必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
69.162.107.106 attackspambots
Port scan on 6 port(s): 1016 2089 3003 3018 3019 6666
2020-01-28 00:10:58
69.162.107.34 attackspam
SQL Injection
2019-08-14 01:06:54
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.162.107.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.162.107.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 00:03:42 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
138.107.162.69.in-addr.arpa domain name pointer 138-107-162-69.static.reverse.lstn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.107.162.69.in-addr.arpa	name = 138-107-162-69.static.reverse.lstn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.83.42 attackspambots
Aug  2 06:05:30 scw-6657dc sshd[15310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42  user=root
Aug  2 06:05:30 scw-6657dc sshd[15310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42  user=root
Aug  2 06:05:31 scw-6657dc sshd[15310]: Failed password for root from 114.67.83.42 port 45262 ssh2
...
2020-08-02 14:38:43
106.13.52.234 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-02 15:00:27
189.192.100.139 attack
Aug  2 08:11:22 ns381471 sshd[22128]: Failed password for root from 189.192.100.139 port 48891 ssh2
2020-08-02 15:04:42
218.78.46.81 attackspambots
Aug  2 06:22:47 *** sshd[32650]: User root from 218.78.46.81 not allowed because not listed in AllowUsers
2020-08-02 15:09:30
117.2.64.45 attackspam
1596340316 - 08/02/2020 05:51:56 Host: 117.2.64.45/117.2.64.45 Port: 445 TCP Blocked
2020-08-02 15:16:45
62.244.196.50 attackbotsspam
Port probing on unauthorized port 12022
2020-08-02 14:42:59
27.115.51.162 attackspambots
Aug  2 06:54:32 minden010 sshd[29973]: Failed password for root from 27.115.51.162 port 48262 ssh2
Aug  2 06:59:04 minden010 sshd[31665]: Failed password for root from 27.115.51.162 port 17369 ssh2
...
2020-08-02 14:49:58
220.135.68.135 attack
Unauthorised access (Aug  2) SRC=220.135.68.135 LEN=40 TTL=46 ID=33551 TCP DPT=23 WINDOW=57205 SYN
2020-08-02 15:06:16
61.146.72.252 attack
Aug  2 08:01:32 santamaria sshd\[19171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.72.252  user=root
Aug  2 08:01:34 santamaria sshd\[19171\]: Failed password for root from 61.146.72.252 port 57601 ssh2
Aug  2 08:07:14 santamaria sshd\[19255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.72.252  user=root
...
2020-08-02 15:09:51
58.56.66.199 attack
Icarus honeypot on github
2020-08-02 15:11:17
24.115.163.217 attack
web site flood attack
2020-08-02 15:02:54
23.129.64.210 attackspambots
SSH brute-force attempt
2020-08-02 15:13:50
192.99.212.132 attack
Aug  2 06:50:35 *** sshd[5920]: User root from 192.99.212.132 not allowed because not listed in AllowUsers
2020-08-02 14:51:34
192.35.168.216 attackspam
192.35.168.216 - - [01/Aug/2020:22:52:28 -0500] "GET https://www.ad5gb.com/ HTTP/1.1" 400 346 400 346 0 0 62 416 243 295 0 DIRECT FIN FIN TCP_MISS
2020-08-02 14:52:37
120.53.22.204 attackbotsspam
Aug  2 09:01:19 lukav-desktop sshd\[12619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204  user=root
Aug  2 09:01:21 lukav-desktop sshd\[12619\]: Failed password for root from 120.53.22.204 port 40424 ssh2
Aug  2 09:04:44 lukav-desktop sshd\[12671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204  user=root
Aug  2 09:04:46 lukav-desktop sshd\[12671\]: Failed password for root from 120.53.22.204 port 47672 ssh2
Aug  2 09:08:06 lukav-desktop sshd\[6413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204  user=root
2020-08-02 15:12:41

最近上报的IP列表

35.105.178.15 91.24.46.38 247.226.195.215 185.219.204.236
54.226.63.5 146.158.196.110 109.143.176.208 127.161.160.95
222.1.67.118 116.39.231.183 70.187.162.56 202.210.125.197
75.120.3.199 49.218.201.166 91.105.63.241 64.208.36.174
184.229.76.152 172.215.29.225 35.243.96.197 247.87.53.84