必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Acton

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.138.228.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;20.138.228.139.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040101 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 02:15:40 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 139.228.138.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.228.138.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.33.245.178 attackbotsspam
Invalid user id from 80.33.245.178 port 52678
2019-08-27 13:26:40
149.202.178.116 attackspam
2019-08-27T06:10:02.341992  sshd[21529]: Invalid user jocelyn from 149.202.178.116 port 42958
2019-08-27T06:10:02.354256  sshd[21529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.178.116
2019-08-27T06:10:02.341992  sshd[21529]: Invalid user jocelyn from 149.202.178.116 port 42958
2019-08-27T06:10:04.847526  sshd[21529]: Failed password for invalid user jocelyn from 149.202.178.116 port 42958 ssh2
2019-08-27T06:17:52.373022  sshd[21635]: Invalid user jocelyn from 149.202.178.116 port 58632
...
2019-08-27 13:23:53
121.78.129.147 attackbots
Aug 27 06:27:52 MK-Soft-Root1 sshd\[15966\]: Invalid user superman from 121.78.129.147 port 50526
Aug 27 06:27:52 MK-Soft-Root1 sshd\[15966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.129.147
Aug 27 06:27:54 MK-Soft-Root1 sshd\[15966\]: Failed password for invalid user superman from 121.78.129.147 port 50526 ssh2
...
2019-08-27 13:24:58
77.247.108.180 attack
Port scan on 1 port(s): 5060
2019-08-27 13:20:07
51.83.234.51 attackbotsspam
51.83.234.51 - - [27/Aug/2019:01:02:07 +0000] "GET /elrekt.php HTTP/1.1" 404 152 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)"
2019-08-27 12:45:46
154.73.22.107 attackbotsspam
Aug 26 19:13:09 hiderm sshd\[4452\]: Invalid user emc from 154.73.22.107
Aug 26 19:13:09 hiderm sshd\[4452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.22.107
Aug 26 19:13:11 hiderm sshd\[4452\]: Failed password for invalid user emc from 154.73.22.107 port 38098 ssh2
Aug 26 19:18:28 hiderm sshd\[4899\]: Invalid user victor from 154.73.22.107
Aug 26 19:18:28 hiderm sshd\[4899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.22.107
2019-08-27 13:27:23
162.220.166.114 attackbots
Splunk® : port scan detected:
Aug 27 01:07:52 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=162.220.166.114 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=TCP SPT=54377 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2019-08-27 13:19:04
50.99.193.144 attackspam
$f2bV_matches
2019-08-27 13:05:10
191.32.46.143 attackspambots
Automatic report - Port Scan Attack
2019-08-27 12:50:14
23.129.64.201 attack
Aug 27 07:14:31 mail sshd[28875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.201  user=sshd
Aug 27 07:14:33 mail sshd[28875]: Failed password for sshd from 23.129.64.201 port 25054 ssh2
...
2019-08-27 13:22:52
188.166.247.82 attackspambots
Invalid user postgres from 188.166.247.82 port 44088
2019-08-27 13:03:08
18.27.197.252 attack
Aug 27 06:42:20 dedicated sshd[7078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.27.197.252  user=sshd
Aug 27 06:42:23 dedicated sshd[7078]: Failed password for sshd from 18.27.197.252 port 34508 ssh2
2019-08-27 13:08:00
103.38.215.11 attackbots
Aug 26 20:17:37 aat-srv002 sshd[31805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.215.11
Aug 26 20:17:40 aat-srv002 sshd[31805]: Failed password for invalid user zw from 103.38.215.11 port 47926 ssh2
Aug 26 20:30:31 aat-srv002 sshd[32277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.215.11
Aug 26 20:30:33 aat-srv002 sshd[32277]: Failed password for invalid user ad from 103.38.215.11 port 34036 ssh2
...
2019-08-27 12:51:15
186.65.87.206 attackbotsspam
Automatic report - Port Scan Attack
2019-08-27 13:25:28
51.75.70.30 attackspambots
Aug 27 05:55:22 * sshd[15726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.70.30
Aug 27 05:55:24 * sshd[15726]: Failed password for invalid user admin from 51.75.70.30 port 58441 ssh2
2019-08-27 13:00:01

最近上报的IP列表

73.112.159.145 14.184.12.246 161.187.43.28 51.4.148.28
136.1.38.90 180.187.196.73 55.141.76.252 95.166.96.107
133.124.164.197 131.110.109.111 67.166.129.254 147.197.131.195
53.118.70.34 220.187.175.113 36.82.97.217 11.49.15.66
69.177.252.150 220.161.70.195 155.161.82.66 182.165.119.196