必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nová Role

省份(region): Carlsbad Region (Karlovarsky kraj)

国家(country): Czechia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '94.138.122.0 - 94.138.122.255'

% Abuse contact for '94.138.122.0 - 94.138.122.255' is 'abuse@line.cz'

inetnum:        94.138.122.0 - 94.138.122.255
netname:        NORONET-CZ
descr:          GB-COMP v.o.s.
country:        CZ
org:            ORG-SNL68-RIPE
admin-c:        CPST1-RIPE
tech-c:         CPST1-RIPE
mnt-by:         COPROSYS-MNT
status:         ASSIGNED PA
created:        2010-04-23T13:34:09Z
last-modified:  2021-05-06T16:39:29Z
source:         RIPE

organisation:   ORG-SNL68-RIPE
org-name:       System NET Line
org-type:       OTHER
address:        Rokycanova 1929
address:        35601 Sokolov
abuse-c:        SNLS1-RIPE
mnt-ref:        MNT-GRAPESC
mnt-ref:        COPROSYS-MNT
mnt-by:         MNT-WOLFSTEIN
created:        2020-08-22T13:30:19Z
last-modified:  2021-03-29T13:37:19Z
source:         RIPE # Filtered

role:           CoProSys Tech-c
address:        CoProSys, a.s.
address:        NA KOPCI 239
address:        CHRUDIM IV
address:        537 05
address:        CZECH REPUBLIC
phone:          +420 469 775 775
fax-no:         +420 255 701 343
abuse-mailbox:  abuse@coprosys.cz
admin-c:        VJ238-RIPE
tech-c:         AK12925-RIPE
nic-hdl:        CPST1-RIPE
mnt-by:         COPROSYS-MNT
created:        2006-08-09T15:47:32Z
last-modified:  2020-04-29T16:06:08Z
source:         RIPE # Filtered

% Information related to '94.138.120.0/22AS201476'

route:          94.138.120.0/22
origin:         AS201476
mnt-by:         COPROSYS-MNT
created:        2017-03-02T10:15:31Z
last-modified:  2017-03-02T10:15:31Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.138.122.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.138.122.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 09:12:43 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
148.122.138.94.in-addr.arpa domain name pointer 94-138-122-148.static.wolfnet.cz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.122.138.94.in-addr.arpa	name = 94-138-122-148.static.wolfnet.cz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.245.126.227 attackbots
Microsoft SQL Server User Authentication Brute Force Attempt , PTR: ipv4.at.netrouting.net.
2020-07-07 22:05:32
185.153.199.51 attackspam
DATE:2020-07-07 15:27:28, IP:185.153.199.51, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-07-07 22:08:58
123.16.83.210 attackbots
Unauthorized connection attempt from IP address 123.16.83.210 on Port 445(SMB)
2020-07-07 22:26:40
2.180.109.245 attackbots
Unauthorized connection attempt from IP address 2.180.109.245 on Port 445(SMB)
2020-07-07 21:51:07
138.121.120.91 attack
Jul  7 14:13:32 piServer sshd[2206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.120.91 
Jul  7 14:13:35 piServer sshd[2206]: Failed password for invalid user sahil from 138.121.120.91 port 36802 ssh2
Jul  7 14:17:17 piServer sshd[2513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.120.91 
...
2020-07-07 21:49:35
196.221.145.8 attackspambots
Port probing on unauthorized port 1433
2020-07-07 22:17:53
141.105.137.53 attack
Unauthorized connection attempt from IP address 141.105.137.53 on Port 445(SMB)
2020-07-07 22:06:27
47.206.62.218 attackspambots
Unauthorized connection attempt from IP address 47.206.62.218 on Port 445(SMB)
2020-07-07 21:46:55
141.98.81.150 attackspambots
SSH login attempts.
2020-07-07 21:58:26
200.170.213.74 attackbotsspam
Jul  7 15:22:48 electroncash sshd[3584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.213.74 
Jul  7 15:22:48 electroncash sshd[3584]: Invalid user bonaka from 200.170.213.74 port 44646
Jul  7 15:22:51 electroncash sshd[3584]: Failed password for invalid user bonaka from 200.170.213.74 port 44646 ssh2
Jul  7 15:26:05 electroncash sshd[4446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.213.74  user=root
Jul  7 15:26:07 electroncash sshd[4446]: Failed password for root from 200.170.213.74 port 34362 ssh2
...
2020-07-07 21:53:32
173.236.168.101 attackspambots
173.236.168.101 - - [07/Jul/2020:13:01:36 +0100] "POST /wp-login.php HTTP/1.1" 200 1792 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
173.236.168.101 - - [07/Jul/2020:13:01:37 +0100] "POST /wp-login.php HTTP/1.1" 200 1768 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
173.236.168.101 - - [07/Jul/2020:13:01:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1772 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-07 22:02:29
13.72.249.53 attack
RDP Brute-Force (honeypot 1)
2020-07-07 21:59:51
34.73.136.216 attackspam
2020-07-07T18:24:08.157599hostname sshd[7175]: Failed password for invalid user utente from 34.73.136.216 port 48666 ssh2
...
2020-07-07 22:19:13
191.232.208.131 attackbotsspam
Jul  7 15:50:05 abendstille sshd\[32327\]: Invalid user om from 191.232.208.131
Jul  7 15:50:05 abendstille sshd\[32327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.208.131
Jul  7 15:50:08 abendstille sshd\[32327\]: Failed password for invalid user om from 191.232.208.131 port 59660 ssh2
Jul  7 15:53:57 abendstille sshd\[3772\]: Invalid user dc from 191.232.208.131
Jul  7 15:53:57 abendstille sshd\[3772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.208.131
...
2020-07-07 21:54:17
121.46.26.126 attackspambots
Jul  7 15:36:30 buvik sshd[27953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.26.126
Jul  7 15:36:32 buvik sshd[27953]: Failed password for invalid user vikas from 121.46.26.126 port 34834 ssh2
Jul  7 15:38:43 buvik sshd[28184]: Invalid user team from 121.46.26.126
...
2020-07-07 22:28:03

最近上报的IP列表

2606:4700:10::6814:5658 122.193.247.76 2606:4700:10::ac43:2136 2606:4700:10::6814:5661
2606:4700:10::ac43:1905 2606:4700:10::ac43:674 2606:4700:10::6814:8652 34.22.140.176
209.99.185.225 2606:4700:10::ac43:783 2606:4700:10::6816:2429 2606:4700:10::6816:1770
2606:4700:10::ac43:819 2606:4700:10::6814:6594 66.132.195.31 66.132.195.78
110.77.248.147 134.35.157.151 122.193.247.88 2606:4700:10::6814:6879