必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.2.138.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.2.138.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 06:56:26 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
104.138.2.86.in-addr.arpa domain name pointer cpc159265-nrth1-2-0-cust103.8-4.cable.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.138.2.86.in-addr.arpa	name = cpc159265-nrth1-2-0-cust103.8-4.cable.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.38.180.53 attack
Unauthorized connection attempt detected from IP address 54.38.180.53 to port 2220 [J]
2020-02-03 06:44:14
92.118.38.56 attackbots
2020-02-02T22:49:58.471616beta postfix/smtpd[30973]: warning: unknown[92.118.38.56]: SASL LOGIN authentication failed: authentication failure
2020-02-02T22:50:30.647560beta postfix/smtpd[30973]: warning: unknown[92.118.38.56]: SASL LOGIN authentication failed: authentication failure
2020-02-02T22:51:01.402144beta postfix/smtpd[30973]: warning: unknown[92.118.38.56]: SASL LOGIN authentication failed: authentication failure
...
2020-02-03 06:51:44
193.112.151.196 attackbotsspam
Mar 28 20:26:53 ms-srv sshd[21642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.151.196  user=root
Mar 28 20:26:56 ms-srv sshd[21642]: Failed password for invalid user root from 193.112.151.196 port 35593 ssh2
2020-02-03 06:18:53
118.80.16.191 attack
Unauthorised access (Feb  2) SRC=118.80.16.191 LEN=40 TTL=49 ID=35522 TCP DPT=8080 WINDOW=26383 SYN 
Unauthorised access (Feb  2) SRC=118.80.16.191 LEN=40 TTL=49 ID=62837 TCP DPT=8080 WINDOW=26383 SYN
2020-02-03 06:29:35
193.112.160.221 attackbots
Unauthorized connection attempt detected from IP address 193.112.160.221 to port 2220 [J]
2020-02-03 06:16:24
148.70.96.124 attack
Unauthorized connection attempt detected from IP address 148.70.96.124 to port 2220 [J]
2020-02-03 06:19:13
129.211.77.44 attackspam
Feb  2 17:08:49 MK-Soft-Root2 sshd[11280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.77.44 
Feb  2 17:08:51 MK-Soft-Root2 sshd[11280]: Failed password for invalid user 123456 from 129.211.77.44 port 45574 ssh2
...
2020-02-03 06:22:31
141.98.80.141 attackbots
(PA/Panama/-) SMTP Bruteforcing attempts
2020-02-03 06:53:01
51.254.206.149 attackspambots
2020-02-02T23:14:55.087118  sshd[30275]: Invalid user sole from 51.254.206.149 port 53938
2020-02-02T23:14:55.097341  sshd[30275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149
2020-02-02T23:14:55.087118  sshd[30275]: Invalid user sole from 51.254.206.149 port 53938
2020-02-02T23:14:56.942847  sshd[30275]: Failed password for invalid user sole from 51.254.206.149 port 53938 ssh2
2020-02-02T23:17:59.650235  sshd[30409]: Invalid user zbackup from 51.254.206.149 port 56240
...
2020-02-03 06:49:32
13.76.190.246 attackbotsspam
Unauthorized connection attempt detected from IP address 13.76.190.246 to port 2220 [J]
2020-02-03 06:45:59
193.112.129.199 attackspam
port
2020-02-03 06:23:32
192.99.245.135 attackspambots
Unauthorized connection attempt detected from IP address 192.99.245.135 to port 2220 [J]
2020-02-03 06:46:51
176.118.165.83 attack
" "
2020-02-03 06:26:52
192.99.70.208 attackbotsspam
Unauthorized connection attempt detected from IP address 192.99.70.208 to port 2220 [J]
2020-02-03 06:37:20
193.105.24.95 attack
Oct 31 02:49:06 ms-srv sshd[52470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.105.24.95
Oct 31 02:49:08 ms-srv sshd[52470]: Failed password for invalid user wm from 193.105.24.95 port 58483 ssh2
2020-02-03 06:36:59

最近上报的IP列表

39.56.181.68 208.227.220.201 128.41.14.164 207.68.194.159
89.13.199.67 113.52.136.186 252.205.124.102 9.18.62.135
80.148.45.170 206.113.238.227 156.245.151.70 37.72.234.178
48.186.193.209 167.159.48.163 18.32.44.169 69.186.204.8
126.244.31.211 67.116.216.211 9.238.248.73 4.203.78.206