必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.197.139.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.197.139.93.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 07:11:46 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 93.139.197.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.139.197.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.192.101.121 attackspambots
fail2ban honeypot
2019-10-04 17:32:13
222.186.52.89 attack
Oct  4 05:23:56 plusreed sshd[27917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
Oct  4 05:23:58 plusreed sshd[27917]: Failed password for root from 222.186.52.89 port 22374 ssh2
...
2019-10-04 17:25:59
104.244.78.55 attackspam
Oct  4 08:56:53 hcbbdb sshd\[4412\]: Invalid user aaron from 104.244.78.55
Oct  4 08:56:53 hcbbdb sshd\[4412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.78.55
Oct  4 08:56:56 hcbbdb sshd\[4412\]: Failed password for invalid user aaron from 104.244.78.55 port 50092 ssh2
Oct  4 08:56:58 hcbbdb sshd\[4412\]: Failed password for invalid user aaron from 104.244.78.55 port 50092 ssh2
Oct  4 08:57:00 hcbbdb sshd\[4412\]: Failed password for invalid user aaron from 104.244.78.55 port 50092 ssh2
2019-10-04 17:21:56
165.227.11.173 attackbotsspam
Nov 30 03:22:34 server6 sshd[4166]: reveeclipse mapping checking getaddrinfo for 209310.cloudwaysapps.com [165.227.11.173] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 03:22:35 server6 sshd[4166]: Failed password for invalid user tecnici from 165.227.11.173 port 45351 ssh2
Nov 30 03:22:35 server6 sshd[4166]: Received disconnect from 165.227.11.173: 11: Bye Bye [preauth]
Nov 30 04:42:27 server6 sshd[30609]: reveeclipse mapping checking getaddrinfo for 209310.cloudwaysapps.com [165.227.11.173] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 04:42:29 server6 sshd[30609]: Failed password for invalid user ts3 from 165.227.11.173 port 38217 ssh2
Nov 30 04:42:29 server6 sshd[30609]: Received disconnect from 165.227.11.173: 11: Bye Bye [preauth]
Nov 30 06:00:31 server6 sshd[3014]: reveeclipse mapping checking getaddrinfo for 209310.cloudwaysapps.com [165.227.11.17
.... truncated .... 
reauth]
Dec  1 20:01:30 server6 sshd[18427]: reveeclipse mapping checking getaddrinfo for 209310.clou........
-------------------------------
2019-10-04 17:17:30
40.118.46.159 attack
Automatic report - Banned IP Access
2019-10-04 17:47:38
51.68.123.198 attackbotsspam
Oct  3 18:51:53 eddieflores sshd\[18367\]: Invalid user Electronic2017 from 51.68.123.198
Oct  3 18:51:53 eddieflores sshd\[18367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.ip-51-68-123.eu
Oct  3 18:51:55 eddieflores sshd\[18367\]: Failed password for invalid user Electronic2017 from 51.68.123.198 port 41242 ssh2
Oct  3 18:55:54 eddieflores sshd\[18717\]: Invalid user Admin000 from 51.68.123.198
Oct  3 18:55:54 eddieflores sshd\[18717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.ip-51-68-123.eu
2019-10-04 17:16:52
218.4.246.109 attackspambots
SASL broute force
2019-10-04 17:21:08
218.92.0.212 attackbotsspam
$f2bV_matches
2019-10-04 17:22:52
49.88.112.78 attackbots
Oct  4 11:28:26 vpn01 sshd[31053]: Failed password for root from 49.88.112.78 port 20539 ssh2
Oct  4 11:28:29 vpn01 sshd[31053]: Failed password for root from 49.88.112.78 port 20539 ssh2
...
2019-10-04 17:31:19
193.70.32.148 attack
Oct  4 06:46:11 www5 sshd\[33983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148  user=root
Oct  4 06:46:13 www5 sshd\[33983\]: Failed password for root from 193.70.32.148 port 52122 ssh2
Oct  4 06:52:43 www5 sshd\[35034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148  user=root
...
2019-10-04 17:11:52
176.115.100.201 attackspambots
Oct  4 10:55:08 dedicated sshd[15110]: Invalid user Qaz@2018 from 176.115.100.201 port 50068
2019-10-04 17:17:15
81.21.86.97 attackspambots
Oct  1 20:29:08 rhein postfix/smtpd[9766]: warning: hostname 97-86-21-81-pppoe-dynamic-ip.ultel-dot-net does not resolve to address 81.21.86.97: Name or service not known
Oct  1 20:29:08 rhein postfix/smtpd[9766]: connect from unknown[81.21.86.97]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct  1 20:29:10 rhein postfix/smtpd[9766]: lost connection after RCPT from unknown[81.21.86.97]
Oct  1 20:29:10 rhein postfix/smtpd[9766]: disconnect from unknown[81.21.86.97]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.21.86.97
2019-10-04 17:46:39
206.189.145.251 attackspam
Automatic report - Banned IP Access
2019-10-04 17:41:07
186.249.209.194 attackbotsspam
Oct  2 22:26:52 our-server-hostname postfix/smtpd[14142]: connect from unknown[186.249.209.194]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.249.209.194
2019-10-04 17:11:03
118.70.118.21 attackspam
Oct  3 23:51:58 localhost kernel: [3898937.924405] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=118.70.118.21 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=15813 DF PROTO=TCP SPT=56301 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct  3 23:51:58 localhost kernel: [3898937.924444] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=118.70.118.21 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=15813 DF PROTO=TCP SPT=56301 DPT=445 SEQ=99715230 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405A00103030201010402) 
Oct  3 23:52:01 localhost kernel: [3898940.925132] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=118.70.118.21 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=17249 DF PROTO=TCP SPT=56301 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct  3 23:52:01 localhost kernel: [3898940.925140] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=118.70.118.21 D
2019-10-04 17:43:52

最近上报的IP列表

214.242.28.102 131.216.198.65 219.152.146.67 66.47.187.149
156.198.235.80 202.7.220.162 147.101.254.62 233.244.183.31
117.70.124.128 36.253.192.234 9.53.133.126 28.118.162.245
129.18.155.93 90.188.34.174 36.200.183.75 199.47.103.111
96.52.171.211 251.47.194.75 16.80.129.108 84.31.238.75