必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.89.138.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.89.138.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 04:06:31 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.138.89.198.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.138.89.198.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.143.43.229 attack
Dec 20 14:00:12 webhost01 sshd[32580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.143.43.229
Dec 20 14:00:15 webhost01 sshd[32580]: Failed password for invalid user admin from 94.143.43.229 port 35412 ssh2
...
2019-12-20 15:06:09
106.12.78.251 attackbotsspam
Dec 20 07:23:33 ns3042688 sshd\[13684\]: Invalid user abc from 106.12.78.251
Dec 20 07:23:33 ns3042688 sshd\[13684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.251 
Dec 20 07:23:35 ns3042688 sshd\[13684\]: Failed password for invalid user abc from 106.12.78.251 port 34090 ssh2
Dec 20 07:29:58 ns3042688 sshd\[16888\]: Invalid user kerrfam from 106.12.78.251
Dec 20 07:29:58 ns3042688 sshd\[16888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.251 
...
2019-12-20 15:12:58
218.92.0.170 attackbots
Dec 20 07:30:17 localhost sshd\[8110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.170  user=root
Dec 20 07:30:18 localhost sshd\[8110\]: Failed password for root from 218.92.0.170 port 15830 ssh2
Dec 20 07:30:22 localhost sshd\[8110\]: Failed password for root from 218.92.0.170 port 15830 ssh2
2019-12-20 14:42:37
191.33.173.138 attackspambots
Unauthorized connection attempt from IP address 191.33.173.138 on Port 445(SMB)
2019-12-20 15:09:49
200.125.44.62 attack
Unauthorized connection attempt detected from IP address 200.125.44.62 to port 445
2019-12-20 14:49:29
90.189.113.55 attackbots
Unauthorized connection attempt detected from IP address 90.189.113.55 to port 445
2019-12-20 15:01:41
216.238.174.92 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/216.238.174.92/ 
 
 US - 1H : (25)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN13536 
 
 IP : 216.238.174.92 
 
 CIDR : 216.238.168.0/21 
 
 PREFIX COUNT : 73 
 
 UNIQUE IP COUNT : 187648 
 
 
 ATTACKS DETECTED ASN13536 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-12-20 07:30:14 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-12-20 14:56:30
182.52.134.179 attack
Dec 20 08:02:06 vps691689 sshd[26635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.134.179
Dec 20 08:02:08 vps691689 sshd[26635]: Failed password for invalid user dargahi from 182.52.134.179 port 36700 ssh2
Dec 20 08:08:31 vps691689 sshd[26872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.134.179
...
2019-12-20 15:11:32
149.7.217.27 attackbotsspam
Dec 20 07:30:08 serwer sshd\[15886\]: Invalid user ezell from 149.7.217.27 port 37750
Dec 20 07:30:08 serwer sshd\[15886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.7.217.27
Dec 20 07:30:11 serwer sshd\[15886\]: Failed password for invalid user ezell from 149.7.217.27 port 37750 ssh2
...
2019-12-20 14:52:08
112.15.38.218 attackbots
Dec 20 03:30:30 firewall sshd[20579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.15.38.218
Dec 20 03:30:30 firewall sshd[20579]: Invalid user kick from 112.15.38.218
Dec 20 03:30:33 firewall sshd[20579]: Failed password for invalid user kick from 112.15.38.218 port 49200 ssh2
...
2019-12-20 14:45:10
1.227.191.138 attackbotsspam
Dec 19 20:24:03 tdfoods sshd\[22864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.227.191.138  user=root
Dec 19 20:24:04 tdfoods sshd\[22864\]: Failed password for root from 1.227.191.138 port 36460 ssh2
Dec 19 20:30:16 tdfoods sshd\[23483\]: Invalid user asterisk from 1.227.191.138
Dec 19 20:30:16 tdfoods sshd\[23483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.227.191.138
Dec 19 20:30:18 tdfoods sshd\[23483\]: Failed password for invalid user asterisk from 1.227.191.138 port 55532 ssh2
2019-12-20 14:54:06
211.227.23.216 attackspam
Dec 20 07:18:05 xeon sshd[51328]: Failed password for invalid user distccd from 211.227.23.216 port 37398 ssh2
2019-12-20 14:43:09
149.56.46.220 attack
Dec 19 20:25:01 hanapaa sshd\[17159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-149-56-46.net  user=root
Dec 19 20:25:03 hanapaa sshd\[17159\]: Failed password for root from 149.56.46.220 port 40800 ssh2
Dec 19 20:30:08 hanapaa sshd\[17604\]: Invalid user uc from 149.56.46.220
Dec 19 20:30:08 hanapaa sshd\[17604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-149-56-46.net
Dec 19 20:30:10 hanapaa sshd\[17604\]: Failed password for invalid user uc from 149.56.46.220 port 49888 ssh2
2019-12-20 14:51:32
166.111.152.230 attack
Dec 20 07:21:18 dev0-dcde-rnet sshd[10248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.152.230
Dec 20 07:21:20 dev0-dcde-rnet sshd[10248]: Failed password for invalid user Welcome123 from 166.111.152.230 port 33596 ssh2
Dec 20 07:30:12 dev0-dcde-rnet sshd[10323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.152.230
2019-12-20 14:50:29
61.142.247.210 attackbots
2019-12-20 dovecot_login authenticator failed for \(**REMOVED**\) \[61.142.247.210\]: 535 Incorrect authentication data \(set_id=nologin\)
2019-12-20 dovecot_login authenticator failed for \(**REMOVED**\) \[61.142.247.210\]: 535 Incorrect authentication data \(set_id=contact@**REMOVED**\)
2019-12-20 dovecot_login authenticator failed for \(**REMOVED**\) \[61.142.247.210\]: 535 Incorrect authentication data \(set_id=contact\)
2019-12-20 15:05:41

最近上报的IP列表

221.152.1.128 69.174.252.125 85.215.29.202 70.38.114.101
14.192.227.229 120.217.13.123 138.87.77.9 233.120.125.124
172.62.44.213 195.52.229.18 226.80.2.108 165.184.222.31
33.100.172.250 152.116.207.44 92.134.196.218 162.248.180.171
20.112.83.70 138.80.109.47 89.113.44.19 167.44.151.93