必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
1.0.139.183 attackbots
Unauthorized connection attempt detected from IP address 1.0.139.183 to port 80 [J]
2020-01-27 15:25:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.0.139.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.0.139.36.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 06:57:22 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
36.139.0.1.in-addr.arpa domain name pointer node-278.pool-1-0.dynamic.totinternet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
36.139.0.1.in-addr.arpa	name = node-278.pool-1-0.dynamic.totinternet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
173.245.239.219 attack
failed_logins
2019-10-24 19:30:25
185.24.99.233 attackspambots
Automatic report - XMLRPC Attack
2019-10-24 19:37:46
220.121.58.55 attack
$f2bV_matches
2019-10-24 19:20:52
69.249.19.217 attackspambots
Honeypot attack, port: 23, PTR: c-69-249-19-217.hsd1.pa.comcast.net.
2019-10-24 19:25:26
2.89.159.99 attackspambots
445/tcp
[2019-10-24]1pkt
2019-10-24 19:29:59
185.209.0.91 attack
10/24/2019-12:37:24.312271 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-24 19:24:09
106.12.56.143 attackspambots
Oct 24 12:48:04 vmanager6029 sshd\[31403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143  user=root
Oct 24 12:48:06 vmanager6029 sshd\[31403\]: Failed password for root from 106.12.56.143 port 37824 ssh2
Oct 24 12:52:10 vmanager6029 sshd\[31477\]: Invalid user vd from 106.12.56.143 port 45708
2019-10-24 19:32:19
87.154.251.205 attack
Oct 24 09:40:35 mail postfix/smtpd[22953]: warning: p579AFBCD.dip0.t-ipconnect.de[87.154.251.205]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 24 09:42:18 mail postfix/smtpd[24558]: warning: p579AFBCD.dip0.t-ipconnect.de[87.154.251.205]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 24 09:48:13 mail postfix/smtpd[29008]: warning: p579AFBCD.dip0.t-ipconnect.de[87.154.251.205]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-24 19:18:10
110.232.84.40 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-24 19:29:44
211.195.12.33 attack
Oct 24 10:11:26 localhost sshd\[125741\]: Invalid user steam from 211.195.12.33 port 53936
Oct 24 10:11:26 localhost sshd\[125741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
Oct 24 10:11:28 localhost sshd\[125741\]: Failed password for invalid user steam from 211.195.12.33 port 53936 ssh2
Oct 24 10:16:17 localhost sshd\[125891\]: Invalid user user8 from 211.195.12.33 port 45413
Oct 24 10:16:17 localhost sshd\[125891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
...
2019-10-24 19:03:06
207.46.13.129 attackspambots
Automatic report - Banned IP Access
2019-10-24 19:33:08
190.145.25.166 attack
Oct 22 23:05:21 serwer sshd\[13669\]: Invalid user gretchen from 190.145.25.166 port 59776
Oct 22 23:05:21 serwer sshd\[13669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.166
Oct 22 23:05:23 serwer sshd\[13669\]: Failed password for invalid user gretchen from 190.145.25.166 port 59776 ssh2
...
2019-10-24 19:34:53
201.22.59.94 attackspam
Oct 24 10:57:28 www_kotimaassa_fi sshd[15475]: Failed password for root from 201.22.59.94 port 57116 ssh2
Oct 24 11:02:06 www_kotimaassa_fi sshd[15479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.59.94
...
2019-10-24 19:04:35
37.59.107.100 attackspambots
Oct 23 19:43:53 sachi sshd\[18887\]: Invalid user service from 37.59.107.100
Oct 23 19:43:53 sachi sshd\[18887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.ip-37-59-107.eu
Oct 23 19:43:56 sachi sshd\[18887\]: Failed password for invalid user service from 37.59.107.100 port 35508 ssh2
Oct 23 19:47:44 sachi sshd\[19196\]: Invalid user abbey from 37.59.107.100
Oct 23 19:47:44 sachi sshd\[19196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.ip-37-59-107.eu
2019-10-24 19:02:15
185.220.101.69 attackbotsspam
Oct 24 09:56:33 thevastnessof sshd[14357]: Failed password for root from 185.220.101.69 port 41548 ssh2
...
2019-10-24 19:38:42

最近上报的IP列表

1.0.139.34 1.0.139.4 1.0.139.42 1.0.139.45
1.0.139.49 1.0.139.51 1.0.139.54 1.0.139.58
1.0.139.60 1.0.139.63 1.0.139.64 1.0.139.68
1.0.139.72 1.0.139.75 1.0.139.79 1.0.139.81
1.0.139.82 166.98.231.137 1.0.139.84 1.0.139.87