必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
61.157.207.90 attackbotsspam
20 attempts against mh-ssh on fire
2020-04-15 05:29:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.157.207.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.157.207.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:32:40 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
138.207.157.61.in-addr.arpa domain name pointer 138.207.157.61.dial.dy.sc.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.207.157.61.in-addr.arpa	name = 138.207.157.61.dial.dy.sc.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.185.186.213 attackspam
Jun  7 10:48:11 piServer sshd[30920]: Failed password for root from 91.185.186.213 port 42936 ssh2
Jun  7 10:51:30 piServer sshd[31282]: Failed password for root from 91.185.186.213 port 43584 ssh2
...
2020-06-07 18:43:20
61.177.172.158 attack
2020-06-07T09:57:13.723252shield sshd\[19185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-06-07T09:57:16.281893shield sshd\[19185\]: Failed password for root from 61.177.172.158 port 36655 ssh2
2020-06-07T09:57:18.159914shield sshd\[19185\]: Failed password for root from 61.177.172.158 port 36655 ssh2
2020-06-07T09:57:20.314034shield sshd\[19185\]: Failed password for root from 61.177.172.158 port 36655 ssh2
2020-06-07T09:59:57.235604shield sshd\[20447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-06-07 18:48:07
198.108.67.93 attackbots
 TCP (SYN) 198.108.67.93:28310 -> port 5989, len 44
2020-06-07 18:25:30
47.15.144.228 attackbots
Attempts to probe web pages for vulnerable PHP or other applications
2020-06-07 18:36:23
162.241.94.40 attackbots
SSH bruteforce
2020-06-07 18:51:05
42.113.110.27 attackbotsspam
1591501679 - 06/07/2020 05:47:59 Host: 42.113.110.27/42.113.110.27 Port: 445 TCP Blocked
2020-06-07 18:49:47
138.197.166.66 attackbots
Jun  7 12:37:03 vpn01 sshd[13749]: Failed password for root from 138.197.166.66 port 39898 ssh2
...
2020-06-07 18:48:33
141.98.80.153 attackbots
Jun  7 11:46:13 relay postfix/smtpd\[30272\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 11:54:14 relay postfix/smtpd\[7360\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 11:54:33 relay postfix/smtpd\[7351\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 11:57:45 relay postfix/smtpd\[7360\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  7 11:58:04 relay postfix/smtpd\[7360\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-07 18:27:15
111.231.139.30 attackbotsspam
SSH bruteforce
2020-06-07 18:27:30
49.232.145.175 attack
Unauthorized SSH login attempts
2020-06-07 18:45:21
103.235.167.51 attackbotsspam
Automatic report - Port Scan Attack
2020-06-07 18:59:59
129.211.38.207 attackbotsspam
Jun  7 12:45:39 mout sshd[31768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207  user=root
Jun  7 12:45:41 mout sshd[31768]: Failed password for root from 129.211.38.207 port 54870 ssh2
2020-06-07 18:56:01
190.85.145.162 attack
Jun  7 07:12:23 marvibiene sshd[20380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162  user=root
Jun  7 07:12:26 marvibiene sshd[20380]: Failed password for root from 190.85.145.162 port 50174 ssh2
Jun  7 07:19:35 marvibiene sshd[20511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162  user=root
Jun  7 07:19:37 marvibiene sshd[20511]: Failed password for root from 190.85.145.162 port 58144 ssh2
...
2020-06-07 18:58:02
31.41.68.127 attackspam
07.06.2020 05:47:54 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-06-07 18:57:03
185.233.192.111 attack
Automatic report - Windows Brute-Force Attack
2020-06-07 18:41:38

最近上报的IP列表

207.248.171.229 150.209.157.87 151.183.12.100 67.103.230.233
116.75.24.2 58.13.151.203 230.147.207.135 144.55.139.97
150.109.155.168 36.93.62.254 254.29.220.124 217.254.213.232
75.143.44.246 118.210.172.225 46.114.108.151 128.172.194.123
205.233.62.200 191.149.181.244 36.251.196.93 130.217.117.177