必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Dorsoduro

省份(region): Venezia

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.138.16.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31736
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.138.16.78.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 08 12:51:34 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
78.16.138.157.in-addr.arpa domain name pointer wifi078.dmaw.unive.it.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
78.16.138.157.in-addr.arpa	name = wifi078.dmaw.unive.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
155.4.255.138 attackspambots
fire
2019-09-06 07:10:34
148.70.116.223 attackspam
Sep  5 23:09:27 MainVPS sshd[29872]: Invalid user minecraft from 148.70.116.223 port 40968
Sep  5 23:09:27 MainVPS sshd[29872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.223
Sep  5 23:09:27 MainVPS sshd[29872]: Invalid user minecraft from 148.70.116.223 port 40968
Sep  5 23:09:29 MainVPS sshd[29872]: Failed password for invalid user minecraft from 148.70.116.223 port 40968 ssh2
Sep  5 23:14:34 MainVPS sshd[30216]: Invalid user ftpuser from 148.70.116.223 port 34397
...
2019-09-06 07:26:03
60.222.254.231 attackspam
Sep  6 00:33:45 ncomp postfix/smtpd[31332]: warning: unknown[60.222.254.231]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 00:33:56 ncomp postfix/smtpd[31332]: warning: unknown[60.222.254.231]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 00:34:12 ncomp postfix/smtpd[31332]: warning: unknown[60.222.254.231]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-06 06:51:41
218.98.40.154 attackspambots
19/9/5@18:55:42: FAIL: Alarm-SSH address from=218.98.40.154
...
2019-09-06 07:01:07
106.53.72.119 attack
Sep  3 09:14:59 mail sshd[26924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.72.119  user=r.r
Sep  3 09:15:01 mail sshd[26924]: Failed password for r.r from 106.53.72.119 port 38082 ssh2
Sep  3 09:15:01 mail sshd[26924]: Received disconnect from 106.53.72.119: 11: Bye Bye [preauth]
Sep  3 09:44:51 mail sshd[27571]: Failed password for invalid user zabbix from 106.53.72.119 port 44724 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.53.72.119
2019-09-06 07:00:02
68.251.142.26 attackbots
Trying ports that it shouldn't be.
2019-09-06 07:16:51
51.77.150.235 attackbots
Sep  6 01:03:33 meumeu sshd[18258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.235 
Sep  6 01:03:35 meumeu sshd[18258]: Failed password for invalid user teamspeak from 51.77.150.235 port 46217 ssh2
Sep  6 01:07:35 meumeu sshd[18747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.235 
...
2019-09-06 07:23:10
182.123.251.81 attack
Sep  5 20:43:26 *** sshd[5495]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.123.251.81] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep  5 20:43:26 *** sshd[5495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.123.251.81  user=r.r
Sep  5 20:43:28 *** sshd[5495]: Failed password for r.r from 182.123.251.81 port 34922 ssh2
Sep  5 20:43:30 *** sshd[5495]: Failed password for r.r from 182.123.251.81 port 34922 ssh2
Sep  5 20:43:32 *** sshd[5495]: Failed password for r.r from 182.123.251.81 port 34922 ssh2
Sep  5 20:43:35 *** sshd[5495]: Failed password for r.r from 182.123.251.81 port 34922 ssh2
Sep  5 20:43:38 *** sshd[5495]: Failed password for r.r from 182.123.251.81 port 34922 ssh2
Sep  5 20:43:41 *** sshd[5495]: Failed password for r.r from 182.123.251.81 port 34922 ssh2
Sep  5 20:43:41 *** sshd[5495]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.123.251.81  user=r.r


........
------------------------------------
2019-09-06 06:57:48
159.89.125.55 attack
fire
2019-09-06 07:03:38
203.110.179.26 attackspambots
Sep  6 00:34:16 tux-35-217 sshd\[5337\]: Invalid user webmaster from 203.110.179.26 port 45256
Sep  6 00:34:16 tux-35-217 sshd\[5337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.179.26
Sep  6 00:34:18 tux-35-217 sshd\[5337\]: Failed password for invalid user webmaster from 203.110.179.26 port 45256 ssh2
Sep  6 00:37:57 tux-35-217 sshd\[5377\]: Invalid user test from 203.110.179.26 port 60386
Sep  6 00:37:57 tux-35-217 sshd\[5377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.179.26
...
2019-09-06 06:58:08
177.133.32.127 attackbots
Automatic report - Port Scan Attack
2019-09-06 07:04:59
124.177.229.40 attackbots
Sep  5 20:42:33 hb sshd\[32001\]: Invalid user pass123 from 124.177.229.40
Sep  5 20:42:33 hb sshd\[32001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.177.229.40
Sep  5 20:42:35 hb sshd\[32001\]: Failed password for invalid user pass123 from 124.177.229.40 port 57970 ssh2
Sep  5 20:48:17 hb sshd\[32487\]: Invalid user pass from 124.177.229.40
Sep  5 20:48:17 hb sshd\[32487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.177.229.40
2019-09-06 07:29:07
211.23.61.194 attack
Sep  5 23:15:44 MK-Soft-VM3 sshd\[1855\]: Invalid user postgres from 211.23.61.194 port 43484
Sep  5 23:15:44 MK-Soft-VM3 sshd\[1855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.61.194
Sep  5 23:15:46 MK-Soft-VM3 sshd\[1855\]: Failed password for invalid user postgres from 211.23.61.194 port 43484 ssh2
...
2019-09-06 07:18:45
52.221.227.130 attackbots
Sep  5 13:09:55 hpm sshd\[20563\]: Invalid user wwwadmin from 52.221.227.130
Sep  5 13:09:55 hpm sshd\[20563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-221-227-130.ap-southeast-1.compute.amazonaws.com
Sep  5 13:09:57 hpm sshd\[20563\]: Failed password for invalid user wwwadmin from 52.221.227.130 port 46323 ssh2
Sep  5 13:14:48 hpm sshd\[20948\]: Invalid user redmine from 52.221.227.130
Sep  5 13:14:48 hpm sshd\[20948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-221-227-130.ap-southeast-1.compute.amazonaws.com
2019-09-06 07:26:34
125.64.94.212 attack
05.09.2019 23:01:23 Connection to port 5009 blocked by firewall
2019-09-06 07:15:03

最近上报的IP列表

116.72.225.72 131.100.76.57 95.134.189.66 195.242.232.14
113.178.94.51 203.113.8.86 184.90.101.92 143.208.184.211
114.38.19.156 88.10.6.64 159.137.211.117 191.53.116.56
36.6.152.219 103.30.82.232 14.215.48.20 13.58.247.184
198.84.144.220 42.119.245.175 177.134.55.190 82.64.15.106