必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.100.138.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.100.138.185.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 21:57:46 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 185.138.100.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.138.100.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.75.53.228 attackbots
Invalid user es from 106.75.53.228 port 48998
2020-06-14 08:18:28
31.132.151.46 attackspambots
prod11
...
2020-06-14 08:27:08
170.0.48.161 attack
Jun 13 22:43:59 mail.srvfarm.net postfix/smtpd[1294848]: lost connection after CONNECT from unknown[170.0.48.161]
Jun 13 22:48:14 mail.srvfarm.net postfix/smtpd[1294828]: warning: unknown[170.0.48.161]: SASL PLAIN authentication failed: 
Jun 13 22:48:14 mail.srvfarm.net postfix/smtpd[1294828]: lost connection after AUTH from unknown[170.0.48.161]
Jun 13 22:50:00 mail.srvfarm.net postfix/smtpd[1295658]: warning: unknown[170.0.48.161]: SASL PLAIN authentication failed: 
Jun 13 22:50:01 mail.srvfarm.net postfix/smtpd[1295658]: lost connection after AUTH from unknown[170.0.48.161]
2020-06-14 08:36:15
207.248.113.124 attackbotsspam
Jun 13 22:45:58 mail.srvfarm.net postfix/smtpd[1294955]: warning: unknown[207.248.113.124]: SASL PLAIN authentication failed: 
Jun 13 22:45:58 mail.srvfarm.net postfix/smtpd[1294955]: lost connection after AUTH from unknown[207.248.113.124]
Jun 13 22:46:13 mail.srvfarm.net postfix/smtpd[1294953]: lost connection after CONNECT from unknown[207.248.113.124]
Jun 13 22:51:56 mail.srvfarm.net postfix/smtps/smtpd[1295671]: warning: unknown[207.248.113.124]: SASL PLAIN authentication failed: 
Jun 13 22:51:56 mail.srvfarm.net postfix/smtps/smtpd[1295671]: lost connection after AUTH from unknown[207.248.113.124]
2020-06-14 08:30:33
92.62.238.185 attackspambots
Jun 13 23:00:56 mail.srvfarm.net postfix/smtps/smtpd[1296621]: warning: unknown[92.62.238.185]: SASL PLAIN authentication failed: 
Jun 13 23:00:56 mail.srvfarm.net postfix/smtps/smtpd[1296621]: lost connection after AUTH from unknown[92.62.238.185]
Jun 13 23:04:55 mail.srvfarm.net postfix/smtpd[1308722]: warning: unknown[92.62.238.185]: SASL PLAIN authentication failed: 
Jun 13 23:04:55 mail.srvfarm.net postfix/smtpd[1308722]: lost connection after AUTH from unknown[92.62.238.185]
Jun 13 23:05:38 mail.srvfarm.net postfix/smtps/smtpd[1296630]: lost connection after CONNECT from unknown[92.62.238.185]
2020-06-14 08:08:05
122.51.97.192 attackspam
[ssh] SSH attack
2020-06-14 08:46:12
124.43.9.184 attackbots
(sshd) Failed SSH login from 124.43.9.184 (LK/Sri Lanka/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 13 23:10:08 ubnt-55d23 sshd[11565]: Invalid user postgres from 124.43.9.184 port 53836
Jun 13 23:10:09 ubnt-55d23 sshd[11565]: Failed password for invalid user postgres from 124.43.9.184 port 53836 ssh2
2020-06-14 08:16:16
111.231.190.106 attackspam
Jun 14 01:36:42 Ubuntu-1404-trusty-64-minimal sshd\[5791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.190.106  user=root
Jun 14 01:36:45 Ubuntu-1404-trusty-64-minimal sshd\[5791\]: Failed password for root from 111.231.190.106 port 33544 ssh2
Jun 14 01:56:40 Ubuntu-1404-trusty-64-minimal sshd\[11871\]: Invalid user monitor from 111.231.190.106
Jun 14 01:56:40 Ubuntu-1404-trusty-64-minimal sshd\[11871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.190.106
Jun 14 01:56:41 Ubuntu-1404-trusty-64-minimal sshd\[11871\]: Failed password for invalid user monitor from 111.231.190.106 port 60710 ssh2
2020-06-14 08:15:22
124.89.35.68 attack
Port Scan detected!
...
2020-06-14 08:25:02
111.230.226.124 attack
Jun 14 02:07:06 home sshd[19086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
Jun 14 02:07:08 home sshd[19086]: Failed password for invalid user dovecot from 111.230.226.124 port 53428 ssh2
Jun 14 02:08:33 home sshd[20161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
...
2020-06-14 08:15:40
113.172.179.235 attackbots
Unauthorized IMAP connection attempt
2020-06-14 08:04:02
192.35.168.233 attackspambots
Multiport scan : 4 ports scanned 8702 8878 9849 12548
2020-06-14 08:10:52
223.197.125.10 attackbotsspam
SSH brute-force: detected 18 distinct username(s) / 27 distinct password(s) within a 24-hour window.
2020-06-14 08:22:44
141.98.81.207 attack
Jun 13 05:47:54 XXX sshd[63091]: Invalid user admin from 141.98.81.207 port 11397
2020-06-14 08:09:44
34.92.184.54 attackbotsspam
$f2bV_matches
2020-06-14 08:12:24

最近上报的IP列表

140.187.57.14 69.216.69.22 228.139.85.172 191.43.208.184
138.94.51.46 93.126.191.221 199.56.95.9 47.77.135.104
219.120.154.77 166.92.100.30 32.201.219.207 196.155.175.133
231.48.111.156 131.218.150.15 86.11.2.184 203.68.178.244
81.91.118.83 21.29.238.235 99.95.183.33 197.45.2.101