155.104.249.54
87.214.190.70 44.71.223.228 211.142.150.192 181.33.182.101