必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.231.162.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8919
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;22.231.162.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 06:48:24 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 138.162.231.22.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 138.162.231.22.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.118.37.74 attackbotsspam
Aug  6 20:14:02 mail kernel: [204068.809682] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=46519 PROTO=TCP SPT=46525 DPT=47008 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug  6 20:17:48 mail kernel: [204295.401102] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3920 PROTO=TCP SPT=46525 DPT=46721 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug  6 20:18:52 mail kernel: [204359.423536] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=60123 PROTO=TCP SPT=46525 DPT=58708 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug  6 20:19:55 mail kernel: [204421.848954] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=24771 PROTO=TCP SPT=46525 DPT=48715 WINDOW=1024 RES=0x00 SYN URGP=
2019-08-07 04:43:59
113.14.236.25 attackspambots
Aug  6 12:44:50 xxxxxxx0 sshd[1289]: Invalid user admin from 113.14.236.25 port 36065
Aug  6 12:44:50 xxxxxxx0 sshd[1289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.14.236.25
Aug  6 12:44:52 xxxxxxx0 sshd[1289]: Failed password for invalid user admin from 113.14.236.25 port 36065 ssh2
Aug  6 12:44:54 xxxxxxx0 sshd[1289]: Failed password for invalid user admin from 113.14.236.25 port 36065 ssh2
Aug  6 12:44:57 xxxxxxx0 sshd[1289]: Failed password for invalid user admin from 113.14.236.25 port 36065 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.14.236.25
2019-08-07 04:21:28
202.69.66.130 attackspambots
Aug  6 22:02:34 bouncer sshd\[9785\]: Invalid user oper from 202.69.66.130 port 1764
Aug  6 22:02:34 bouncer sshd\[9785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.69.66.130 
Aug  6 22:02:36 bouncer sshd\[9785\]: Failed password for invalid user oper from 202.69.66.130 port 1764 ssh2
...
2019-08-07 04:57:52
121.140.179.171 attackspam
Aug  6 19:24:31 raspberrypi sshd\[5920\]: Invalid user postgres from 121.140.179.171Aug  6 19:24:33 raspberrypi sshd\[5920\]: Failed password for invalid user postgres from 121.140.179.171 port 54942 ssh2Aug  6 20:10:56 raspberrypi sshd\[7162\]: Invalid user travis from 121.140.179.171
...
2019-08-07 04:48:05
105.108.199.196 attackspam
Aug  6 07:03:34 esmtp postfix/smtpd[27678]: lost connection after AUTH from unknown[105.108.199.196]
Aug  6 07:03:35 esmtp postfix/smtpd[27678]: lost connection after AUTH from unknown[105.108.199.196]
Aug  6 07:03:35 esmtp postfix/smtpd[27676]: lost connection after UNKNOWN from unknown[105.108.199.196]
Aug  6 07:03:37 esmtp postfix/smtpd[27617]: lost connection after AUTH from unknown[105.108.199.196]
Aug  6 07:03:38 esmtp postfix/smtpd[27617]: lost connection after AUTH from unknown[105.108.199.196]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=105.108.199.196
2019-08-07 04:12:45
115.110.249.114 attackbotsspam
Aug  6 21:32:02 ArkNodeAT sshd\[9105\]: Invalid user zliu from 115.110.249.114
Aug  6 21:32:02 ArkNodeAT sshd\[9105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.249.114
Aug  6 21:32:04 ArkNodeAT sshd\[9105\]: Failed password for invalid user zliu from 115.110.249.114 port 37946 ssh2
2019-08-07 04:24:29
179.158.60.95 attackbotsspam
(sshd) Failed SSH login from 179.158.60.95 (b39e3c5f.virtua.com.br): 5 in the last 3600 secs
2019-08-07 04:20:22
86.49.81.10 attackbots
ZyXEL P660HN ADSL Router viewlog.asp command injection attempt
2019-08-07 04:27:25
141.98.81.81 attackbotsspam
2019-08-05T07:00:00.599323WS-Zach sshd[25945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.81
2019-08-05T07:00:00.595686WS-Zach sshd[25945]: Invalid user admin from 141.98.81.81 port 44429
2019-08-05T07:00:02.233243WS-Zach sshd[25945]: Failed password for invalid user admin from 141.98.81.81 port 44429 ssh2
2019-08-06T16:24:15.340253WS-Zach sshd[30913]: Invalid user admin from 141.98.81.81 port 43066
2019-08-06T16:24:15.343738WS-Zach sshd[30913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.81
2019-08-06T16:24:15.340253WS-Zach sshd[30913]: Invalid user admin from 141.98.81.81 port 43066
2019-08-06T16:24:17.893798WS-Zach sshd[30913]: Failed password for invalid user admin from 141.98.81.81 port 43066 ssh2
...
2019-08-07 04:50:05
124.204.45.66 attack
Aug  7 03:14:05 webhost01 sshd[9884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.45.66
Aug  7 03:14:07 webhost01 sshd[9884]: Failed password for invalid user pimp from 124.204.45.66 port 34170 ssh2
...
2019-08-07 04:35:42
213.162.80.237 attackbotsspam
Spam Timestamp : 06-Aug-19 11:51 _ BlockList Provider  combined abuse _ (658)
2019-08-07 04:44:46
159.65.39.83 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-08-07 04:18:29
46.219.103.180 attackbots
2019-08-06 06:11:28 H=(46.219.103.180.freenet.com.ua) [46.219.103.180]:34509 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.2, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBL453285)
2019-08-06 06:11:28 H=(46.219.103.180.freenet.com.ua) [46.219.103.180]:34509 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.2, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBL453285)
2019-08-06 06:11:29 H=(46.219.103.180.freenet.com.ua) [46.219.103.180]:34509 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.2, 127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/46.219.103.180)
...
2019-08-07 04:48:44
14.186.117.98 attackspambots
Apr 18 11:27:46 motanud sshd\[30926\]: Invalid user sshvpn from 14.186.117.98 port 36986
Apr 18 11:27:46 motanud sshd\[30926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.117.98
Apr 18 11:27:48 motanud sshd\[30926\]: Failed password for invalid user sshvpn from 14.186.117.98 port 36986 ssh2
2019-08-07 04:16:42
94.78.182.23 attack
Aug  6 12:48:35 m1 sshd[3013]: Failed password for r.r from 94.78.182.23 port 51774 ssh2
Aug  6 12:48:37 m1 sshd[3013]: Failed password for r.r from 94.78.182.23 port 51774 ssh2
Aug  6 12:48:40 m1 sshd[3013]: Failed password for r.r from 94.78.182.23 port 51774 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.78.182.23
2019-08-07 04:52:04

最近上报的IP列表

40.248.215.151 187.18.223.106 117.207.160.75 177.11.12.50
204.186.89.243 10.72.239.100 142.181.245.64 157.26.17.229
80.241.214.152 230.4.126.41 141.98.80.95 198.71.238.7
113.204.147.26 84.242.96.142 47.98.62.203 79.164.176.68
178.161.243.241 198.71.234.16 192.3.207.42 89.187.177.135