必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.126.114.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.126.114.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:59:36 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.114.126.109.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.114.126.109.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.84.8.43 attackspam
2020-05-11T17:01:02.161615mail.broermann.family sshd[15534]: Failed password for invalid user tidb from 119.84.8.43 port 45609 ssh2
2020-05-11T17:04:13.091097mail.broermann.family sshd[15686]: Invalid user ubuntu from 119.84.8.43 port 61861
2020-05-11T17:04:13.169927mail.broermann.family sshd[15686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.8.43
2020-05-11T17:04:13.091097mail.broermann.family sshd[15686]: Invalid user ubuntu from 119.84.8.43 port 61861
2020-05-11T17:04:14.662684mail.broermann.family sshd[15686]: Failed password for invalid user ubuntu from 119.84.8.43 port 61861 ssh2
...
2020-05-11 23:29:32
167.99.131.243 attackspambots
2020-05-11T16:50:15.4631551240 sshd\[26914\]: Invalid user pastor from 167.99.131.243 port 51200
2020-05-11T16:50:15.4664051240 sshd\[26914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.131.243
2020-05-11T16:50:16.9141921240 sshd\[26914\]: Failed password for invalid user pastor from 167.99.131.243 port 51200 ssh2
...
2020-05-11 23:22:11
189.212.112.124 attackbots
Automatic report - Port Scan Attack
2020-05-11 23:41:59
90.177.244.100 attack
1589198763 - 05/11/2020 19:06:03 Host: 100.244.broadband10.iol.cz/90.177.244.100 Port: 8080 TCP Blocked
...
2020-05-11 23:44:53
185.51.112.169 attackbotsspam
RDP Brute-Force (honeypot 14)
2020-05-11 23:42:35
139.59.93.93 attackbotsspam
SSH Brute Force
2020-05-11 23:18:56
118.24.140.69 attackbotsspam
May 11 17:23:09 home sshd[2252]: Failed password for root from 118.24.140.69 port 21872 ssh2
May 11 17:25:16 home sshd[2594]: Failed password for root from 118.24.140.69 port 44098 ssh2
May 11 17:27:31 home sshd[2941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69
...
2020-05-11 23:32:56
134.209.28.70 attackbots
May 11 19:47:07 itv-usvr-01 sshd[21430]: Invalid user art from 134.209.28.70
May 11 19:47:07 itv-usvr-01 sshd[21430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.28.70
May 11 19:47:07 itv-usvr-01 sshd[21430]: Invalid user art from 134.209.28.70
May 11 19:47:09 itv-usvr-01 sshd[21430]: Failed password for invalid user art from 134.209.28.70 port 54654 ssh2
May 11 19:51:49 itv-usvr-01 sshd[21656]: Invalid user majordomo from 134.209.28.70
2020-05-11 23:58:36
193.31.118.180 attackspambots
From: "Digital Doorbell" 
Date: Mon, 11 May 2020 07:01:20 -0500
Received: from crimeself.icu (unknown [193.31.118.180])
2020-05-11 23:35:21
202.47.116.107 attack
May 11 16:10:40 jane sshd[18599]: Failed password for root from 202.47.116.107 port 35144 ssh2
...
2020-05-11 23:56:38
193.112.143.141 attackspambots
2020-05-11T10:24:51.6772001495-001 sshd[26168]: Invalid user test from 193.112.143.141 port 46116
2020-05-11T10:24:51.6843181495-001 sshd[26168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141
2020-05-11T10:24:51.6772001495-001 sshd[26168]: Invalid user test from 193.112.143.141 port 46116
2020-05-11T10:24:53.5837161495-001 sshd[26168]: Failed password for invalid user test from 193.112.143.141 port 46116 ssh2
2020-05-11T10:28:41.0028471495-001 sshd[26332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141  user=root
2020-05-11T10:28:42.6714281495-001 sshd[26332]: Failed password for root from 193.112.143.141 port 60146 ssh2
...
2020-05-11 23:19:43
106.12.12.84 attackbotsspam
2020-05-11T16:44:01.220231ns386461 sshd\[32357\]: Invalid user fred from 106.12.12.84 port 45968
2020-05-11T16:44:01.224646ns386461 sshd\[32357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.84
2020-05-11T16:44:03.328513ns386461 sshd\[32357\]: Failed password for invalid user fred from 106.12.12.84 port 45968 ssh2
2020-05-11T17:01:12.814884ns386461 sshd\[15216\]: Invalid user tomcat from 106.12.12.84 port 57314
2020-05-11T17:01:12.819674ns386461 sshd\[15216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.84
...
2020-05-11 23:23:27
181.91.135.116 attackspam
Unauthorized connection attempt from IP address 181.91.135.116 on Port 445(SMB)
2020-05-11 23:44:00
94.23.212.137 attackspam
May 11 16:45:57 legacy sshd[27785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.212.137
May 11 16:45:58 legacy sshd[27785]: Failed password for invalid user mathew from 94.23.212.137 port 33114 ssh2
May 11 16:49:45 legacy sshd[27868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.212.137
...
2020-05-11 23:48:35
37.139.1.197 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-12 00:00:13

最近上报的IP列表

187.61.73.73 49.42.84.79 82.38.70.115 89.58.89.190
253.195.39.127 33.239.203.152 33.47.186.199 180.139.10.92
61.9.158.43 166.90.26.244 176.142.131.103 115.25.1.129
168.86.186.203 251.126.120.123 255.187.52.209 81.214.154.59
181.45.176.84 94.206.198.242 62.114.199.125 15.184.163.41