必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kazakhstan

运营商(isp): Kcell

主机名(hostname): unknown

机构(organization): Kcell JSC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.72.148.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 746
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.72.148.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 24 01:13:55 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
138.148.72.2.in-addr.arpa domain name pointer 2-72-148-138.kcell.kz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 138.148.72.2.in-addr.arpa.: No answer

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.30.157.239 attackbots
Invalid user fmaster from 123.30.157.239 port 44962
2020-08-01 19:00:20
203.90.80.58 attackbots
SSH Brute Force
2020-08-01 19:08:32
119.123.69.3 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-01 19:23:00
84.180.236.164 attackspam
Aug  1 12:56:20 eventyay sshd[15215]: Failed password for root from 84.180.236.164 port 65113 ssh2
Aug  1 13:00:25 eventyay sshd[15355]: Failed password for root from 84.180.236.164 port 61500 ssh2
...
2020-08-01 19:20:10
103.98.131.37 attackspam
SSH bruteforce
2020-08-01 19:19:07
112.133.232.85 attackbotsspam
07/31/2020-23:47:20.016713 112.133.232.85 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-01 19:23:50
52.13.0.244 attackbotsspam
IP 52.13.0.244 attacked honeypot on port: 80 at 7/31/2020 8:46:17 PM
2020-08-01 19:36:03
106.75.254.114 attackspambots
Invalid user mail1 from 106.75.254.114 port 60806
2020-08-01 19:06:54
177.39.66.170 attackspambots
Invalid user chikwataf from 177.39.66.170 port 37608
2020-08-01 19:09:02
206.189.181.12 attackbots
Aug  1 12:59:49 [host] kernel: [1946758.550258] [U
Aug  1 13:02:13 [host] kernel: [1946902.607763] [U
Aug  1 13:04:13 [host] kernel: [1947022.712331] [U
Aug  1 13:05:47 [host] kernel: [1947116.631307] [U
Aug  1 13:18:08 [host] kernel: [1947857.591404] [U
Aug  1 13:21:15 [host] kernel: [1948044.420835] [U
2020-08-01 19:37:16
104.223.197.240 attackbotsspam
Invalid user zhangshengwei from 104.223.197.240 port 42238
2020-08-01 19:23:17
85.52.217.114 attack
Brute forcing email accounts
2020-08-01 19:17:38
180.254.246.60 attackbots
Automatic report - Port Scan Attack
2020-08-01 19:18:14
199.187.211.105 attackspam
3,07-01/03 [bc00/m31] PostRequest-Spammer scoring: nairobi
2020-08-01 19:26:32
106.8.166.243 attackbots
2020-08-01 05:46:47 SMTP protocol error in "AUTH LOGIN" H=\(k2LzDDjyI\) \[106.8.166.243\]:5764 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2020-08-01 05:46:49 SMTP protocol error in "AUTH LOGIN" H=\(xu1PtJVT\) \[106.8.166.243\]:5847 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2020-08-01 05:46:50 SMTP protocol error in "AUTH LOGIN" H=\(4ocTkQ9CI\) \[106.8.166.243\]:5993 I=\[193.107.88.166\]:25 AUTH command used when not advertised
...
2020-08-01 19:39:11

最近上报的IP列表

47.135.57.167 67.91.147.125 94.99.26.222 221.29.228.38
75.46.196.80 139.155.149.142 125.89.3.107 81.214.39.65
31.94.42.18 55.90.69.49 11.126.77.64 134.209.178.109
155.146.7.249 47.198.234.53 88.74.29.139 52.76.232.197
95.136.54.168 220.79.85.49 14.70.2.224 116.153.16.89