必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Humble

省份(region): Texas

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.202.139.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.202.139.119.		IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052901 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 30 07:12:09 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
119.139.202.107.in-addr.arpa domain name pointer 107-202-139-119.lightspeed.hstntx.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.139.202.107.in-addr.arpa	name = 107-202-139-119.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.169.137 attackspambots
Oct 21 06:39:04 server sshd\[29063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137  user=root
Oct 21 06:39:06 server sshd\[29063\]: Failed password for root from 159.89.169.137 port 53248 ssh2
Oct 21 06:46:57 server sshd\[495\]: Invalid user forevermd from 159.89.169.137
Oct 21 06:46:57 server sshd\[495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137 
Oct 21 06:46:59 server sshd\[495\]: Failed password for invalid user forevermd from 159.89.169.137 port 54560 ssh2
...
2019-10-21 17:12:20
159.89.155.148 attackbots
Invalid user M from 159.89.155.148 port 38624
2019-10-21 17:05:16
82.76.44.175 attack
port scan and connect, tcp 119 (nntp)
2019-10-21 17:14:17
202.65.154.162 attackspam
Oct 21 05:51:48 vtv3 sshd\[11969\]: Invalid user admin from 202.65.154.162 port 17804
Oct 21 05:51:48 vtv3 sshd\[11969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.154.162
Oct 21 05:51:50 vtv3 sshd\[11969\]: Failed password for invalid user admin from 202.65.154.162 port 17804 ssh2
Oct 21 05:56:02 vtv3 sshd\[14154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.154.162  user=root
Oct 21 05:56:03 vtv3 sshd\[14154\]: Failed password for root from 202.65.154.162 port 35482 ssh2
Oct 21 06:43:24 vtv3 sshd\[5243\]: Invalid user server from 202.65.154.162 port 37269
Oct 21 06:43:24 vtv3 sshd\[5243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.154.162
Oct 21 06:43:26 vtv3 sshd\[5243\]: Failed password for invalid user server from 202.65.154.162 port 37269 ssh2
Oct 21 06:48:04 vtv3 sshd\[7487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0
2019-10-21 16:47:45
222.124.150.157 attackspam
Automatic report - XMLRPC Attack
2019-10-21 16:51:44
111.9.116.190 attack
Oct 21 05:47:06 xeon sshd[62540]: Failed password for invalid user taivi from 111.9.116.190 port 38724 ssh2
2019-10-21 16:50:30
123.125.71.103 attackbotsspam
Automatic report - Banned IP Access
2019-10-21 16:44:42
124.133.52.153 attackbots
Oct 21 06:31:35 server sshd\[27310\]: Invalid user new from 124.133.52.153
Oct 21 06:31:35 server sshd\[27310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.133.52.153 
Oct 21 06:31:38 server sshd\[27310\]: Failed password for invalid user new from 124.133.52.153 port 39917 ssh2
Oct 21 06:47:33 server sshd\[618\]: Invalid user tzhang from 124.133.52.153
Oct 21 06:47:33 server sshd\[618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.133.52.153 
...
2019-10-21 17:00:05
46.182.106.190 attack
Oct 21 08:25:15 rotator sshd\[3236\]: Failed password for root from 46.182.106.190 port 45813 ssh2Oct 21 08:25:18 rotator sshd\[3236\]: Failed password for root from 46.182.106.190 port 45813 ssh2Oct 21 08:25:20 rotator sshd\[3236\]: Failed password for root from 46.182.106.190 port 45813 ssh2Oct 21 08:25:23 rotator sshd\[3236\]: Failed password for root from 46.182.106.190 port 45813 ssh2Oct 21 08:25:25 rotator sshd\[3236\]: Failed password for root from 46.182.106.190 port 45813 ssh2Oct 21 08:25:27 rotator sshd\[3236\]: Failed password for root from 46.182.106.190 port 45813 ssh2
...
2019-10-21 16:57:03
109.102.226.187 attack
109.102.226.187 - - [21/Oct/2019:03:26:43 +0200] "GET /main/wissen/broschueren/arbehostnamenehmerueberlassung.html?no_cache=1 HTTP/1.1" 301 371 "-" "Mozilla/5.0 (compatible& Googlebot/2.1& +hxxp://www.google.com/bot.html)"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.102.226.187
2019-10-21 17:08:30
60.218.47.19 attackbots
Unauthorised access (Oct 21) SRC=60.218.47.19 LEN=40 TTL=49 ID=16422 TCP DPT=8080 WINDOW=53959 SYN 
Unauthorised access (Oct 19) SRC=60.218.47.19 LEN=40 TTL=49 ID=46904 TCP DPT=8080 WINDOW=53959 SYN
2019-10-21 17:05:32
85.229.175.123 attack
Oct 21 01:50:11 www sshd[4294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.229.175.123  user=r.r
Oct 21 01:50:13 www sshd[4294]: Failed password for r.r from 85.229.175.123 port 53441 ssh2
Oct 21 01:50:14 www sshd[4294]: Failed password for r.r from 85.229.175.123 port 53441 ssh2
Oct 21 01:50:17 www sshd[4294]: Failed password for r.r from 85.229.175.123 port 53441 ssh2
Oct 21 01:50:19 www sshd[4294]: Failed password for r.r from 85.229.175.123 port 53441 ssh2
Oct 21 01:50:21 www sshd[4294]: Failed password for r.r from 85.229.175.123 port 53441 ssh2
Oct 21 01:50:22 www sshd[4294]: Failed password for r.r from 85.229.175.123 port 53441 ssh2
Oct 21 01:50:22 www sshd[4294]: error: maximum authentication attempts exceeded for r.r from 85.229.175.123 port 53441 ssh2 [preauth]
Oct 21 01:50:22 www sshd[4294]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.229.175.123  user=r.r


