必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.139.123.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.139.123.133.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:36:22 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
133.123.139.12.in-addr.arpa is an alias for 133.128/25.123.139.12.in-addr.arpa.
133.128/25.123.139.12.in-addr.arpa domain name pointer jea.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.123.139.12.in-addr.arpa	canonical name = 133.128/25.123.139.12.in-addr.arpa.
133.128/25.123.139.12.in-addr.arpa	name = jea.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.59.38.216 attackspam
Aug 14 04:52:49 XXX sshd[42025]: Invalid user ping from 37.59.38.216 port 58903
2019-08-14 13:03:39
185.85.36.34 attack
Aug 14 00:38:47 vps200512 sshd\[18726\]: Invalid user webuser from 185.85.36.34
Aug 14 00:38:47 vps200512 sshd\[18726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.85.36.34
Aug 14 00:38:49 vps200512 sshd\[18726\]: Failed password for invalid user webuser from 185.85.36.34 port 35295 ssh2
Aug 14 00:44:00 vps200512 sshd\[18887\]: Invalid user admin from 185.85.36.34
Aug 14 00:44:00 vps200512 sshd\[18887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.85.36.34
2019-08-14 12:44:51
165.227.69.39 attackbots
Invalid user server from 165.227.69.39 port 35845
2019-08-14 13:15:17
184.105.247.254 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-08-14 12:30:52
62.210.99.162 attackspam
Invalid user user from 62.210.99.162 port 36314
2019-08-14 13:08:14
118.70.54.162 attackspam
Unauthorized connection attempt from IP address 118.70.54.162 on Port 445(SMB)
2019-08-14 12:37:41
14.139.229.2 attackspambots
Aug 14 05:56:09 lnxmysql61 sshd[24943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.229.2
2019-08-14 12:32:11
151.70.184.249 attack
Automatic report - Port Scan Attack
2019-08-14 12:36:28
87.243.8.6 attack
Feb 12 06:06:43 vtv3 sshd\[17903\]: Invalid user rogerio from 87.243.8.6 port 43930
Feb 12 06:06:43 vtv3 sshd\[17903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.243.8.6
Feb 12 06:06:45 vtv3 sshd\[17903\]: Failed password for invalid user rogerio from 87.243.8.6 port 43930 ssh2
Feb 12 06:12:40 vtv3 sshd\[19418\]: Invalid user wwwroot from 87.243.8.6 port 34008
Feb 12 06:12:40 vtv3 sshd\[19418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.243.8.6
Feb 12 06:22:51 vtv3 sshd\[22330\]: Invalid user git from 87.243.8.6 port 50408
Feb 12 06:22:51 vtv3 sshd\[22330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.243.8.6
Feb 12 06:22:52 vtv3 sshd\[22330\]: Failed password for invalid user git from 87.243.8.6 port 50408 ssh2
Feb 12 06:27:36 vtv3 sshd\[23824\]: Invalid user kraisr from 87.243.8.6 port 49938
Feb 12 06:27:36 vtv3 sshd\[23824\]: pam_unix\(sshd:auth\): authen
2019-08-14 12:34:16
123.185.156.11 attackspambots
Unauthorized connection attempt from IP address 123.185.156.11 on Port 445(SMB)
2019-08-14 12:27:46
14.139.219.2 attackspambots
$f2bV_matches
2019-08-14 12:51:52
159.65.242.16 attack
Invalid user user1 from 159.65.242.16 port 52670
2019-08-14 13:00:10
191.53.249.66 attackbots
$f2bV_matches
2019-08-14 12:55:27
66.249.70.5 attackspam
WordpressAttack
2019-08-14 12:56:19
51.89.22.106 attackbots
Aug 14 04:50:07 XXX sshd[41994]: Invalid user redis from 51.89.22.106 port 36564
2019-08-14 13:10:25

最近上报的IP列表

12.133.122.137 12.133.121.134 12.133.121.90 12.139.123.49
12.14.224.173 12.145.166.5 12.146.125.148 12.148.111.99
12.146.245.163 12.148.182.250 12.15.238.161 12.148.217.37
12.150.80.91 12.153.224.22 12.154.171.93 12.154.191.11
12.154.216.136 12.155.129.41 12.158.141.189 12.162.221.90