必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Dortmund

省份(region): Nordrhein-Westfalen

国家(country): Germany

运营商(isp): Telekom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.138.128.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;84.138.128.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:15:33 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
142.128.138.84.in-addr.arpa domain name pointer p548a808e.dip0.t-ipconnect.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.128.138.84.in-addr.arpa	name = p548a808e.dip0.t-ipconnect.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.23.14 attackbots
May 30 06:23:32 ns382633 sshd\[25239\]: Invalid user dept from 139.59.23.14 port 46570
May 30 06:23:32 ns382633 sshd\[25239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.14
May 30 06:23:34 ns382633 sshd\[25239\]: Failed password for invalid user dept from 139.59.23.14 port 46570 ssh2
May 30 06:38:23 ns382633 sshd\[28766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.14  user=root
May 30 06:38:25 ns382633 sshd\[28766\]: Failed password for root from 139.59.23.14 port 53998 ssh2
2020-05-30 17:41:06
68.236.122.177 attackbots
May 30 06:25:23 ns382633 sshd\[25981\]: Invalid user yang from 68.236.122.177 port 54328
May 30 06:25:23 ns382633 sshd\[25981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.236.122.177
May 30 06:25:25 ns382633 sshd\[25981\]: Failed password for invalid user yang from 68.236.122.177 port 54328 ssh2
May 30 06:30:49 ns382633 sshd\[27682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.236.122.177  user=root
May 30 06:30:51 ns382633 sshd\[27682\]: Failed password for root from 68.236.122.177 port 36888 ssh2
2020-05-30 17:11:48
129.204.249.36 attackbotsspam
"fail2ban match"
2020-05-30 17:07:14
174.129.191.18 attackspam
May 27 23:39:08 *** sshd[8343]: refused connect from 174.129.191.18 (17=
4.129.191.18)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=174.129.191.18
2020-05-30 17:39:57
142.93.60.53 attackspambots
odoo8
...
2020-05-30 17:40:52
185.234.219.81 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-30 17:09:21
162.158.106.184 attackspam
Apache - FakeGoogleBot
2020-05-30 17:25:47
106.12.14.183 attackbotsspam
May 30 11:34:33 minden010 sshd[9696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.183
May 30 11:34:35 minden010 sshd[9696]: Failed password for invalid user travis from 106.12.14.183 port 59054 ssh2
May 30 11:39:07 minden010 sshd[12216]: Failed password for root from 106.12.14.183 port 44290 ssh2
...
2020-05-30 17:43:39
162.158.107.207 attack
Apache - FakeGoogleBot
2020-05-30 17:26:53
14.251.146.254 attackbotsspam
1590810465 - 05/30/2020 05:47:45 Host: 14.251.146.254/14.251.146.254 Port: 445 TCP Blocked
2020-05-30 17:25:33
162.158.107.233 attackspambots
Apache - FakeGoogleBot
2020-05-30 17:24:33
111.160.46.10 attackbotsspam
"fail2ban match"
2020-05-30 17:15:49
178.47.132.182 attack
$f2bV_matches
2020-05-30 17:16:46
108.162.245.26 attackspam
Apache - FakeGoogleBot
2020-05-30 17:19:15
2.226.205.174 attackspam
DATE:2020-05-30 05:48:16, IP:2.226.205.174, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-30 17:02:42

最近上报的IP列表

189.198.170.76 221.111.23.19 66.116.147.216 129.138.231.184
63.113.160.39 200.14.207.253 21.95.70.116 185.149.150.4
77.13.97.43 187.215.209.223 96.250.29.64 174.183.89.120
80.128.208.61 89.167.198.100 85.131.171.192 192.243.163.122
109.240.89.129 188.209.1.39 29.234.143.44 200.67.154.146