必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sayama

省份(region): Saitama

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.67.210.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.67.210.139.			IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041302 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 07:37:01 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
139.210.67.116.in-addr.arpa domain name pointer p7443d28b.sitmnt01.ap.so-net.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.210.67.116.in-addr.arpa	name = p7443d28b.sitmnt01.ap.so-net.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.108.39.123 attack
Honeypot attack, port: 445, PTR: node-7sr.pool-101-108.dynamic.totinternet.net.
2020-06-21 21:23:55
162.243.135.209 attack
scans once in preceeding hours on the ports (in chronological order) 8086 resulting in total of 51 scans from 162.243.0.0/16 block.
2020-06-21 21:04:23
223.111.157.138 attack
scans 11 times in preceeding hours on the ports (in chronological order) 1313 2012 2013 2016 2017 2015 2018 2111 2252 2262 2272 resulting in total of 11 scans from 223.64.96.0/12 block.
2020-06-21 21:10:46
116.203.244.217 attackspam
Jun 20 10:13:21 h2034429 sshd[15785]: Invalid user zcy from 116.203.244.217
Jun 20 10:13:21 h2034429 sshd[15785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.244.217
Jun 20 10:13:24 h2034429 sshd[15785]: Failed password for invalid user zcy from 116.203.244.217 port 44982 ssh2
Jun 20 10:13:24 h2034429 sshd[15785]: Received disconnect from 116.203.244.217 port 44982:11: Bye Bye [preauth]
Jun 20 10:13:24 h2034429 sshd[15785]: Disconnected from 116.203.244.217 port 44982 [preauth]
Jun 20 10:20:01 h2034429 sshd[15892]: Invalid user ifp from 116.203.244.217
Jun 20 10:20:01 h2034429 sshd[15892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.244.217


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.203.244.217
2020-06-21 21:09:55
27.66.73.98 attackspam
Unauthorized connection attempt from IP address 27.66.73.98 on Port 445(SMB)
2020-06-21 21:30:17
221.149.8.48 attackspam
Jun 21 02:10:12 php1 sshd\[29869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.149.8.48  user=root
Jun 21 02:10:14 php1 sshd\[29869\]: Failed password for root from 221.149.8.48 port 53906 ssh2
Jun 21 02:13:15 php1 sshd\[30078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.149.8.48  user=root
Jun 21 02:13:18 php1 sshd\[30078\]: Failed password for root from 221.149.8.48 port 37876 ssh2
Jun 21 02:16:16 php1 sshd\[30308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.149.8.48  user=root
2020-06-21 21:21:37
149.202.251.236 attackspam
Jun 21 13:20:16 ip-172-31-62-245 sshd\[2667\]: Invalid user lijun from 149.202.251.236\
Jun 21 13:20:18 ip-172-31-62-245 sshd\[2667\]: Failed password for invalid user lijun from 149.202.251.236 port 46644 ssh2\
Jun 21 13:24:02 ip-172-31-62-245 sshd\[2695\]: Failed password for root from 149.202.251.236 port 55456 ssh2\
Jun 21 13:27:30 ip-172-31-62-245 sshd\[2740\]: Invalid user paris from 149.202.251.236\
Jun 21 13:27:31 ip-172-31-62-245 sshd\[2740\]: Failed password for invalid user paris from 149.202.251.236 port 33022 ssh2\
2020-06-21 21:28:29
123.206.26.133 attack
Jun 21 15:18:49 vps sshd[908589]: Failed password for invalid user root2 from 123.206.26.133 port 45554 ssh2
Jun 21 15:22:16 vps sshd[926061]: Invalid user adriana from 123.206.26.133 port 55988
Jun 21 15:22:16 vps sshd[926061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.26.133
Jun 21 15:22:18 vps sshd[926061]: Failed password for invalid user adriana from 123.206.26.133 port 55988 ssh2
Jun 21 15:25:46 vps sshd[945936]: Invalid user guest from 123.206.26.133 port 38194
...
2020-06-21 21:36:29
79.124.62.66 attack
Jun 21 14:53:06 debian-2gb-nbg1-2 kernel: \[15002665.881803\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=36520 PROTO=TCP SPT=54469 DPT=3256 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-21 21:20:01
106.12.110.157 attackspambots
Jun 21 20:19:34 webhost01 sshd[16966]: Failed password for root from 106.12.110.157 port 41279 ssh2
Jun 21 20:21:38 webhost01 sshd[16981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.110.157
...
2020-06-21 21:27:25
115.231.220.43 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-21 20:59:48
14.175.163.204 attackspambots
Unauthorized connection attempt from IP address 14.175.163.204 on Port 445(SMB)
2020-06-21 21:35:19
114.35.211.89 attack
Jun 21 14:24:15 gestao sshd[23066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.211.89 
Jun 21 14:24:17 gestao sshd[23066]: Failed password for invalid user squid from 114.35.211.89 port 52792 ssh2
Jun 21 14:28:09 gestao sshd[23146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.211.89 
...
2020-06-21 21:41:42
77.247.110.103 attackspambots
scans once in preceeding hours on the ports (in chronological order) 7020 resulting in total of 1 scans from 77.247.110.0/24 block.
2020-06-21 21:07:50
162.243.137.18 attack
Fail2Ban Ban Triggered
2020-06-21 20:58:31

最近上报的IP列表

176.109.175.193 178.162.209.85 116.109.139.66 80.213.252.213
131.212.134.163 112.7.132.214 58.218.209.84 218.2.0.65
49.234.31.158 125.62.197.177 181.44.131.146 8.9.11.94
152.168.245.31 200.192.209.245 185.11.232.10 177.138.155.250
14.63.170.11 195.88.6.159 132.145.200.223 117.48.209.210