必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.162.149.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.162.149.139.		IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 137 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:20:56 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.149.162.107.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 107.162.149.139.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.253.177.150 attackspambots
Jul 25 08:30:33 zooi sshd[1744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
Jul 25 08:30:36 zooi sshd[1744]: Failed password for invalid user upload from 106.253.177.150 port 59174 ssh2
...
2020-07-25 19:18:22
192.35.169.35 attackbots
Port scan: Attack repeated for 24 hours
2020-07-25 19:29:03
45.144.65.49 attackbotsspam
Jul 25 10:52:47 game-panel sshd[26685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.65.49
Jul 25 10:52:49 game-panel sshd[26685]: Failed password for invalid user uli from 45.144.65.49 port 50033 ssh2
Jul 25 10:54:49 game-panel sshd[26757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.65.49
2020-07-25 19:03:03
46.161.14.13 attackbots
Port Scan
...
2020-07-25 18:56:25
46.101.200.68 attackspam
Invalid user wangmeng from 46.101.200.68 port 49656
2020-07-25 19:26:30
132.145.223.21 attackbotsspam
Jul 25 10:54:06 vmd26974 sshd[24779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.223.21
Jul 25 10:54:08 vmd26974 sshd[24779]: Failed password for invalid user akhan from 132.145.223.21 port 41612 ssh2
...
2020-07-25 18:54:34
112.134.176.37 attackbots
Wordpress attack
2020-07-25 19:16:48
200.146.215.26 attack
Invalid user amanda from 200.146.215.26 port 8184
2020-07-25 18:58:38
94.180.58.238 attackbotsspam
Invalid user ftpuser from 94.180.58.238 port 52182
2020-07-25 19:25:52
170.106.33.94 attackspam
Jul 25 10:52:49 django-0 sshd[21977]: Invalid user anthony from 170.106.33.94
...
2020-07-25 19:01:32
178.217.173.54 attack
Invalid user stack from 178.217.173.54 port 53696
2020-07-25 19:27:15
220.250.25.36 attackbots
Invalid user tej from 220.250.25.36 port 50988
2020-07-25 19:26:51
167.71.162.16 attackbots
Jul 25 11:47:41 ajax sshd[9033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.162.16 
Jul 25 11:47:43 ajax sshd[9033]: Failed password for invalid user ftpuser from 167.71.162.16 port 58070 ssh2
2020-07-25 19:07:14
176.31.182.79 attackbots
Invalid user student2 from 176.31.182.79 port 35262
2020-07-25 19:15:14
49.233.145.188 attackspambots
Invalid user inna from 49.233.145.188 port 38190
2020-07-25 19:09:17

最近上报的IP列表

107.162.148.143 107.162.153.19 107.162.153.204 107.162.154.231
107.162.154.146 107.162.154.85 107.162.154.96 107.162.155.34
107.162.155.40 107.162.158.191 107.162.156.240 107.162.159.74
107.162.157.139 107.162.157.79 107.162.157.20 107.162.160.8
107.162.161.10 107.162.162.40 107.162.161.135 107.162.165.249