必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Greenville

省份(region): South Carolina

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.128.245.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.128.245.139.		IN	A

;; AUTHORITY SECTION:
.			514	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020601 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:24:53 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
139.245.128.107.in-addr.arpa domain name pointer 107-128-245-139.lightspeed.gnvlsc.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.245.128.107.in-addr.arpa	name = 107-128-245-139.lightspeed.gnvlsc.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.109.132.200 attack
$f2bV_matches
2019-11-26 03:09:25
61.177.172.128 attack
Nov 25 20:33:51 vpn01 sshd[15733]: Failed password for root from 61.177.172.128 port 18966 ssh2
Nov 25 20:34:04 vpn01 sshd[15733]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 18966 ssh2 [preauth]
...
2019-11-26 03:42:59
119.29.104.238 attackspam
Nov 25 23:26:10 areeb-Workstation sshd[21315]: Failed password for root from 119.29.104.238 port 46966 ssh2
...
2019-11-26 03:50:16
129.211.130.37 attackspam
Nov 25 19:55:21 vmanager6029 sshd\[28072\]: Invalid user basil from 129.211.130.37 port 47622
Nov 25 19:55:21 vmanager6029 sshd\[28072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37
Nov 25 19:55:24 vmanager6029 sshd\[28072\]: Failed password for invalid user basil from 129.211.130.37 port 47622 ssh2
2019-11-26 03:31:37
46.38.144.57 attackspambots
Nov 25 20:04:21 vmanager6029 postfix/smtpd\[28229\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 25 20:05:09 vmanager6029 postfix/smtpd\[28229\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-26 03:11:28
47.102.99.76 attack
25.11.2019 14:41:07 HTTP access blocked by firewall
2019-11-26 03:28:06
132.145.34.57 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-26 03:34:58
46.107.86.134 attack
Automatic report - Port Scan Attack
2019-11-26 03:40:46
67.205.1.151 attackbots
BadRequests
2019-11-26 03:45:57
180.76.175.156 attack
Nov 25 04:58:50 liveconfig01 sshd[9571]: Invalid user bind from 180.76.175.156
Nov 25 04:58:50 liveconfig01 sshd[9571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.175.156
Nov 25 04:58:53 liveconfig01 sshd[9571]: Failed password for invalid user bind from 180.76.175.156 port 42246 ssh2
Nov 25 04:58:53 liveconfig01 sshd[9571]: Received disconnect from 180.76.175.156 port 42246:11: Bye Bye [preauth]
Nov 25 04:58:53 liveconfig01 sshd[9571]: Disconnected from 180.76.175.156 port 42246 [preauth]
Nov 25 05:11:51 liveconfig01 sshd[9974]: Invalid user estridge from 180.76.175.156
Nov 25 05:11:51 liveconfig01 sshd[9974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.175.156
Nov 25 05:11:53 liveconfig01 sshd[9974]: Failed password for invalid user estridge from 180.76.175.156 port 51930 ssh2
Nov 25 05:11:53 liveconfig01 sshd[9974]: Received disconnect from 180.76.175.156 port 51930........
-------------------------------
2019-11-26 03:38:16
128.199.52.45 attackbotsspam
Nov 25 19:05:18 localhost sshd\[30752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=mail
Nov 25 19:05:20 localhost sshd\[30752\]: Failed password for mail from 128.199.52.45 port 38544 ssh2
Nov 25 19:11:04 localhost sshd\[31399\]: Invalid user test from 128.199.52.45 port 45636
Nov 25 19:11:04 localhost sshd\[31399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45
2019-11-26 03:39:50
222.186.175.183 attackspam
Nov 25 20:07:13 vmanager6029 sshd\[28284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Nov 25 20:07:15 vmanager6029 sshd\[28284\]: Failed password for root from 222.186.175.183 port 57494 ssh2
Nov 25 20:07:18 vmanager6029 sshd\[28284\]: Failed password for root from 222.186.175.183 port 57494 ssh2
2019-11-26 03:12:01
61.224.133.210 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-26 03:15:14
190.177.165.19 attackbotsspam
Unauthorised access (Nov 25) SRC=190.177.165.19 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=13925 TCP DPT=23 WINDOW=19310 SYN
2019-11-26 03:31:13
122.224.175.218 attackspam
Nov 25 18:40:37 vmanager6029 sshd\[26566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.175.218  user=sync
Nov 25 18:40:39 vmanager6029 sshd\[26566\]: Failed password for sync from 122.224.175.218 port 1549 ssh2
Nov 25 18:44:50 vmanager6029 sshd\[26646\]: Invalid user frenzy from 122.224.175.218 port 13426
2019-11-26 03:26:45

最近上报的IP列表

81.53.194.151 219.63.245.22 115.222.57.96 91.172.237.245
188.115.148.218 71.255.87.63 143.88.145.18 102.175.44.54
86.195.77.226 123.17.245.164 85.172.192.68 178.134.88.210
138.204.70.239 76.168.203.182 211.217.195.80 111.11.208.190
52.140.113.190 177.124.153.236 44.219.147.245 176.194.24.151