必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.161.83.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12655
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.161.83.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:04:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
139.83.161.120.in-addr.arpa domain name pointer 120-161-83-139.resources.indosat.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.83.161.120.in-addr.arpa	name = 120-161-83-139.resources.indosat.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.103.32.30 attackbotsspam
 TCP (SYN) 116.103.32.30:46780 -> port 23, len 44
2020-09-24 22:12:28
106.252.164.246 attack
Invalid user sinusbot from 106.252.164.246 port 48061
2020-09-24 22:02:32
52.188.7.154 attack
2020-09-23 UTC: (2x) - root(2x)
2020-09-24 22:31:57
13.82.147.151 attack
<6 unauthorized SSH connections
2020-09-24 22:41:19
114.33.196.127 attackbots
 TCP (SYN) 114.33.196.127:36727 -> port 23, len 40
2020-09-24 21:58:26
45.80.64.230 attackspam
Invalid user lfs from 45.80.64.230 port 46094
2020-09-24 22:14:47
41.111.135.193 attackspam
Invalid user contabil from 41.111.135.193 port 60903
2020-09-24 22:24:13
210.211.96.155 attackspambots
Invalid user test2 from 210.211.96.155 port 44590
2020-09-24 22:21:32
58.57.4.199 attackbotsspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=63562  .  dstport=445  .     (2891)
2020-09-24 22:38:51
45.15.139.111 attackbotsspam
(eximsyntax) Exim syntax errors from 45.15.139.111 (ES/Spain/45.15.139.111-ip.goufone.cat): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-23 20:33:56 SMTP call from [45.15.139.111] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-09-24 22:38:08
103.98.176.188 attackspam
Sep 24 06:48:03 s158375 sshd[18179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.176.188
2020-09-24 22:23:20
156.206.95.238 attackbotsspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=46583  .  dstport=23  .     (2894)
2020-09-24 22:14:32
52.188.175.110 attackbots
SSH Brute Force
2020-09-24 22:09:20
116.73.59.25 attackbots
Listed on    zen-spamhaus also abuseat.org and dnsbl-sorbs   / proto=6  .  srcport=24698  .  dstport=23  .     (2893)
2020-09-24 22:24:57
190.237.32.227 attack
SSH Brute-Force Attack
2020-09-24 22:28:38

最近上报的IP列表

98.162.170.124 45.215.238.70 141.59.160.153 164.101.141.69
133.10.219.52 181.249.171.179 250.31.166.134 68.93.65.98
94.173.237.181 228.108.55.67 220.197.3.91 81.42.16.42
252.89.237.36 171.57.138.149 255.79.188.180 22.150.23.239
241.7.60.19 253.113.182.246 202.20.92.132 33.255.95.119