必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.42.112.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.42.112.138.			IN	A

;; AUTHORITY SECTION:
.			53	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 20:41:29 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
138.112.42.180.in-addr.arpa is an alias for 138.136.112.42.180.in-addr.arpa.
138.136.112.42.180.in-addr.arpa domain name pointer mdns.matsuo-ac.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.112.42.180.in-addr.arpa	canonical name = 138.136.112.42.180.in-addr.arpa.
138.136.112.42.180.in-addr.arpa	name = mdns.matsuo-ac.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
86.43.103.111 attackbots
Invalid user usuario from 86.43.103.111 port 46065
2019-11-02 17:37:14
1.53.89.8 attackbots
Unauthorized connection attempt from IP address 1.53.89.8 on Port 445(SMB)
2019-11-02 17:34:32
45.64.134.198 attack
Unauthorised access (Nov  2) SRC=45.64.134.198 LEN=52 TTL=114 ID=14336 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 27) SRC=45.64.134.198 LEN=52 TTL=114 ID=31785 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 17:43:38
222.186.169.192 attack
Nov  2 10:31:29 herz-der-gamer sshd[19897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Nov  2 10:31:31 herz-der-gamer sshd[19897]: Failed password for root from 222.186.169.192 port 28346 ssh2
...
2019-11-02 17:43:16
167.88.161.32 attackbotsspam
Nov  2 08:59:53 mail sshd[26651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.88.161.32
Nov  2 08:59:55 mail sshd[26651]: Failed password for invalid user elsearch from 167.88.161.32 port 39338 ssh2
...
2019-11-02 17:37:49
52.83.144.151 attack
port scan and connect, tcp 8080 (http-proxy)
2019-11-02 17:24:47
77.55.210.147 attackspambots
detected by Fail2Ban
2019-11-02 17:04:31
118.26.23.225 attackspam
Nov  2 05:46:44 server sshd\[13150\]: Invalid user admin from 118.26.23.225
Nov  2 05:46:44 server sshd\[13150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.23.225 
Nov  2 05:46:46 server sshd\[13150\]: Failed password for invalid user admin from 118.26.23.225 port 46314 ssh2
Nov  2 06:46:40 server sshd\[27016\]: Invalid user ewww6 from 118.26.23.225
Nov  2 06:46:40 server sshd\[27016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.23.225 
...
2019-11-02 17:03:30
163.172.84.50 attack
Invalid user reigo from 163.172.84.50 port 50674
2019-11-02 17:28:33
188.225.46.124 attack
2019-11-02T09:06:19.679579shield sshd\[14279\]: Invalid user maisa from 188.225.46.124 port 52022
2019-11-02T09:06:19.685158shield sshd\[14279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.225.46.124
2019-11-02T09:06:21.401325shield sshd\[14279\]: Failed password for invalid user maisa from 188.225.46.124 port 52022 ssh2
2019-11-02T09:09:58.996925shield sshd\[14816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.225.46.124  user=root
2019-11-02T09:10:00.778342shield sshd\[14816\]: Failed password for root from 188.225.46.124 port 34880 ssh2
2019-11-02 17:18:10
106.54.94.95 attackspambots
Nov  2 09:13:33 localhost sshd\[5231\]: Invalid user openvpn from 106.54.94.95
Nov  2 09:13:33 localhost sshd\[5231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.94.95
Nov  2 09:13:34 localhost sshd\[5231\]: Failed password for invalid user openvpn from 106.54.94.95 port 38364 ssh2
Nov  2 09:17:39 localhost sshd\[5458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.94.95  user=root
Nov  2 09:17:42 localhost sshd\[5458\]: Failed password for root from 106.54.94.95 port 40868 ssh2
...
2019-11-02 17:23:42
182.61.170.251 attackbotsspam
Nov  2 10:11:07 vps01 sshd[13644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.170.251
Nov  2 10:11:10 vps01 sshd[13644]: Failed password for invalid user unit from 182.61.170.251 port 33518 ssh2
2019-11-02 17:18:47
132.232.86.7 attackspambots
Nov  2 06:04:50 hcbbdb sshd\[18920\]: Invalid user pi from 132.232.86.7
Nov  2 06:04:50 hcbbdb sshd\[18920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.86.7
Nov  2 06:04:52 hcbbdb sshd\[18920\]: Failed password for invalid user pi from 132.232.86.7 port 35460 ssh2
Nov  2 06:10:04 hcbbdb sshd\[19433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.86.7  user=root
Nov  2 06:10:06 hcbbdb sshd\[19433\]: Failed password for root from 132.232.86.7 port 50387 ssh2
2019-11-02 17:20:27
188.32.91.184 attackspambots
Nov  2 06:46:12 server sshd\[26940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-188-32-91-184.ip.moscow.rt.ru  user=root
Nov  2 06:46:15 server sshd\[26940\]: Failed password for root from 188.32.91.184 port 36421 ssh2
Nov  2 06:46:16 server sshd\[26940\]: Failed password for root from 188.32.91.184 port 36421 ssh2
Nov  2 06:46:19 server sshd\[26940\]: Failed password for root from 188.32.91.184 port 36421 ssh2
Nov  2 06:46:20 server sshd\[26940\]: Failed password for root from 188.32.91.184 port 36421 ssh2
...
2019-11-02 17:18:33
222.186.52.78 attackbots
Nov  2 09:57:56 v22018076622670303 sshd\[18871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.78  user=root
Nov  2 09:57:57 v22018076622670303 sshd\[18871\]: Failed password for root from 222.186.52.78 port 43783 ssh2
Nov  2 09:58:00 v22018076622670303 sshd\[18871\]: Failed password for root from 222.186.52.78 port 43783 ssh2
...
2019-11-02 17:06:38

最近上报的IP列表

103.161.130.113 23.106.47.15 2.185.239.226 88.218.67.74
217.145.224.170 158.58.173.147 45.153.216.5 88.135.41.235
5.188.210.91 200.37.150.251 51.38.71.232 193.233.142.49
45.67.56.199 222.103.95.240 95.241.8.7 103.187.147.208
103.149.87.243 58.255.130.52 212.102.54.28 3.39.240.158