必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Venezuela

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.36.204.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.36.204.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:02:53 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
138.204.36.190.in-addr.arpa domain name pointer 190-36-204-138.cnt-01-p77.cantv.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.204.36.190.in-addr.arpa	name = 190-36-204-138.cnt-01-p77.cantv.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.15.100.175 attack
20 attempts against mh-ssh on plane.magehost.pro
2019-12-21 15:53:21
185.220.101.32 attack
[portscan] Port scan
2019-12-21 15:19:22
62.234.128.242 attack
Dec 21 09:05:30 server sshd\[22726\]: Invalid user server from 62.234.128.242
Dec 21 09:05:30 server sshd\[22726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.128.242 
Dec 21 09:05:32 server sshd\[22726\]: Failed password for invalid user server from 62.234.128.242 port 47837 ssh2
Dec 21 09:29:39 server sshd\[28720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.128.242  user=root
Dec 21 09:29:41 server sshd\[28720\]: Failed password for root from 62.234.128.242 port 43853 ssh2
...
2019-12-21 15:35:47
46.38.144.57 attackspam
Dec 21 08:34:40 webserver postfix/smtpd\[25693\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 21 08:36:08 webserver postfix/smtpd\[26925\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 21 08:37:36 webserver postfix/smtpd\[27065\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 21 08:39:04 webserver postfix/smtpd\[26925\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 21 08:40:31 webserver postfix/smtpd\[27065\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-21 15:40:49
128.199.212.82 attack
$f2bV_matches
2019-12-21 15:48:08
58.241.46.14 attackbotsspam
$f2bV_matches
2019-12-21 15:40:28
85.248.227.163 attackbotsspam
[portscan] Port scan
2019-12-21 15:34:03
49.235.167.254 attackbots
Dec 21 08:24:18 MK-Soft-VM7 sshd[4121]: Failed password for root from 49.235.167.254 port 56510 ssh2
Dec 21 08:31:45 MK-Soft-VM7 sshd[4153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.167.254 
...
2019-12-21 15:41:47
113.31.102.157 attackbotsspam
Dec 21 08:03:43 OPSO sshd\[12814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.102.157  user=mail
Dec 21 08:03:45 OPSO sshd\[12814\]: Failed password for mail from 113.31.102.157 port 53826 ssh2
Dec 21 08:10:28 OPSO sshd\[13853\]: Invalid user fal from 113.31.102.157 port 49502
Dec 21 08:10:28 OPSO sshd\[13853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.102.157
Dec 21 08:10:30 OPSO sshd\[13853\]: Failed password for invalid user fal from 113.31.102.157 port 49502 ssh2
2019-12-21 15:15:24
185.209.0.90 attackbotsspam
Dec 21 07:54:43 debian-2gb-nbg1-2 kernel: \[564041.341767\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.90 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38459 PROTO=TCP SPT=41558 DPT=1389 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-21 15:39:05
203.190.55.203 attackbots
Dec 21 07:29:52 cp sshd[6232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.190.55.203
2019-12-21 15:20:59
151.80.45.126 attack
Dec 21 07:24:37 tux-35-217 sshd\[4143\]: Invalid user qmfkwi from 151.80.45.126 port 50032
Dec 21 07:24:37 tux-35-217 sshd\[4143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.45.126
Dec 21 07:24:39 tux-35-217 sshd\[4143\]: Failed password for invalid user qmfkwi from 151.80.45.126 port 50032 ssh2
Dec 21 07:29:27 tux-35-217 sshd\[4189\]: Invalid user vcsa from 151.80.45.126 port 54008
Dec 21 07:29:27 tux-35-217 sshd\[4189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.45.126
...
2019-12-21 15:47:10
45.136.108.161 attackspam
firewall-block, port(s): 400/tcp, 808/tcp, 3030/tcp, 8899/tcp, 33397/tcp
2019-12-21 15:12:41
172.105.4.227 attack
W 31101,/var/log/nginx/access.log,-,-
2019-12-21 15:22:11
210.213.148.176 attack
Unauthorized connection attempt detected from IP address 210.213.148.176 to port 445
2019-12-21 15:16:16

最近上报的IP列表

216.110.124.30 147.110.235.133 170.1.176.204 22.238.84.126
77.70.161.122 212.237.207.21 170.14.161.149 107.70.203.48
251.61.61.57 82.143.109.152 253.84.72.185 175.227.28.14
39.17.23.145 60.108.160.142 60.106.30.234 240.53.216.234
235.249.11.159 48.34.20.22 161.1.20.41 156.80.213.210