必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.138.190.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.138.190.61.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:13:41 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
61.190.138.222.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.190.138.222.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.123.9.163 attack
Repeated RDP login failures. Last user: Share
2020-04-02 12:26:04
177.92.172.22 attackbots
Repeated RDP login failures. Last user: Office
2020-04-02 12:32:55
83.171.104.57 attackbotsspam
k+ssh-bruteforce
2020-04-02 12:17:25
40.71.225.158 attackspam
Apr  1 23:55:02 NPSTNNYC01T sshd[16870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.225.158
Apr  1 23:55:04 NPSTNNYC01T sshd[16870]: Failed password for invalid user gjq from 40.71.225.158 port 18545 ssh2
Apr  1 23:59:21 NPSTNNYC01T sshd[17212]: Failed password for root from 40.71.225.158 port 32832 ssh2
...
2020-04-02 12:13:22
88.248.50.133 attack
Repeated RDP login failures. Last user: Scans
2020-04-02 12:38:32
195.9.20.49 attack
Repeated RDP login failures. Last user: Administrator
2020-04-02 12:46:30
171.231.99.149 attackbotsspam
1585799949 - 04/02/2020 05:59:09 Host: 171.231.99.149/171.231.99.149 Port: 445 TCP Blocked
2020-04-02 12:21:32
13.80.153.112 attackbotsspam
Repeated RDP login failures. Last user: Administrator
2020-04-02 12:42:41
27.189.251.86 attack
CMS (WordPress or Joomla) login attempt.
2020-04-02 12:10:45
194.61.24.64 attackbotsspam
Repeated RDP login failures. Last user: Admin
2020-04-02 12:30:42
94.191.90.85 attackspambots
Apr  2 06:51:43 lukav-desktop sshd\[26975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.90.85  user=root
Apr  2 06:51:45 lukav-desktop sshd\[26975\]: Failed password for root from 94.191.90.85 port 50132 ssh2
Apr  2 06:59:14 lukav-desktop sshd\[27294\]: Invalid user dk from 94.191.90.85
Apr  2 06:59:14 lukav-desktop sshd\[27294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.90.85
Apr  2 06:59:15 lukav-desktop sshd\[27294\]: Failed password for invalid user dk from 94.191.90.85 port 51746 ssh2
2020-04-02 12:15:37
171.244.4.162 attack
Repeated RDP login failures. Last user: Xpmuser
2020-04-02 12:26:23
196.188.30.27 attackbotsspam
Repeated RDP login failures. Last user: Administrator
2020-04-02 12:24:05
45.142.152.147 attackspam
Repeated RDP login failures. Last user: T1
2020-04-02 12:41:42
103.71.59.14 attackspambots
Repeated RDP login failures. Last user: Administrator
2020-04-02 12:38:10

最近上报的IP列表

185.250.45.65 5.234.147.227 162.144.63.211 200.56.35.235
89.100.107.74 122.13.77.173 84.20.89.65 135.125.136.52
45.160.78.29 202.79.20.67 101.43.167.23 60.162.199.101
89.223.64.238 203.204.219.117 27.40.100.20 80.87.177.147
23.108.42.4 27.128.163.250 213.242.122.186 111.38.166.251