........
----------------------------------------------
2019-10-21 17:15:13
218.92.0.173 attack
Oct 21 07:06:19 icinga sshd[47627]: Failed password for root from 218.92.0.173 port 53790 ssh2
Oct 21 07:06:24 icinga sshd[47627]: Failed password for root from 218.92.0.173 port 53790 ssh2
Oct 21 07:06:28 icinga sshd[47627]: Failed password for root from 218.92.0.173 port 53790 ssh2
Oct 21 07:06:32 icinga sshd[47627]: Failed password for root from 218.92.0.173 port 53790 ssh2
...
2019-10-21 16:41:19
112.197.174.157 attackbots
Oct 21 05:48:10 vmanager6029 sshd\[9763\]: Invalid user pi from 112.197.174.157 port 44704
Oct 21 05:48:10 vmanager6029 sshd\[9765\]: Invalid user pi from 112.197.174.157 port 44716
Oct 21 05:48:10 vmanager6029 sshd\[9763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.197.174.157
2019-10-21 16:46:32
119.29.121.229 attackbotsspam
Oct 21 03:28:00 TORMINT sshd\[4883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.121.229  user=root
Oct 21 03:28:03 TORMINT sshd\[4883\]: Failed password for root from 119.29.121.229 port 36202 ssh2
Oct 21 03:33:00 TORMINT sshd\[5091\]: Invalid user brad from 119.29.121.229
Oct 21 03:33:00 TORMINT sshd\[5091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.121.229
...
2019-10-21 17:04:44

最近上报的IP列表

216.64.31.100 76.210.154.59 114.72.96.143 199.116.111.232
238.27.139.47 220.142.128.10 201.5.227.205 65.95.58.134
243.10.50.222 166.203.52.188 142.68.126.0 97.36.78.24
180.62.245.16 3.221.43.149 110.28.120.193 14.161.46.73
182.119.6.122 190.250.104.140 13.244.63.150 84.67.57.39