必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): Huawei Thailand Clouds

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
trying to access non-authorized port
2020-04-02 20:10:35
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.138.230.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.138.230.22.			IN	A

;; AUTHORITY SECTION:
.			474	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040200 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 20:10:29 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
22.230.138.159.in-addr.arpa domain name pointer haier.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.230.138.159.in-addr.arpa	name = haier.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.91.14.90 attackbotsspam
Dec 24 08:42:42 www sshd[18891]: reveeclipse mapping checking getaddrinfo for static.cmcti.vn [183.91.14.90] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 24 08:42:42 www sshd[18891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.91.14.90  user=r.r
Dec 24 08:42:45 www sshd[18891]: Failed password for r.r from 183.91.14.90 port 51955 ssh2
Dec 24 08:42:47 www sshd[18891]: Failed password for r.r from 183.91.14.90 port 51955 ssh2
Dec 24 08:42:49 www sshd[18891]: Failed password for r.r from 183.91.14.90 port 51955 ssh2
Dec 24 08:42:51 www sshd[18891]: Failed password for r.r from 183.91.14.90 port 51955 ssh2
Dec 24 08:42:54 www sshd[18891]: Failed password for r.r from 183.91.14.90 port 51955 ssh2
Dec 24 08:42:54 www sshd[18891]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.91.14.90  user=r.r
Dec 24 08:42:56 www sshd[18894]: reveeclipse mapping checking getaddrinfo for static.cmcti.vn [183.91.14.........
-------------------------------
2019-12-26 04:33:34
185.56.153.229 attackbots
Dec 25 17:04:10 zeus sshd[23386]: Failed password for root from 185.56.153.229 port 46884 ssh2
Dec 25 17:07:10 zeus sshd[23492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.229 
Dec 25 17:07:12 zeus sshd[23492]: Failed password for invalid user ftptest1 from 185.56.153.229 port 39548 ssh2
2019-12-26 04:15:08
82.62.153.15 attackbotsspam
Dec 26 00:48:55 itv-usvr-02 sshd[996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.62.153.15  user=root
Dec 26 00:48:58 itv-usvr-02 sshd[996]: Failed password for root from 82.62.153.15 port 49786 ssh2
Dec 26 00:58:52 itv-usvr-02 sshd[1017]: Invalid user institutt from 82.62.153.15 port 53782
Dec 26 00:58:52 itv-usvr-02 sshd[1017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.62.153.15
Dec 26 00:58:52 itv-usvr-02 sshd[1017]: Invalid user institutt from 82.62.153.15 port 53782
Dec 26 00:58:53 itv-usvr-02 sshd[1017]: Failed password for invalid user institutt from 82.62.153.15 port 53782 ssh2
2019-12-26 04:05:53
61.244.222.145 attack
Unauthorized connection attempt detected from IP address 61.244.222.145 to port 445
2019-12-26 04:31:29
117.156.67.18 attackbotsspam
Dec 25 18:24:03 serwer sshd\[1111\]: Invalid user docker from 117.156.67.18 port 26428
Dec 25 18:24:03 serwer sshd\[1111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.156.67.18
Dec 25 18:24:04 serwer sshd\[1111\]: Failed password for invalid user docker from 117.156.67.18 port 26428 ssh2
...
2019-12-26 04:04:30
124.88.112.37 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:13:50
212.169.239.61 attack
Tried sshing with brute force.
2019-12-26 04:08:05
103.75.103.211 attackbotsspam
Dec 25 17:03:33 legacy sshd[31986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
Dec 25 17:03:35 legacy sshd[31986]: Failed password for invalid user tracy from 103.75.103.211 port 36316 ssh2
Dec 25 17:06:42 legacy sshd[32074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
...
2019-12-26 04:10:59
123.126.133.239 attack
" "
2019-12-26 04:22:11
149.202.43.72 attack
WordPress wp-login brute force :: 149.202.43.72 0.148 - [25/Dec/2019:19:45:06  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-12-26 04:05:33
94.200.179.62 attackbots
SSH/22 MH Probe, BF, Hack -
2019-12-26 04:26:10
138.197.130.225 attack
xmlrpc attack
2019-12-26 04:17:35
180.249.201.23 attackspam
1577285397 - 12/25/2019 15:49:57 Host: 180.249.201.23/180.249.201.23 Port: 445 TCP Blocked
2019-12-26 04:00:17
125.75.1.17 attackbots
125.75.1.17:40536 - - [25/Dec/2019:09:39:38 +0100] "GET /index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1 HTTP/1.1" 200 7232
125.75.1.17:37990 - - [25/Dec/2019:09:39:34 +0100] "GET /index.php HTTP/1.1" 200 7232
125.75.1.17:59756 - - [25/Dec/2019:09:39:33 +0100] "GET /elrekt.php HTTP/1.1" 404 295
125.75.1.17:53334 - - [25/Dec/2019:09:39:33 +0100] "GET /TP/html/public/index.php HTTP/1.1" 404 309
125.75.1.17:46672 - - [25/Dec/2019:09:39:32 +0100] "GET /public/index.php HTTP/1.1" 404 301
125.75.1.17:39864 - - [25/Dec/2019:09:39:31 +0100] "GET /html/public/index.php HTTP/1.1" 404 306
125.75.1.17:32840 - - [25/Dec/2019:09:39:31 +0100] "GET /thinkphp/html/public/index.php HTTP/1.1" 404 315
125.75.1.17:54248 - - [25/Dec/2019:09:39:30 +0100] "GET /TP/index.php HTTP/1.1" 404 297
125.75.1.17:37012 - - [25/Dec/2019:09:39:30 +0100] "GET /TP/public/index.php HTTP/1.1" 404 304
2019-12-26 04:09:00
122.112.201.76 attackspambots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:27:58

最近上报的IP列表

132.201.43.228 78.211.128.85 175.44.165.99 118.174.109.192
170.43.116.197 178.53.62.68 165.210.5.229 223.212.244.251
213.151.142.83 5.75.69.67 45.109.13.22 70.202.207.84
35.175.218.63 12.61.56.106 79.113.58.162 136.199.72.232
45.41.45.108 138.197.118.32 118.196.131.185 206.191.100.1