必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Yaizu

省份(region): Shizuoka

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.139.164.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8233
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.139.164.252.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 06 13:14:18 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
252.164.139.112.in-addr.arpa domain name pointer p252.net112139164.tokai.or.jp.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
252.164.139.112.in-addr.arpa	name = p252.net112139164.tokai.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.165.244.73 attackspambots
Unauthorized connection attempt detected from IP address 188.165.244.73 to port 1433 [J]
2020-01-25 18:04:09
122.191.100.14 attack
Unauthorized connection attempt detected from IP address 122.191.100.14 to port 1433 [J]
2020-01-25 18:11:30
119.252.165.75 attackbotsspam
Unauthorized connection attempt detected from IP address 119.252.165.75 to port 8080
2020-01-25 17:34:58
68.183.185.93 attack
Jan 25 10:46:20 sd-53420 sshd\[7708\]: Invalid user ftpuser from 68.183.185.93
Jan 25 10:46:20 sd-53420 sshd\[7708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.185.93
Jan 25 10:46:21 sd-53420 sshd\[7708\]: Failed password for invalid user ftpuser from 68.183.185.93 port 43062 ssh2
Jan 25 10:49:31 sd-53420 sshd\[8211\]: Invalid user marconi from 68.183.185.93
Jan 25 10:49:31 sd-53420 sshd\[8211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.185.93
...
2020-01-25 17:52:05
150.109.229.166 attackbots
Unauthorized connection attempt detected from IP address 150.109.229.166 to port 7071 [J]
2020-01-25 17:43:08
106.13.38.246 attackspam
Invalid user webapp from 106.13.38.246 port 42472
2020-01-25 17:47:00
162.246.212.122 attackbots
Unauthorized connection attempt detected from IP address 162.246.212.122 to port 80 [J]
2020-01-25 18:08:19
190.231.205.171 attackbots
Unauthorized connection attempt detected from IP address 190.231.205.171 to port 23 [J]
2020-01-25 18:03:18
116.196.72.226 attack
Unauthorized connection attempt detected from IP address 116.196.72.226 to port 2220 [J]
2020-01-25 18:13:35
201.95.29.186 attack
Unauthorized connection attempt detected from IP address 201.95.29.186 to port 23 [J]
2020-01-25 18:01:32
103.130.191.10 attackspambots
Unauthorized connection attempt detected from IP address 103.130.191.10 to port 80 [J]
2020-01-25 17:48:02
151.234.47.42 attackbotsspam
Unauthorized connection attempt detected from IP address 151.234.47.42 to port 8080 [J]
2020-01-25 18:09:23
87.103.114.35 attackbotsspam
Unauthorized connection attempt detected from IP address 87.103.114.35 to port 3389 [J]
2020-01-25 17:50:40
178.93.40.21 attackbotsspam
Unauthorized connection attempt detected from IP address 178.93.40.21 to port 8080 [J]
2020-01-25 18:06:46
176.105.214.221 attackbots
Unauthorized connection attempt detected from IP address 176.105.214.221 to port 80 [J]
2020-01-25 18:07:45

最近上报的IP列表

125.166.228.65 235.173.195.50 37.10.21.179 2600:1013:b012:d8b9:946a:7f64:ce9e:e80c
237.143.96.26 181.253.239.106 77.222.103.62 226.73.63.218
84.36.57.1 162.4.39.149 29.231.132.119 178.212.91.173
36.66.210.37 177.130.137.129 78.160.52.200 113.173.93.129
198.191.36.133 191.53.252.145 189.51.103.89 93.125.99.59