必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.64.34.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.64.34.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 08:22:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
138.34.64.202.in-addr.arpa domain name pointer ip138.bb34.pacific.net.hk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.34.64.202.in-addr.arpa	name = ip138.bb34.pacific.net.hk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
72.82.142.116 attackspam
Jun 24 10:33:44 odroid64 sshd\[14192\]: Invalid user itk from 72.82.142.116
Jun 24 10:33:44 odroid64 sshd\[14192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.82.142.116
...
2020-06-24 19:18:19
218.4.239.146 attackbotsspam
2020-06-24T17:30:58.075025mx1.h3z.jp postfix/smtpd[8596]: warning: unknown[218.4.239.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-24T17:31:05.263465mx1.h3z.jp postfix/smtpd[8596]: warning: unknown[218.4.239.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-24T17:31:16.123397mx1.h3z.jp postfix/smtpd[8596]: warning: unknown[218.4.239.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-24 19:23:09
104.238.120.71 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-24 19:21:49
188.166.232.29 attackspambots
srv02 Mass scanning activity detected Target: 17134  ..
2020-06-24 19:03:36
104.248.159.69 attack
Invalid user ros from 104.248.159.69 port 53300
2020-06-24 19:23:24
177.155.36.208 attackbots
Unauthorized connection attempt detected from IP address 177.155.36.208 to port 23
2020-06-24 19:16:53
181.48.139.118 attackspam
Unauthorized connection attempt SSH Traffic
2020-06-24 19:11:09
107.180.92.3 attackspam
$f2bV_matches
2020-06-24 19:19:58
190.218.21.217 attack
Automatic report - XMLRPC Attack
2020-06-24 19:35:04
159.65.217.130 attackspambots
SSH_attack
2020-06-24 19:31:46
123.195.106.186 attack
Unauthorised access (Jun 24) SRC=123.195.106.186 LEN=40 TTL=50 ID=48529 TCP DPT=23 WINDOW=8590 SYN
2020-06-24 19:04:32
31.163.148.138 attack
port scan and connect, tcp 23 (telnet)
2020-06-24 19:00:19
208.109.12.218 attack
208.109.12.218 - - [24/Jun/2020:10:50:10 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.12.218 - - [24/Jun/2020:10:50:12 +0200] "POST /wp-login.php HTTP/1.1" 200 3412 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-24 19:14:08
119.29.234.23 attackbotsspam
Jun 24 09:47:06 IngegnereFirenze sshd[22658]: Failed password for invalid user pav from 119.29.234.23 port 38406 ssh2
...
2020-06-24 19:15:59
192.241.220.236 attackspam
Port scan denied
2020-06-24 19:35:36

最近上报的IP列表

129.19.78.51 90.51.48.246 164.106.249.228 141.247.73.17
191.27.59.183 15.141.80.74 209.206.64.35 160.245.143.68
70.69.171.7 23.188.238.154 14.41.238.17 171.104.70.57
88.171.110.92 174.28.149.180 169.130.66.6 135.95.144.173
224.61.26.222 87.174.4.124 68.176.156.82 29.153.180.207