必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.39.16.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.39.16.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 09:02:46 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 74.16.39.117.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 74.16.39.117.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.232.240 attack
May 14 13:51:51 vlre-nyc-1 sshd\[15226\]: Invalid user chn from 122.51.232.240
May 14 13:51:51 vlre-nyc-1 sshd\[15226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.232.240
May 14 13:51:52 vlre-nyc-1 sshd\[15226\]: Failed password for invalid user chn from 122.51.232.240 port 40818 ssh2
May 14 13:55:19 vlre-nyc-1 sshd\[15298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.232.240  user=root
May 14 13:55:21 vlre-nyc-1 sshd\[15298\]: Failed password for root from 122.51.232.240 port 45640 ssh2
...
2020-05-14 23:14:57
106.12.189.89 attackbots
$f2bV_matches
2020-05-14 23:53:21
186.121.204.10 attackbotsspam
May 14 14:33:31 vps687878 sshd\[29083\]: Failed password for invalid user oracle from 186.121.204.10 port 50640 ssh2
May 14 14:37:37 vps687878 sshd\[29509\]: Invalid user ubuntu from 186.121.204.10 port 56150
May 14 14:37:37 vps687878 sshd\[29509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.204.10
May 14 14:37:39 vps687878 sshd\[29509\]: Failed password for invalid user ubuntu from 186.121.204.10 port 56150 ssh2
May 14 14:41:42 vps687878 sshd\[29977\]: Invalid user musikbot from 186.121.204.10 port 33382
May 14 14:41:42 vps687878 sshd\[29977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.204.10
...
2020-05-14 23:26:23
178.242.57.232 attack
Automatic report - Banned IP Access
2020-05-14 23:23:15
34.67.183.146 attack
Unauthorized connection attempt detected from IP address 34.67.183.146 to port 22
2020-05-14 23:24:14
31.184.199.114 attackspam
May 14 17:06:32 prod4 sshd\[29839\]: Invalid user 22 from 31.184.199.114
May 14 17:06:34 prod4 sshd\[29839\]: Failed password for invalid user 22 from 31.184.199.114 port 20653 ssh2
May 14 17:06:54 prod4 sshd\[29887\]: Invalid user 22 from 31.184.199.114
...
2020-05-14 23:21:13
139.198.191.86 attackbotsspam
2020-05-14T12:09:23.295741  sshd[12004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86
2020-05-14T12:09:23.280073  sshd[12004]: Invalid user wwwdata from 139.198.191.86 port 58862
2020-05-14T12:09:25.572160  sshd[12004]: Failed password for invalid user wwwdata from 139.198.191.86 port 58862 ssh2
2020-05-14T14:25:49.360399  sshd[15571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86  user=root
2020-05-14T14:25:51.430024  sshd[15571]: Failed password for root from 139.198.191.86 port 47314 ssh2
...
2020-05-14 23:43:26
200.146.232.97 attackbots
May 14 15:09:32 OPSO sshd\[17842\]: Invalid user richard from 200.146.232.97 port 46774
May 14 15:09:32 OPSO sshd\[17842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
May 14 15:09:34 OPSO sshd\[17842\]: Failed password for invalid user richard from 200.146.232.97 port 46774 ssh2
May 14 15:13:47 OPSO sshd\[18908\]: Invalid user eas from 200.146.232.97 port 39961
May 14 15:13:47 OPSO sshd\[18908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
2020-05-14 23:39:54
185.74.4.17 attackbotsspam
May 14 17:37:40 sip sshd[259213]: Invalid user speedtest from 185.74.4.17 port 54220
May 14 17:37:42 sip sshd[259213]: Failed password for invalid user speedtest from 185.74.4.17 port 54220 ssh2
May 14 17:42:20 sip sshd[259236]: Invalid user deploy from 185.74.4.17 port 59191
...
2020-05-14 23:43:05
65.49.224.165 attackspambots
May 14 16:58:47 legacy sshd[31176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.224.165
May 14 16:58:48 legacy sshd[31176]: Failed password for invalid user jaimito from 65.49.224.165 port 38256 ssh2
May 14 17:06:21 legacy sshd[31494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.224.165
...
2020-05-14 23:20:15
58.33.93.171 attackspambots
May 14 14:38:31 buvik sshd[29631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.93.171
May 14 14:38:33 buvik sshd[29631]: Failed password for invalid user test from 58.33.93.171 port 37040 ssh2
May 14 14:41:31 buvik sshd[30235]: Invalid user raghu from 58.33.93.171
...
2020-05-14 23:35:50
157.245.207.198 attack
May 14 15:17:32 home sshd[1027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.207.198
May 14 15:17:33 home sshd[1027]: Failed password for invalid user library from 157.245.207.198 port 41768 ssh2
May 14 15:21:59 home sshd[1687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.207.198
...
2020-05-14 23:14:30
114.237.194.79 attackbotsspam
SpamScore above: 10.0
2020-05-14 23:53:09
139.99.238.48 attack
...
2020-05-14 23:18:53
203.55.21.248 attack
TCP Port: 25      invalid blocked  spam-sorbs also justspam and s5h-net           (93)
2020-05-14 23:28:04

最近上报的IP列表

181.235.209.199 19.232.41.244 253.7.16.81 100.234.204.104
161.55.178.49 216.96.50.117 235.140.60.132 122.226.18.8
28.220.101.179 36.179.100.202 213.93.33.251 65.158.145.146
189.7.153.165 33.5.255.144 242.80.154.148 167.79.137.34
122.12.127.123 61.221.165.87 55.119.83.117 75.79.154.21