必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.130.196.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.130.196.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 18:58:59 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
139.196.130.38.in-addr.arpa domain name pointer 38.130.196.139.hosted.at.cloudsouth.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.196.130.38.in-addr.arpa	name = 38.130.196.139.hosted.at.cloudsouth.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.125.71.111 attackbots
Automatic report - Banned IP Access
2019-08-15 09:47:13
162.247.72.199 attackspambots
Aug 15 01:35:34 thevastnessof sshd[11685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199
...
2019-08-15 09:38:05
140.143.193.42 attack
Aug 15 04:48:17 yabzik sshd[1074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.193.42
Aug 15 04:48:19 yabzik sshd[1074]: Failed password for invalid user ricki from 140.143.193.42 port 50486 ssh2
Aug 15 04:50:46 yabzik sshd[2141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.193.42
2019-08-15 10:16:18
180.96.69.215 attackspambots
Aug 14 22:02:37 plusreed sshd[28874]: Invalid user alias from 180.96.69.215
...
2019-08-15 10:14:05
138.197.166.233 attack
Aug 15 03:06:31 debian sshd\[5292\]: Invalid user ajeet from 138.197.166.233 port 43504
Aug 15 03:06:31 debian sshd\[5292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.233
...
2019-08-15 10:12:44
92.53.65.52 attack
08/14/2019-19:32:19.419290 92.53.65.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-15 10:26:17
116.26.93.174 attackspambots
Automatic report - Port Scan Attack
2019-08-15 09:45:39
41.140.230.180 attack
Aug 14 01:12:10 shared02 sshd[4851]: Invalid user webster from 41.140.230.180
Aug 14 01:12:10 shared02 sshd[4851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.140.230.180
Aug 14 01:12:12 shared02 sshd[4851]: Failed password for invalid user webster from 41.140.230.180 port 45027 ssh2
Aug 14 01:12:12 shared02 sshd[4851]: Received disconnect from 41.140.230.180 port 45027:11: Bye Bye [preauth]
Aug 14 01:12:12 shared02 sshd[4851]: Disconnected from 41.140.230.180 port 45027 [preauth]
Aug 14 01:33:40 shared02 sshd[24149]: Invalid user XXX from 41.140.230.180
Aug 14 01:33:40 shared02 sshd[24149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.140.230.180
Aug 14 01:33:43 shared02 sshd[24149]: Failed password for invalid user XXX from 41.140.230.180
.... truncated .... 

Aug 14 01:12:10 shared02 sshd[4851]: Invalid user webster from 41.140.230.180
Aug 14 01:12:10 shared02 sshd[4851]: pam........
-------------------------------
2019-08-15 09:40:03
154.68.39.6 attackspambots
Aug 15 04:53:05 srv-4 sshd\[25702\]: Invalid user jboss from 154.68.39.6
Aug 15 04:53:05 srv-4 sshd\[25702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6
Aug 15 04:53:07 srv-4 sshd\[25702\]: Failed password for invalid user jboss from 154.68.39.6 port 36616 ssh2
...
2019-08-15 10:09:57
60.30.26.213 attackbots
2019-08-15T01:37:58.563440abusebot-3.cloudsearch.cf sshd\[5516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.26.213  user=root
2019-08-15 10:04:27
62.234.96.175 attackspam
2019-08-15T01:08:27.930896abusebot-8.cloudsearch.cf sshd\[11954\]: Invalid user ftpuser from 62.234.96.175 port 48811
2019-08-15 09:47:47
191.53.196.37 attackbotsspam
Aug 14 19:34:14 web1 postfix/smtpd[7335]: warning: unknown[191.53.196.37]: SASL PLAIN authentication failed: authentication failure
...
2019-08-15 09:40:26
212.83.184.217 attackbotsspam
\[2019-08-14 22:09:54\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '212.83.184.217:2749' - Wrong password
\[2019-08-14 22:09:54\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-14T22:09:54.891-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="17872",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.184.217/63424",Challenge="7a0e11e6",ReceivedChallenge="7a0e11e6",ReceivedHash="806e9e8b3b2fe2a66fc464308eff7eb1"
\[2019-08-14 22:10:44\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '212.83.184.217:2791' - Wrong password
\[2019-08-14 22:10:44\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-14T22:10:44.546-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="17757",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.
2019-08-15 10:18:34
45.171.177.247 attack
Unauthorised access (Aug 15) SRC=45.171.177.247 LEN=40 TTL=52 ID=9913 TCP DPT=23 WINDOW=15822 SYN
2019-08-15 09:54:30
189.4.1.12 attackspam
Aug 14 21:36:17 vps200512 sshd\[10055\]: Invalid user jiao from 189.4.1.12
Aug 14 21:36:17 vps200512 sshd\[10055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12
Aug 14 21:36:19 vps200512 sshd\[10055\]: Failed password for invalid user jiao from 189.4.1.12 port 40268 ssh2
Aug 14 21:42:29 vps200512 sshd\[10303\]: Invalid user lian from 189.4.1.12
Aug 14 21:42:29 vps200512 sshd\[10303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12
2019-08-15 09:45:01

最近上报的IP列表

19.209.90.122 118.177.88.114 203.189.79.169 24.89.245.127
240.63.221.80 212.207.142.7 213.212.69.0 99.84.159.219
76.246.175.178 31.208.121.228 201.193.57.98 72.100.196.254
43.22.67.25 178.193.159.164 17.207.231.19 161.189.98.152
149.86.127.231 54.153.199.135 207.76.227.203 16.14.31.128