必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.172.25.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.172.25.138.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 05:39:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 138.25.172.44.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.25.172.44.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.218.7.227 attackbotsspam
Automated report - ssh fail2ban:
Sep 7 22:46:51 authentication failure 
Sep 7 22:46:52 wrong password, user=amsftp, port=35222, ssh2
Sep 7 22:51:05 authentication failure
2019-09-08 05:39:20
178.128.223.28 attackbotsspam
Sep  7 11:06:29 hiderm sshd\[2195\]: Invalid user testftp from 178.128.223.28
Sep  7 11:06:29 hiderm sshd\[2195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.28
Sep  7 11:06:31 hiderm sshd\[2195\]: Failed password for invalid user testftp from 178.128.223.28 port 52400 ssh2
Sep  7 11:13:18 hiderm sshd\[2907\]: Invalid user linux from 178.128.223.28
Sep  7 11:13:18 hiderm sshd\[2907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.28
2019-09-08 05:13:39
80.14.88.33 attackspambots
2019-09-07 05:34:03 H=lstlambert-656-1-221-33.w80-14.abo.wanadoo.fr [80.14.88.33]:37209 I=[192.147.25.65]:25 F=<0901dd06000171d2@schorch.de> rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/query/ip/80.14.88.33)
2019-09-07 05:38:48 H=lstlambert-656-1-221-33.w80-14.abo.wanadoo.fr [80.14.88.33]:47352 I=[192.147.25.65]:25 sender verify fail for : Unrouteable address
2019-09-07 05:38:48 H=lstlambert-656-1-221-33.w80-14.abo.wanadoo.fr [80.14.88.33]:47352 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
...
2019-09-08 05:36:49
193.77.216.143 attackbotsspam
Sep  7 23:03:20 OPSO sshd\[14980\]: Invalid user user from 193.77.216.143 port 34206
Sep  7 23:03:20 OPSO sshd\[14980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
Sep  7 23:03:23 OPSO sshd\[14980\]: Failed password for invalid user user from 193.77.216.143 port 34206 ssh2
Sep  7 23:12:14 OPSO sshd\[16888\]: Invalid user 12345 from 193.77.216.143 port 50824
Sep  7 23:12:14 OPSO sshd\[16888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
2019-09-08 05:12:57
217.182.158.104 attackspambots
Sep  7 23:46:11 pkdns2 sshd\[61977\]: Invalid user 1q2w3e from 217.182.158.104Sep  7 23:46:13 pkdns2 sshd\[61977\]: Failed password for invalid user 1q2w3e from 217.182.158.104 port 13278 ssh2Sep  7 23:50:14 pkdns2 sshd\[62175\]: Invalid user 123456 from 217.182.158.104Sep  7 23:50:16 pkdns2 sshd\[62175\]: Failed password for invalid user 123456 from 217.182.158.104 port 40783 ssh2Sep  7 23:54:21 pkdns2 sshd\[62315\]: Invalid user steam123 from 217.182.158.104Sep  7 23:54:24 pkdns2 sshd\[62315\]: Failed password for invalid user steam123 from 217.182.158.104 port 13043 ssh2
...
2019-09-08 05:17:42
49.88.112.60 attackspam
2019-09-07T10:38:25.922390abusebot-6.cloudsearch.cf sshd\[27879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60  user=root
2019-09-08 05:25:33
82.64.39.220 attack
$f2bV_matches_ltvn
2019-09-08 05:36:16
171.6.201.246 attack
Portscan detected
2019-09-08 05:33:16
54.37.158.40 attack
Sep  7 11:07:49 lcdev sshd\[28428\]: Invalid user 12 from 54.37.158.40
Sep  7 11:07:49 lcdev sshd\[28428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-54-37-158.eu
Sep  7 11:07:51 lcdev sshd\[28428\]: Failed password for invalid user 12 from 54.37.158.40 port 37337 ssh2
Sep  7 11:11:54 lcdev sshd\[28866\]: Invalid user 1 from 54.37.158.40
Sep  7 11:11:54 lcdev sshd\[28866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-54-37-158.eu
2019-09-08 05:15:52
191.100.26.142 attackbots
Sep  7 06:36:17 eddieflores sshd\[25293\]: Invalid user oracle from 191.100.26.142
Sep  7 06:36:17 eddieflores sshd\[25293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.26.142
Sep  7 06:36:19 eddieflores sshd\[25293\]: Failed password for invalid user oracle from 191.100.26.142 port 57423 ssh2
Sep  7 06:44:16 eddieflores sshd\[26038\]: Invalid user radio from 191.100.26.142
Sep  7 06:44:16 eddieflores sshd\[26038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.26.142
2019-09-08 05:09:01
117.50.13.42 attackspambots
Sep  7 18:00:18 nextcloud sshd\[31124\]: Invalid user webmaster from 117.50.13.42
Sep  7 18:00:18 nextcloud sshd\[31124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.13.42
Sep  7 18:00:21 nextcloud sshd\[31124\]: Failed password for invalid user webmaster from 117.50.13.42 port 48210 ssh2
...
2019-09-08 05:22:35
116.226.47.130 attack
Sep  7 19:23:28 yabzik sshd[31420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.226.47.130
Sep  7 19:23:30 yabzik sshd[31420]: Failed password for invalid user testftp from 116.226.47.130 port 55577 ssh2
Sep  7 19:27:16 yabzik sshd[904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.226.47.130
2019-09-08 05:11:17
190.211.141.217 attackbots
Sep  7 13:05:46 ns3110291 sshd\[19757\]: Invalid user server from 190.211.141.217
Sep  7 13:05:46 ns3110291 sshd\[19757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217 
Sep  7 13:05:48 ns3110291 sshd\[19757\]: Failed password for invalid user server from 190.211.141.217 port 17231 ssh2
Sep  7 13:11:10 ns3110291 sshd\[20222\]: Invalid user user from 190.211.141.217
Sep  7 13:11:10 ns3110291 sshd\[20222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217 
...
2019-09-08 05:44:31
114.108.181.165 attackspam
Sep  7 12:40:31 MK-Soft-VM3 sshd\[7802\]: Invalid user 111 from 114.108.181.165 port 45320
Sep  7 12:40:31 MK-Soft-VM3 sshd\[7802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.165
Sep  7 12:40:33 MK-Soft-VM3 sshd\[7802\]: Failed password for invalid user 111 from 114.108.181.165 port 45320 ssh2
...
2019-09-08 05:47:40
201.6.98.14 attack
Sep  7 04:45:35 hanapaa sshd\[1631\]: Invalid user diradmin from 201.6.98.14
Sep  7 04:45:35 hanapaa sshd\[1631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.98.14
Sep  7 04:45:38 hanapaa sshd\[1631\]: Failed password for invalid user diradmin from 201.6.98.14 port 31551 ssh2
Sep  7 04:52:11 hanapaa sshd\[2677\]: Invalid user vncuser123 from 201.6.98.14
Sep  7 04:52:11 hanapaa sshd\[2677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.98.14
2019-09-08 05:30:39

最近上报的IP列表

169.171.63.156 155.108.233.44 61.165.173.174 99.83.98.8
162.72.170.65 73.177.181.212 180.255.114.89 4.135.18.123
143.72.222.147 8.182.108.253 153.209.38.11 191.255.106.113
148.40.16.118 104.243.17.31 137.130.78.222 36.106.155.117
107.77.134.108 104.232.49.87 253.14.136.245 214.225.188.168