必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.139.220.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.139.220.133.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:42:56 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 133.220.139.123.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.220.139.123.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.213.162 attack
Oct 23 06:52:49 www sshd\[19277\]: Invalid user ts3bot3 from 106.12.213.162Oct 23 06:52:52 www sshd\[19277\]: Failed password for invalid user ts3bot3 from 106.12.213.162 port 55272 ssh2Oct 23 06:57:30 www sshd\[19319\]: Failed password for root from 106.12.213.162 port 52290 ssh2
...
2019-10-23 12:56:39
106.54.223.169 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/106.54.223.169/ 
 
 CN - 1H : (383)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN0 
 
 IP : 106.54.223.169 
 
 CIDR : 106.54.0.0/15 
 
 PREFIX COUNT : 50243 
 
 UNIQUE IP COUNT : 856105392 
 
 
 ATTACKS DETECTED ASN0 :  
  1H - 1 
  3H - 2 
  6H - 4 
 12H - 4 
 24H - 4 
 
 DateTime : 2019-10-23 05:57:33 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-23 12:51:47
151.80.173.36 attackspambots
Oct 23 06:35:31 SilenceServices sshd[24810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36
Oct 23 06:35:33 SilenceServices sshd[24810]: Failed password for invalid user gogs from 151.80.173.36 port 56053 ssh2
Oct 23 06:39:49 SilenceServices sshd[26005]: Failed password for root from 151.80.173.36 port 47581 ssh2
2019-10-23 12:49:28
85.117.32.246 attackspam
WordPress wp-login brute force :: 85.117.32.246 0.048 BYPASS [23/Oct/2019:14:57:19  1100] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-23 13:04:03
51.75.123.85 attack
Oct 23 05:57:53 vpn01 sshd[5334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.123.85
Oct 23 05:57:55 vpn01 sshd[5334]: Failed password for invalid user user from 51.75.123.85 port 48084 ssh2
...
2019-10-23 12:38:40
36.89.239.53 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-23 13:07:51
104.236.31.227 attackbots
Oct 23 00:35:38 plusreed sshd[8466]: Invalid user roby123 from 104.236.31.227
...
2019-10-23 12:49:53
220.88.1.208 attackspam
Oct 23 00:28:19 xtremcommunity sshd\[5362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.1.208  user=root
Oct 23 00:28:20 xtremcommunity sshd\[5362\]: Failed password for root from 220.88.1.208 port 38391 ssh2
Oct 23 00:32:41 xtremcommunity sshd\[5394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.1.208  user=root
Oct 23 00:32:43 xtremcommunity sshd\[5394\]: Failed password for root from 220.88.1.208 port 57271 ssh2
Oct 23 00:37:01 xtremcommunity sshd\[5462\]: Invalid user 123 from 220.88.1.208 port 47924
Oct 23 00:37:01 xtremcommunity sshd\[5462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.1.208
...
2019-10-23 12:38:07
222.83.110.68 attackspambots
2019-10-23T05:52:09.398379  sshd[5572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.83.110.68  user=root
2019-10-23T05:52:11.519209  sshd[5572]: Failed password for root from 222.83.110.68 port 36428 ssh2
2019-10-23T05:57:15.971624  sshd[5630]: Invalid user oracle from 222.83.110.68 port 44600
2019-10-23T05:57:15.986510  sshd[5630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.83.110.68
2019-10-23T05:57:15.971624  sshd[5630]: Invalid user oracle from 222.83.110.68 port 44600
2019-10-23T05:57:17.449822  sshd[5630]: Failed password for invalid user oracle from 222.83.110.68 port 44600 ssh2
...
2019-10-23 13:04:29
37.187.17.58 attack
Oct 23 03:57:28 www_kotimaassa_fi sshd[15934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.17.58
Oct 23 03:57:30 www_kotimaassa_fi sshd[15934]: Failed password for invalid user vps from 37.187.17.58 port 58909 ssh2
...
2019-10-23 12:58:08
82.11.90.239 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/82.11.90.239/ 
 
 GB - 1H : (83)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN5089 
 
 IP : 82.11.90.239 
 
 CIDR : 82.8.0.0/13 
 
 PREFIX COUNT : 259 
 
 UNIQUE IP COUNT : 9431296 
 
 
 ATTACKS DETECTED ASN5089 :  
  1H - 1 
  3H - 2 
  6H - 3 
 12H - 3 
 24H - 6 
 
 DateTime : 2019-10-23 05:58:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-23 12:29:57
14.207.153.171 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/14.207.153.171/ 
 
 TH - 1H : (22)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN45758 
 
 IP : 14.207.153.171 
 
 CIDR : 14.207.0.0/16 
 
 PREFIX COUNT : 64 
 
 UNIQUE IP COUNT : 1069568 
 
 
 ATTACKS DETECTED ASN45758 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 4 
 24H - 8 
 
 DateTime : 2019-10-23 05:57:34 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-10-23 12:51:07
81.23.9.218 attack
Oct 23 03:49:29 ip-172-31-62-245 sshd\[9063\]: Invalid user ildefonso from 81.23.9.218\
Oct 23 03:49:31 ip-172-31-62-245 sshd\[9063\]: Failed password for invalid user ildefonso from 81.23.9.218 port 44997 ssh2\
Oct 23 03:53:44 ip-172-31-62-245 sshd\[9067\]: Invalid user ubnt from 81.23.9.218\
Oct 23 03:53:46 ip-172-31-62-245 sshd\[9067\]: Failed password for invalid user ubnt from 81.23.9.218 port 35993 ssh2\
Oct 23 03:57:55 ip-172-31-62-245 sshd\[9090\]: Failed password for root from 81.23.9.218 port 55221 ssh2\
2019-10-23 12:38:27
201.80.108.83 attackbotsspam
2019-10-23T04:29:50.593298shield sshd\[8066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.80.108.83  user=root
2019-10-23T04:29:52.442691shield sshd\[8066\]: Failed password for root from 201.80.108.83 port 32128 ssh2
2019-10-23T04:34:45.981440shield sshd\[8894\]: Invalid user abastillas from 201.80.108.83 port 31453
2019-10-23T04:34:45.987595shield sshd\[8894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.80.108.83
2019-10-23T04:34:47.335085shield sshd\[8894\]: Failed password for invalid user abastillas from 201.80.108.83 port 31453 ssh2
2019-10-23 12:48:49
106.75.10.4 attackspam
Oct 23 06:48:21 site2 sshd\[58950\]: Invalid user oracledb from 106.75.10.4Oct 23 06:48:23 site2 sshd\[58950\]: Failed password for invalid user oracledb from 106.75.10.4 port 59279 ssh2Oct 23 06:52:42 site2 sshd\[59223\]: Invalid user export from 106.75.10.4Oct 23 06:52:44 site2 sshd\[59223\]: Failed password for invalid user export from 106.75.10.4 port 49279 ssh2Oct 23 06:57:19 site2 sshd\[59464\]: Invalid user xh from 106.75.10.4
...
2019-10-23 13:03:48

最近上报的IP列表

81.59.118.80 15.210.129.109 176.15.187.216 177.176.225.89
119.62.77.61 165.225.56.53 25.162.80.69 160.95.23.170
42.64.124.248 150.245.57.90 92.16.222.55 63.13.6.118
88.68.195.63 64.213.143.253 250.38.179.157 179.11.115.36
21.35.45.243 126.17.252.22 12.104.63.102 251.28.243.83