必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Banjarmasin

省份(region): Kalimantan Selatan

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.139.141.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;110.139.141.139.		IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060700 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 07 15:56:06 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.141.139.110.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 139.141.139.110.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.114.156.170 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:44.
2019-11-11 20:58:41
175.100.177.26 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:35.
2019-11-11 21:12:27
36.72.174.14 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:43.
2019-11-11 21:00:44
1.34.134.61 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:24.
2019-11-11 21:33:16
113.187.35.157 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:29.
2019-11-11 21:24:23
1.52.237.237 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:24.
2019-11-11 21:32:58
202.187.43.125 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:41.
2019-11-11 21:03:51
117.50.13.170 attackbotsspam
2019-11-11T10:34:05.626892  sshd[2093]: Invalid user jiyuan from 117.50.13.170 port 43694
2019-11-11T10:34:05.639171  sshd[2093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.13.170
2019-11-11T10:34:05.626892  sshd[2093]: Invalid user jiyuan from 117.50.13.170 port 43694
2019-11-11T10:34:08.007555  sshd[2093]: Failed password for invalid user jiyuan from 117.50.13.170 port 43694 ssh2
2019-11-11T10:38:18.746546  sshd[2118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.13.170  user=root
2019-11-11T10:38:21.180354  sshd[2118]: Failed password for root from 117.50.13.170 port 50432 ssh2
...
2019-11-11 21:30:44
89.36.209.39 attack
WordPress wp-login brute force :: 89.36.209.39 0.156 BYPASS [11/Nov/2019:08:23:50  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-11 20:51:07
14.241.51.65 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:34.
2019-11-11 21:14:33
124.41.211.27 attack
2019-11-11T11:52:09.930300Z 1f0c1dd84fda New connection: 124.41.211.27:41916 (172.17.0.3:2222) [session: 1f0c1dd84fda]
2019-11-11T12:04:22.771594Z 5e3d559501a5 New connection: 124.41.211.27:41416 (172.17.0.3:2222) [session: 5e3d559501a5]
2019-11-11 21:32:07
60.184.3.24 attackbotsspam
Nov 11 07:15:07 vps666546 sshd\[2229\]: Invalid user guest from 60.184.3.24 port 43710
Nov 11 07:15:07 vps666546 sshd\[2229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.184.3.24
Nov 11 07:15:09 vps666546 sshd\[2229\]: Failed password for invalid user guest from 60.184.3.24 port 43710 ssh2
Nov 11 07:20:27 vps666546 sshd\[2381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.184.3.24  user=uucp
Nov 11 07:20:29 vps666546 sshd\[2381\]: Failed password for uucp from 60.184.3.24 port 55150 ssh2
...
2019-11-11 21:22:51
177.220.177.129 attackspam
Invalid user abdel from 177.220.177.129 port 21822
2019-11-11 21:26:00
125.161.77.168 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:31.
2019-11-11 21:20:43
95.90.142.55 attackspam
Nov 11 12:32:17 XXX sshd[52474]: Invalid user ofsaa from 95.90.142.55 port 52342
2019-11-11 20:52:28

最近上报的IP列表

118.207.35.179 88.186.105.233 151.24.96.10 122.99.116.8
195.50.109.131 251.4.254.7 90.45.4.8 198.55.215.128
24.182.111.174 205.73.24.132 240.52.132.212 40.38.191.131
113.250.177.62 192.135.68.180 55.88.32.171 89.120.49.139
142.189.37.71 171.145.97.114 117.50.198.70 142.146.63.158