必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.139.64.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.139.64.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:03:02 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 119.64.139.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.64.139.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.129.163.142 attackspambots
Jul  8 13:04:17 logopedia-1vcpu-1gb-nyc1-01 sshd[71689]: Invalid user noel from 183.129.163.142 port 17035
...
2020-07-09 02:59:26
137.215.181.250 attack
Unauthorized connection attempt from IP address 137.215.181.250 on Port 445(SMB)
2020-07-09 02:55:15
212.29.219.12 attack
Unauthorized connection attempt detected from IP address 212.29.219.12 to port 23
2020-07-09 03:25:54
68.183.12.127 attackspambots
Jul  8 18:48:15 santamaria sshd\[31453\]: Invalid user clio from 68.183.12.127
Jul  8 18:48:15 santamaria sshd\[31453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.12.127
Jul  8 18:48:16 santamaria sshd\[31453\]: Failed password for invalid user clio from 68.183.12.127 port 50062 ssh2
...
2020-07-09 03:21:53
61.74.234.245 attackbotsspam
2020-07-08T12:20:37.479222shield sshd\[25140\]: Invalid user hejt from 61.74.234.245 port 36047
2020-07-08T12:20:37.482873shield sshd\[25140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.234.245
2020-07-08T12:20:39.556954shield sshd\[25140\]: Failed password for invalid user hejt from 61.74.234.245 port 36047 ssh2
2020-07-08T12:22:01.952863shield sshd\[25577\]: Invalid user nagios from 61.74.234.245 port 45717
2020-07-08T12:22:01.957972shield sshd\[25577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.234.245
2020-07-09 03:03:42
124.123.166.63 attack
Unauthorized connection attempt from IP address 124.123.166.63 on Port 445(SMB)
2020-07-09 03:05:30
140.246.93.170 attackbots
2020-07-08T13:42:48.500478v22018076590370373 sshd[24953]: Invalid user netfonts from 140.246.93.170 port 49793
2020-07-08T13:42:48.506938v22018076590370373 sshd[24953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.93.170
2020-07-08T13:42:48.500478v22018076590370373 sshd[24953]: Invalid user netfonts from 140.246.93.170 port 49793
2020-07-08T13:42:50.421225v22018076590370373 sshd[24953]: Failed password for invalid user netfonts from 140.246.93.170 port 49793 ssh2
2020-07-08T13:44:57.614395v22018076590370373 sshd[28826]: Invalid user admin from 140.246.93.170 port 13002
...
2020-07-09 03:04:47
68.183.137.173 attack
18951/tcp 31874/tcp 3224/tcp...
[2020-06-24/07-08]17pkt,6pt.(tcp)
2020-07-09 03:21:32
78.129.240.214 attackbots
Automated report (2020-07-08T19:44:43+08:00). Probe detected.
2020-07-09 03:31:31
109.70.100.30 attackspam
CMS (WordPress or Joomla) login attempt.
2020-07-09 03:02:25
186.30.58.56 attackbotsspam
20 attempts against mh-ssh on soil
2020-07-09 03:04:01
162.243.139.40 attackspam
[Thu May 28 02:37:02 2020] - DDoS Attack From IP: 162.243.139.40 Port: 48945
2020-07-09 03:18:45
202.158.123.42 attackspambots
Jul  8 19:13:36 rush sshd[17556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.123.42
Jul  8 19:13:39 rush sshd[17556]: Failed password for invalid user zhousp from 202.158.123.42 port 48810 ssh2
Jul  8 19:17:38 rush sshd[17681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.123.42
...
2020-07-09 03:30:15
78.129.237.153 attackspam
Automated report (2020-07-08T19:44:55+08:00). Probe detected.
2020-07-09 03:18:25
189.98.100.224 attackbotsspam
Probing for vulnerable services
2020-07-09 03:23:59

最近上报的IP列表

83.107.1.167 215.30.125.249 176.220.88.222 145.19.193.26
96.40.43.9 136.196.161.112 114.215.216.142 35.21.38.192
36.152.25.33 137.218.88.51 167.145.194.102 39.40.7.163
15.158.77.137 4.39.168.150 44.139.74.196 43.70.240.164
46.231.65.105 253.199.181.151 224.88.223.147 197.185.234.173