必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Edmonton

省份(region): Alberta

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Rogers Communications Canada Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.138.193.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53445
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.138.193.12.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 14:11:56 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
12.193.138.216.in-addr.arpa domain name pointer h216-138-193-12.sirkit.ca.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
12.193.138.216.in-addr.arpa	name = h216-138-193-12.sirkit.ca.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.162.255.240 attack
2019-08-17T08:47:24.525077Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 139.162.255.240:51354 \(107.175.91.48:22\) \[session: 2e0eb9d709e6\]
2019-08-17T08:47:24.537044Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 139.162.255.240:51360 \(107.175.91.48:22\) \[session: 0f4298c861e2\]
...
2019-08-17 19:29:01
103.207.11.6 attack
Aug 16 21:30:51 eddieflores sshd\[1851\]: Invalid user angelo from 103.207.11.6
Aug 16 21:30:51 eddieflores sshd\[1851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.6
Aug 16 21:30:52 eddieflores sshd\[1851\]: Failed password for invalid user angelo from 103.207.11.6 port 38490 ssh2
Aug 16 21:36:18 eddieflores sshd\[2289\]: Invalid user chu from 103.207.11.6
Aug 16 21:36:18 eddieflores sshd\[2289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.6
2019-08-17 19:46:48
66.240.236.119 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-17 19:25:37
54.38.184.235 attackbotsspam
Aug 17 01:25:12 web9 sshd\[27730\]: Invalid user 123 from 54.38.184.235
Aug 17 01:25:12 web9 sshd\[27730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235
Aug 17 01:25:15 web9 sshd\[27730\]: Failed password for invalid user 123 from 54.38.184.235 port 51128 ssh2
Aug 17 01:29:12 web9 sshd\[28501\]: Invalid user autoarbi from 54.38.184.235
Aug 17 01:29:12 web9 sshd\[28501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235
2019-08-17 19:38:40
206.189.127.6 attackbots
Invalid user ogrish from 206.189.127.6 port 55146
2019-08-17 20:04:38
120.132.31.165 attack
Aug 17 11:54:06 sshgateway sshd\[23945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.31.165  user=root
Aug 17 11:54:09 sshgateway sshd\[23945\]: Failed password for root from 120.132.31.165 port 42550 ssh2
Aug 17 11:59:50 sshgateway sshd\[24503\]: Invalid user aleks from 120.132.31.165
2019-08-17 20:00:54
51.15.1.221 attack
Aug 17 13:47:49 vserver sshd\[1273\]: Invalid user admin from 51.15.1.221Aug 17 13:47:51 vserver sshd\[1273\]: Failed password for invalid user admin from 51.15.1.221 port 35478 ssh2Aug 17 13:47:54 vserver sshd\[1273\]: Failed password for invalid user admin from 51.15.1.221 port 35478 ssh2Aug 17 13:47:57 vserver sshd\[1273\]: Failed password for invalid user admin from 51.15.1.221 port 35478 ssh2
...
2019-08-17 19:57:13
179.146.236.114 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-17 20:00:25
172.105.93.108 attackbots
Caught in portsentry honeypot
2019-08-17 19:24:41
148.253.129.84 attackbotsspam
Aug 17 13:37:24 * sshd[24979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.253.129.84
Aug 17 13:37:26 * sshd[24979]: Failed password for invalid user versuch from 148.253.129.84 port 60582 ssh2
2019-08-17 19:56:41
45.32.105.222 attackspambots
Aug 17 09:09:54 server6 sshd[31619]: reveeclipse mapping checking getaddrinfo for 45.32.105.222.vultr.com [45.32.105.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 17 09:09:56 server6 sshd[31619]: Failed password for invalid user john from 45.32.105.222 port 52282 ssh2
Aug 17 09:09:56 server6 sshd[31619]: Received disconnect from 45.32.105.222: 11: Bye Bye [preauth]
Aug 17 09:24:44 server6 sshd[15423]: reveeclipse mapping checking getaddrinfo for 45.32.105.222.vultr.com [45.32.105.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 17 09:24:46 server6 sshd[15423]: Failed password for invalid user gc from 45.32.105.222 port 40010 ssh2
Aug 17 09:24:46 server6 sshd[15423]: Received disconnect from 45.32.105.222: 11: Bye Bye [preauth]
Aug 17 09:29:34 server6 sshd[20247]: reveeclipse mapping checking getaddrinfo for 45.32.105.222.vultr.com [45.32.105.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 17 09:29:37 server6 sshd[20247]: Failed password for invalid user mri from 45.32.105.222 p........
-------------------------------
2019-08-17 19:59:05
182.61.133.143 attackspam
Aug 17 14:02:06 srv-4 sshd\[22354\]: Invalid user professor from 182.61.133.143
Aug 17 14:02:06 srv-4 sshd\[22354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.133.143
Aug 17 14:02:07 srv-4 sshd\[22354\]: Failed password for invalid user professor from 182.61.133.143 port 53088 ssh2
...
2019-08-17 20:12:07
36.62.243.87 attack
Aug 17 09:19:21 mail postfix/smtpd\[19621\]: warning: unknown\[36.62.243.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 17 09:19:33 mail postfix/smtpd\[19619\]: warning: unknown\[36.62.243.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 17 09:19:47 mail postfix/smtpd\[19621\]: warning: unknown\[36.62.243.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-17 19:51:52
178.128.104.16 attackspam
Aug 17 14:30:03 pkdns2 sshd\[2882\]: Invalid user susanne from 178.128.104.16Aug 17 14:30:05 pkdns2 sshd\[2882\]: Failed password for invalid user susanne from 178.128.104.16 port 33910 ssh2Aug 17 14:34:53 pkdns2 sshd\[3078\]: Invalid user server from 178.128.104.16Aug 17 14:34:55 pkdns2 sshd\[3078\]: Failed password for invalid user server from 178.128.104.16 port 53256 ssh2Aug 17 14:39:55 pkdns2 sshd\[3320\]: Invalid user iris from 178.128.104.16Aug 17 14:39:57 pkdns2 sshd\[3320\]: Failed password for invalid user iris from 178.128.104.16 port 44374 ssh2
...
2019-08-17 19:58:47
62.210.178.153 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-17 19:37:09

最近上报的IP列表

77.65.37.78 213.111.85.175 183.166.98.92 118.106.4.109
98.170.166.223 184.203.216.20 188.114.89.90 175.119.65.189
93.199.24.10 198.58.190.76 118.22.29.134 74.88.62.208
80.52.247.4 184.183.83.231 169.44.133.214 206.62.200.135
32.244.200.207 207.214.23.226 77.105.87.132 111.233.12.177