必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.242.107.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;63.242.107.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:07:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
138.107.242.63.in-addr.arpa domain name pointer 138.mug107.aust.sflmi01r1.dsl.att.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.107.242.63.in-addr.arpa	name = 138.mug107.aust.sflmi01r1.dsl.att.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.162.140.172 attack
Nov 12 16:09:00 srv4 sshd[20435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.162.140.172 
Nov 12 16:09:02 srv4 sshd[20435]: Failed password for invalid user wheaton from 58.162.140.172 port 39073 ssh2
Nov 12 16:14:10 srv4 sshd[20472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.162.140.172 
...
2019-11-13 00:14:16
104.243.41.97 attackbotsspam
Nov 12 05:09:20 sachi sshd\[7337\]: Invalid user fruen from 104.243.41.97
Nov 12 05:09:20 sachi sshd\[7337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97
Nov 12 05:09:22 sachi sshd\[7337\]: Failed password for invalid user fruen from 104.243.41.97 port 35972 ssh2
Nov 12 05:12:38 sachi sshd\[7630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97  user=root
Nov 12 05:12:39 sachi sshd\[7630\]: Failed password for root from 104.243.41.97 port 42508 ssh2
2019-11-13 00:50:26
197.155.234.157 attack
Nov 12 17:26:50 server sshd\[3485\]: Invalid user info from 197.155.234.157
Nov 12 17:26:50 server sshd\[3485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157 
Nov 12 17:26:51 server sshd\[3485\]: Failed password for invalid user info from 197.155.234.157 port 40844 ssh2
Nov 12 17:39:48 server sshd\[6939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157  user=root
Nov 12 17:39:50 server sshd\[6939\]: Failed password for root from 197.155.234.157 port 60142 ssh2
...
2019-11-13 00:47:08
223.223.188.226 attack
2019-11-12T15:54:53.529429abusebot-8.cloudsearch.cf sshd\[31819\]: Invalid user http from 223.223.188.226 port 50659
2019-11-13 00:13:53
42.238.191.73 attackspambots
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-13 00:20:33
115.49.196.29 attack
firewall-block, port(s): 23/tcp
2019-11-13 00:18:41
178.128.52.97 attackbots
Nov 12 15:09:55 vtv3 sshd\[30918\]: Invalid user cathleen from 178.128.52.97 port 53546
Nov 12 15:09:55 vtv3 sshd\[30918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97
Nov 12 15:09:56 vtv3 sshd\[30918\]: Failed password for invalid user cathleen from 178.128.52.97 port 53546 ssh2
Nov 12 15:19:22 vtv3 sshd\[3472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97  user=root
Nov 12 15:19:24 vtv3 sshd\[3472\]: Failed password for root from 178.128.52.97 port 45698 ssh2
Nov 12 15:30:52 vtv3 sshd\[9881\]: Invalid user klingheim from 178.128.52.97 port 43488
Nov 12 15:30:52 vtv3 sshd\[9881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97
Nov 12 15:30:54 vtv3 sshd\[9881\]: Failed password for invalid user klingheim from 178.128.52.97 port 43488 ssh2
Nov 12 15:34:41 vtv3 sshd\[11458\]: pam_unix\(sshd:auth\): authentication failure\; logname= ui
2019-11-13 00:35:43
42.233.190.98 attackspam
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-13 00:09:35
49.234.79.176 attack
Nov 12 15:40:11 lnxmail61 sshd[10815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.79.176
2019-11-13 00:29:51
61.125.131.96 attackspambots
firewall-block, port(s): 1433/tcp
2019-11-13 00:26:37
45.119.215.68 attackspam
Nov 12 12:42:28 firewall sshd[19002]: Invalid user root333 from 45.119.215.68
Nov 12 12:42:30 firewall sshd[19002]: Failed password for invalid user root333 from 45.119.215.68 port 49360 ssh2
Nov 12 12:46:27 firewall sshd[19095]: Invalid user vevle from 45.119.215.68
...
2019-11-13 00:46:49
5.196.70.107 attackbotsspam
Nov 12 17:38:48 SilenceServices sshd[1111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.70.107
Nov 12 17:38:50 SilenceServices sshd[1111]: Failed password for invalid user kletchko from 5.196.70.107 port 57522 ssh2
Nov 12 17:45:02 SilenceServices sshd[3084]: Failed password for root from 5.196.70.107 port 36558 ssh2
2019-11-13 00:51:14
60.23.160.137 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-13 00:31:25
40.83.171.103 attack
firewall-block, port(s): 3306/tcp
2019-11-13 00:39:51
115.55.59.54 attackbotsspam
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-13 00:23:27

最近上报的IP列表

223.158.29.23 2.141.230.207 27.33.239.10 4.158.150.152
53.41.179.44 109.132.190.175 127.35.250.105 166.237.210.169
230.45.18.149 219.190.87.129 143.225.112.110 47.152.73.140
148.43.124.41 175.15.242.240 23.106.34.252 149.243.208.68
213.23.204.196 44.35.169.83 176.56.73.131 231.198.106.161