必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Afghanistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
180.94.64.114 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-20 21:23:58
180.94.64.114 attackbots
Autoban   180.94.64.114 AUTH/CONNECT
2019-06-25 11:50:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.94.64.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.94.64.138.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 21:36:33 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 138.64.94.180.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.64.94.180.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.107.202.20 attackspam
Honeypot attack, port: 445, PTR: ip20.redynet.com.ar.
2019-07-07 04:57:59
78.36.41.147 attack
(imapd) Failed IMAP login from 78.36.41.147 (RU/Russia/ip78-36-41-147.onego.ru): 1 in the last 3600 secs
2019-07-07 04:35:57
219.85.82.211 attackbots
Honeypot attack, port: 81, PTR: 219-85-82-211-adsl-TPE.STATIC.so-net.net.tw.
2019-07-07 04:59:36
217.182.71.54 attackspambots
Jul  6 10:58:15 vps200512 sshd\[25676\]: Invalid user zheng from 217.182.71.54
Jul  6 10:58:15 vps200512 sshd\[25676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54
Jul  6 10:58:16 vps200512 sshd\[25676\]: Failed password for invalid user zheng from 217.182.71.54 port 60478 ssh2
Jul  6 11:00:25 vps200512 sshd\[25719\]: Invalid user www from 217.182.71.54
Jul  6 11:00:25 vps200512 sshd\[25719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54
2019-07-07 04:44:47
92.119.160.40 attackspambots
Jul  6 15:56:21 h2177944 kernel: \[745728.304663\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=28027 PROTO=TCP SPT=52538 DPT=2929 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  6 16:01:19 h2177944 kernel: \[746025.717622\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=2413 PROTO=TCP SPT=52538 DPT=2222 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  6 16:02:11 h2177944 kernel: \[746077.729913\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=32133 PROTO=TCP SPT=52538 DPT=2525 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  6 16:23:08 h2177944 kernel: \[747334.714494\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=28000 PROTO=TCP SPT=52538 DPT=4747 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  6 16:48:58 h2177944 kernel: \[748884.181743\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.40 DST=85.214.117.9 LEN=4
2019-07-07 04:48:11
220.168.86.37 attackspam
Jul  6 10:21:05 cac1d2 sshd\[31530\]: Invalid user laurent from 220.168.86.37 port 11408
Jul  6 10:21:05 cac1d2 sshd\[31530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.168.86.37
Jul  6 10:21:07 cac1d2 sshd\[31530\]: Failed password for invalid user laurent from 220.168.86.37 port 11408 ssh2
...
2019-07-07 04:23:18
36.239.198.45 attackbotsspam
Jul  6 04:30:56 localhost kernel: [13646050.191987] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.239.198.45 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=28181 PROTO=TCP SPT=52503 DPT=37215 WINDOW=58682 RES=0x00 SYN URGP=0 
Jul  6 04:30:56 localhost kernel: [13646050.192013] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.239.198.45 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=28181 PROTO=TCP SPT=52503 DPT=37215 SEQ=758669438 ACK=0 WINDOW=58682 RES=0x00 SYN URGP=0 
Jul  6 09:20:43 localhost kernel: [13663436.503701] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.239.198.45 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=58282 PROTO=TCP SPT=52503 DPT=37215 WINDOW=58682 RES=0x00 SYN URGP=0 
Jul  6 09:20:43 localhost kernel: [13663436.503726] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.239.198.45 DST=[mungedIP2] LEN=40 TOS=0x0
2019-07-07 04:44:15
134.209.157.62 attackspambots
Jul  6 15:41:09 dedicated sshd[30449]: Invalid user uftp from 134.209.157.62 port 58014
2019-07-07 04:45:32
111.73.46.126 attackbotsspam
[06/Jul/2019:18:06:26 +0900] "GET / HTTP/1.1" 444 0 "http://***.***.***.***:80" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" "-"

IP: 111.73.46.126
Port scan - ip
2019-07-07 04:33:36
45.13.39.19 attackspam
Jul  6 16:55:36 mail postfix/smtpd\[16034\]: warning: unknown\[45.13.39.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 16:55:59 mail postfix/smtpd\[16204\]: warning: unknown\[45.13.39.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 16:56:34 mail postfix/smtpd\[16201\]: warning: unknown\[45.13.39.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 17:27:24 mail postfix/smtpd\[16740\]: warning: unknown\[45.13.39.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-07 04:36:57
114.35.103.16 attackspam
Honeypot attack, port: 23, PTR: 114-35-103-16.HINET-IP.hinet.net.
2019-07-07 05:00:28
114.234.31.20 attackbotsspam
Brute force SMTP login attempts.
2019-07-07 04:26:43
84.52.122.77 attackbotsspam
Jul  6 15:20:14 [munged] sshd[8039]: Invalid user sniffer from 84.52.122.77 port 57076
Jul  6 15:20:20 [munged] sshd[8039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.122.77
2019-07-07 04:52:50
92.118.160.53 attackspam
3389BruteforceFW21
2019-07-07 04:49:42
66.96.211.198 attackbots
firewall-block, port(s): 22/tcp
2019-07-07 05:03:59

最近上报的IP列表

220.123.76.177 137.226.66.127 137.226.67.104 122.176.102.238
137.226.66.23 192.251.226.194 137.226.68.111 137.226.68.248
137.226.69.41 137.226.69.37 137.226.69.49 212.102.57.24
192.251.226.147 203.76.109.92 137.226.68.4 197.210.53.20
180.122.97.99 188.143.233.10 216.152.252.66 216.151.137.255