必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.139.99.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.139.99.226.			IN	A

;; AUTHORITY SECTION:
.			271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 11:44:21 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 226.99.139.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 226.99.139.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.65.103.143 attackbots
Unauthorized connection attempt from IP address 27.65.103.143 on Port 445(SMB)
2020-08-02 19:46:05
117.51.159.1 attackbots
Invalid user esjung from 117.51.159.1 port 39222
2020-08-02 19:09:40
147.50.12.20 attackspam
1596366608 - 08/02/2020 13:10:08 Host: 147.50.12.20/147.50.12.20 Port: 445 TCP Blocked
2020-08-02 19:26:25
183.160.203.4 attackbots
Attempted connection to port 1433.
2020-08-02 19:35:16
167.172.235.94 attack
SSH bruteforce
2020-08-02 19:24:35
113.161.166.44 attackbotsspam
Unauthorized connection attempt from IP address 113.161.166.44 on Port 445(SMB)
2020-08-02 19:31:28
193.32.161.147 attackbotsspam
08/02/2020-07:09:58.777573 193.32.161.147 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-08-02 19:10:47
84.38.187.194 attack
Port scan: Attack repeated for 24 hours
2020-08-02 19:14:33
165.227.203.162 attackspambots
Aug  2 09:45:08 srv-ubuntu-dev3 sshd[97230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.203.162  user=root
Aug  2 09:45:10 srv-ubuntu-dev3 sshd[97230]: Failed password for root from 165.227.203.162 port 35804 ssh2
Aug  2 09:47:09 srv-ubuntu-dev3 sshd[97499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.203.162  user=root
Aug  2 09:47:12 srv-ubuntu-dev3 sshd[97499]: Failed password for root from 165.227.203.162 port 38990 ssh2
Aug  2 09:49:05 srv-ubuntu-dev3 sshd[97703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.203.162  user=root
Aug  2 09:49:06 srv-ubuntu-dev3 sshd[97703]: Failed password for root from 165.227.203.162 port 42178 ssh2
Aug  2 09:51:00 srv-ubuntu-dev3 sshd[97912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.203.162  user=root
Aug  2 09:51:01 srv-ubuntu-dev3 sshd[97
...
2020-08-02 19:21:00
77.72.254.134 attack
1596347016 - 08/02/2020 07:43:36 Host: 77.72.254.134/77.72.254.134 Port: 445 TCP Blocked
2020-08-02 19:22:13
68.183.68.148 attackspambots
68.183.68.148 - - [02/Aug/2020:10:20:54 +0200] "POST /wp-login.php HTTP/1.1" 200 5417 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.68.148 - - [02/Aug/2020:10:20:55 +0200] "POST /wp-login.php HTTP/1.1" 200 5407 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.68.148 - - [02/Aug/2020:10:20:56 +0200] "POST /wp-login.php HTTP/1.1" 200 5410 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.68.148 - - [02/Aug/2020:10:22:16 +0200] "POST /wp-login.php HTTP/1.1" 200 5293 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.68.148 - - [02/Aug/2020:10:22:16 +0200] "POST /wp-login.php HTTP/1.1" 200 5293 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-02 19:10:09
182.254.178.192 attack
Invalid user tym from 182.254.178.192 port 60696
2020-08-02 19:16:35
185.220.102.4 attackspambots
Invalid user admin from 185.220.102.4 port 40607
2020-08-02 19:20:29
185.234.218.85 attackspambots
2020-08-01T22:33:05.026290linuxbox-skyline auth[29442]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=user rhost=185.234.218.85
...
2020-08-02 19:44:14
106.55.37.132 attackspam
(sshd) Failed SSH login from 106.55.37.132 (CN/China/-): 5 in the last 3600 secs
2020-08-02 19:41:17

最近上报的IP列表

1.139.218.165 1.14.104.146 1.14.122.251 1.14.130.8
228.195.42.2 1.14.135.98 1.14.139.125 1.14.147.48
1.14.157.129 1.14.16.67 1.14.164.205 1.14.165.178
1.14.17.239 189.37.86.110 1.14.19.227 1.14.194.51
1.14.195.32 1.14.228.126 1.14.49.1 153.249.129.85