必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bangladesh

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.54.39.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.54.39.139.			IN	A

;; AUTHORITY SECTION:
.			146	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 504 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:08:47 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
139.39.54.103.in-addr.arpa domain name pointer 103.54.39.139.race.net.bd.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.39.54.103.in-addr.arpa	name = 103.54.39.139.race.net.bd.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.201.92.91 attack
Nov 21 18:18:05 taivassalofi sshd[94420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.201.92.91
Nov 21 18:18:07 taivassalofi sshd[94420]: Failed password for invalid user bhalla from 106.201.92.91 port 45182 ssh2
...
2019-11-22 06:07:01
179.104.36.130 attackbots
Automatic report - Port Scan Attack
2019-11-22 05:50:50
117.121.97.115 attackbots
2019-11-21T21:43:44.841340  sshd[24885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.97.115  user=root
2019-11-21T21:43:46.903451  sshd[24885]: Failed password for root from 117.121.97.115 port 20350 ssh2
2019-11-21T21:49:13.910662  sshd[24981]: Invalid user tosi from 117.121.97.115 port 36586
2019-11-21T21:49:13.924379  sshd[24981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.97.115
2019-11-21T21:49:13.910662  sshd[24981]: Invalid user tosi from 117.121.97.115 port 36586
2019-11-21T21:49:16.152083  sshd[24981]: Failed password for invalid user tosi from 117.121.97.115 port 36586 ssh2
...
2019-11-22 05:45:15
181.28.208.64 attackspambots
2019-11-21T13:03:51.868165-07:00 suse-nuc sshd[8686]: Invalid user raaf from 181.28.208.64 port 8213
...
2019-11-22 05:54:24
112.17.166.159 attack
Automatic report - Port Scan Attack
2019-11-22 06:10:42
113.185.0.13 attack
B: Abusive content scan (301)
2019-11-22 06:04:26
220.130.10.13 attack
Nov 21 21:09:45 heissa sshd\[2735\]: Invalid user rx from 220.130.10.13 port 51798
Nov 21 21:09:45 heissa sshd\[2735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-10-13.hinet-ip.hinet.net
Nov 21 21:09:47 heissa sshd\[2735\]: Failed password for invalid user rx from 220.130.10.13 port 51798 ssh2
Nov 21 21:13:37 heissa sshd\[3420\]: Invalid user glivings from 220.130.10.13 port 59306
Nov 21 21:13:37 heissa sshd\[3420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-10-13.hinet-ip.hinet.net
2019-11-22 05:38:15
188.93.75.148 attackspambots
Please Block this user fast
2019-11-22 05:36:07
114.116.235.87 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:54:50
104.131.189.116 attackbots
Nov 21 22:26:46 sd-53420 sshd\[16312\]: User irc from 104.131.189.116 not allowed because none of user's groups are listed in AllowGroups
Nov 21 22:26:46 sd-53420 sshd\[16312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=irc
Nov 21 22:26:48 sd-53420 sshd\[16312\]: Failed password for invalid user irc from 104.131.189.116 port 60430 ssh2
Nov 21 22:30:18 sd-53420 sshd\[17404\]: Invalid user joomla from 104.131.189.116
Nov 21 22:30:18 sd-53420 sshd\[17404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116
...
2019-11-22 05:52:50
167.99.182.30 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-22 05:36:33
64.145.94.160 attackspambots
Automatic report - Banned IP Access
2019-11-22 05:37:56
51.77.148.248 attackspam
Nov 21 16:48:13 * sshd[23387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.148.248
Nov 21 16:48:15 * sshd[23387]: Failed password for invalid user password5555 from 51.77.148.248 port 48950 ssh2
2019-11-22 05:50:17
115.99.1.170 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-22 05:37:41
113.246.130.132 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:59:39

最近上报的IP列表

103.53.62.36 103.54.126.226 103.54.144.148 103.56.225.55
103.55.104.231 103.54.98.43 103.55.63.234 103.56.112.119
103.57.142.226 103.55.63.206 103.57.143.189 103.58.249.81
103.57.255.58 103.58.155.206 103.59.104.62 103.58.10.64
103.57.187.179 103.59.112.4 103.58.43.182 103.58.4.241