必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Luohe

省份(region): Henan

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.197.44.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.197.44.139.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 03:15:15 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 139.44.197.1.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 1.197.44.139.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.248.195.184 attackspam
Automatic report - Port Scan Attack
2019-10-17 19:05:05
185.122.104.197 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.122.104.197/ 
 PL - 1H : (177)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN197697 
 
 IP : 185.122.104.197 
 
 CIDR : 185.122.104.0/22 
 
 PREFIX COUNT : 7 
 
 UNIQUE IP COUNT : 8192 
 
 
 WYKRYTE ATAKI Z ASN197697 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-17 05:44:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 19:39:42
80.82.77.245 attackspam
17.10.2019 11:21:30 Connection to port 1154 blocked by firewall
2019-10-17 19:28:39
41.202.170.120 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-17 19:11:54
211.152.47.90 attack
Oct 17 07:38:52 firewall sshd[29209]: Failed password for invalid user elly from 211.152.47.90 port 34862 ssh2
Oct 17 07:44:48 firewall sshd[29300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.152.47.90  user=root
Oct 17 07:44:50 firewall sshd[29300]: Failed password for root from 211.152.47.90 port 45580 ssh2
...
2019-10-17 19:33:19
106.13.97.16 attackbotsspam
Oct 17 05:21:36 apollo sshd\[28827\]: Invalid user xg from 106.13.97.16Oct 17 05:21:39 apollo sshd\[28827\]: Failed password for invalid user xg from 106.13.97.16 port 42068 ssh2Oct 17 05:46:00 apollo sshd\[28928\]: Failed password for root from 106.13.97.16 port 32890 ssh2
...
2019-10-17 19:07:00
190.223.26.38 attackbotsspam
Oct 17 12:10:11 icinga sshd[18217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38
Oct 17 12:10:13 icinga sshd[18217]: Failed password for invalid user ewq321#@! from 190.223.26.38 port 25799 ssh2
...
2019-10-17 19:11:24
49.232.57.79 attackbotsspam
Oct 17 12:01:19 MK-Soft-VM3 sshd[25347]: Failed password for root from 49.232.57.79 port 39686 ssh2
...
2019-10-17 19:03:21
108.188.199.237 attackbots
Invalid user pi from 108.188.199.237 port 58618
2019-10-17 19:38:54
91.121.2.33 attackspam
Oct 17 12:08:19 icinga sshd[17980]: Failed password for root from 91.121.2.33 port 56536 ssh2
...
2019-10-17 19:01:23
35.228.188.244 attackspambots
Oct 17 11:19:32 icinga sshd[13277]: Failed password for root from 35.228.188.244 port 52212 ssh2
...
2019-10-17 19:00:08
171.255.74.85 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:23.
2019-10-17 19:26:26
8.9.15.143 attack
Oct 17 07:41:52 localhost sshd\[14721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.9.15.143  user=root
Oct 17 07:41:54 localhost sshd\[14721\]: Failed password for root from 8.9.15.143 port 51104 ssh2
Oct 17 07:50:06 localhost sshd\[14869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.9.15.143  user=root
...
2019-10-17 19:18:32
86.123.125.203 attack
CloudCIX Reconnaissance Scan Detected, PTR: 86-123-125-203.rdsnet.ro.
2019-10-17 19:33:01
182.37.50.38 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:24.
2019-10-17 19:25:21

最近上报的IP列表

1.198.102.230 1.197.205.75 1.197.5.238 1.197.218.17
1.197.183.220 1.197.185.144 1.197.192.151 1.197.169.174
1.197.128.199 1.197.144.177 1.197.157.207 1.197.170.156
1.197.154.140 1.197.131.101 1.197.161.244 1.197.116.160
1.197.167.172 1.197.163.28 1.197.12.101 1.197.172.139