必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.138.64.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.138.64.45.			IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:28:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
45.64.138.200.in-addr.arpa domain name pointer 200-138-64-45.umrbr203.dial.brasiltelecom.net.br.
45.64.138.200.in-addr.arpa domain name pointer 200-138-64-45.dial.brasiltelecom.net.br.
45.64.138.200.in-addr.arpa domain name pointer 200-138-64-45.user3p.brasiltelecom.net.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.64.138.200.in-addr.arpa	name = 200-138-64-45.dial.brasiltelecom.net.br.
45.64.138.200.in-addr.arpa	name = 200-138-64-45.user3p.brasiltelecom.net.br.
45.64.138.200.in-addr.arpa	name = 200-138-64-45.umrbr203.dial.brasiltelecom.net.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.156.174.6 attackspambots
Automatic report - Port Scan Attack
2019-10-14 07:50:27
91.121.157.83 attackspambots
Oct 14 01:13:50 SilenceServices sshd[1370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83
Oct 14 01:13:52 SilenceServices sshd[1370]: Failed password for invalid user Cosmo123 from 91.121.157.83 port 35674 ssh2
Oct 14 01:17:20 SilenceServices sshd[3560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83
2019-10-14 07:54:46
81.241.235.191 attackspambots
Oct 13 13:27:11 eddieflores sshd\[19058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be  user=root
Oct 13 13:27:13 eddieflores sshd\[19058\]: Failed password for root from 81.241.235.191 port 58900 ssh2
Oct 13 13:30:48 eddieflores sshd\[19343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be  user=root
Oct 13 13:30:50 eddieflores sshd\[19343\]: Failed password for root from 81.241.235.191 port 41604 ssh2
Oct 13 13:34:19 eddieflores sshd\[19639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be  user=root
2019-10-14 07:46:08
91.109.13.44 attackspambots
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2019-10-14 07:58:41
40.73.76.102 attackbots
Oct 14 01:45:13 localhost sshd\[15053\]: Invalid user Automation from 40.73.76.102 port 43390
Oct 14 01:45:13 localhost sshd\[15053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.76.102
Oct 14 01:45:15 localhost sshd\[15053\]: Failed password for invalid user Automation from 40.73.76.102 port 43390 ssh2
2019-10-14 07:48:44
61.158.140.152 attackspambots
Brute force attempt
2019-10-14 07:22:49
191.53.62.97 attack
Automatic report - Port Scan Attack
2019-10-14 07:57:48
182.61.36.38 attackspambots
Oct 14 06:12:59 webhost01 sshd[14800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38
Oct 14 06:13:01 webhost01 sshd[14800]: Failed password for invalid user FAKEPASS from 182.61.36.38 port 45914 ssh2
...
2019-10-14 07:35:46
220.76.205.178 attackspambots
Oct 13 20:12:58 *** sshd[3204]: User root from 220.76.205.178 not allowed because not listed in AllowUsers
2019-10-14 07:28:33
123.207.14.76 attackbotsspam
Oct 13 13:06:43 php1 sshd\[31526\]: Invalid user Admin@20 from 123.207.14.76
Oct 13 13:06:43 php1 sshd\[31526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.14.76
Oct 13 13:06:45 php1 sshd\[31526\]: Failed password for invalid user Admin@20 from 123.207.14.76 port 42167 ssh2
Oct 13 13:11:27 php1 sshd\[32053\]: Invalid user Nullen@1233 from 123.207.14.76
Oct 13 13:11:27 php1 sshd\[32053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.14.76
2019-10-14 07:40:05
167.114.98.169 attack
Oct 14 01:16:48 meumeu sshd[17968]: Failed password for root from 167.114.98.169 port 40778 ssh2
Oct 14 01:20:38 meumeu sshd[18618]: Failed password for root from 167.114.98.169 port 52572 ssh2
...
2019-10-14 07:36:04
104.155.91.177 attackbotsspam
Oct 13 22:38:47 game-panel sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.91.177
Oct 13 22:38:49 game-panel sshd[18941]: Failed password for invalid user Boca2017 from 104.155.91.177 port 50068 ssh2
Oct 13 22:42:41 game-panel sshd[19118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.91.177
2019-10-14 07:21:02
221.202.203.192 attackbots
2019-10-13T22:48:31.066165shield sshd\[18202\]: Invalid user 5tr43ew21q from 221.202.203.192 port 35052
2019-10-13T22:48:31.070580shield sshd\[18202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.202.203.192
2019-10-13T22:48:33.574447shield sshd\[18202\]: Failed password for invalid user 5tr43ew21q from 221.202.203.192 port 35052 ssh2
2019-10-13T22:53:17.303948shield sshd\[19751\]: Invalid user Toulouse from 221.202.203.192 port 54401
2019-10-13T22:53:17.308113shield sshd\[19751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.202.203.192
2019-10-14 07:27:37
217.61.14.223 attackspam
Feb 15 17:37:48 vtv3 sshd\[16831\]: Invalid user test from 217.61.14.223 port 55372
Feb 15 17:37:48 vtv3 sshd\[16831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Feb 15 17:37:50 vtv3 sshd\[16831\]: Failed password for invalid user test from 217.61.14.223 port 55372 ssh2
Feb 15 17:46:01 vtv3 sshd\[19390\]: Invalid user events from 217.61.14.223 port 45686
Feb 15 17:46:01 vtv3 sshd\[19390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Feb 19 04:25:07 vtv3 sshd\[30370\]: Invalid user marcela from 217.61.14.223 port 57194
Feb 19 04:25:07 vtv3 sshd\[30370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223
Feb 19 04:25:10 vtv3 sshd\[30370\]: Failed password for invalid user marcela from 217.61.14.223 port 57194 ssh2
Feb 19 04:33:14 vtv3 sshd\[32428\]: Invalid user bscw from 217.61.14.223 port 47468
Feb 19 04:33:14 vtv3 sshd\[32428\]: pam
2019-10-14 07:29:24
142.93.37.180 attackbotsspam
142.93.37.180 - - [13/Oct/2019:22:11:33 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.37.180 - - [13/Oct/2019:22:11:39 +0200] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.37.180 - - [13/Oct/2019:22:11:54 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.37.180 - - [13/Oct/2019:22:11:59 +0200] "POST /wp-login.php HTTP/1.1" 200 1507 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.37.180 - - [13/Oct/2019:22:12:15 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.37.180 - - [13/Oct/2019:22:12:16 +0200] "POST /wp-login.php HTTP/1.1" 200 1501 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-14 07:38:34

最近上报的IP列表

200.14.232.17 200.14.232.19 200.137.162.127 200.14.249.53
200.137.65.4 200.14.246.210 200.14.85.4 200.14.67.43
200.14.66.170 200.14.87.4 200.142.237.5 200.141.47.29
200.140.69.10 200.142.86.230 200.143.34.240 200.140.167.33
200.140.60.31 185.23.253.27 200.143.161.100 200.146.78.251