必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.52.139.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.52.139.145.			IN	A

;; AUTHORITY SECTION:
.			395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 20:41:04 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.139.52.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.139.52.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.86.164.108 attack
CMS brute force
...
2019-10-23 19:49:53
193.110.115.129 attackspam
Port Scan
2019-10-23 20:09:41
180.182.47.132 attack
Oct 23 13:16:29 ns381471 sshd[14337]: Failed password for root from 180.182.47.132 port 49591 ssh2
2019-10-23 19:46:39
172.96.186.130 attackspambots
Wordpress brute-force
2019-10-23 19:58:06
113.125.119.83 attack
Oct 23 14:08:49 server sshd\[558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83  user=root
Oct 23 14:08:51 server sshd\[558\]: Failed password for root from 113.125.119.83 port 50996 ssh2
Oct 23 14:15:24 server sshd\[2575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83  user=root
Oct 23 14:15:26 server sshd\[2575\]: Failed password for root from 113.125.119.83 port 38288 ssh2
Oct 23 14:20:53 server sshd\[3860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83  user=root
...
2019-10-23 19:42:15
2.42.116.244 attack
Oct 23 05:45:55 * sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.42.116.244
Oct 23 05:45:55 * sshd[15842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.42.116.244
2019-10-23 19:39:51
36.75.140.162 attack
Brute force SMTP login attempted.
...
2019-10-23 19:32:30
14.18.232.5 attackbots
Helo
2019-10-23 19:32:43
118.24.34.19 attack
Oct 23 13:53:45 server sshd\[27530\]: Invalid user gita from 118.24.34.19
Oct 23 13:53:45 server sshd\[27530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.34.19 
Oct 23 13:53:48 server sshd\[27530\]: Failed password for invalid user gita from 118.24.34.19 port 41485 ssh2
Oct 23 14:16:40 server sshd\[2793\]: Invalid user imscp from 118.24.34.19
Oct 23 14:16:40 server sshd\[2793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.34.19 
...
2019-10-23 19:40:34
185.176.27.166 attackbotsspam
firewall-block, port(s): 7001/tcp, 21155/tcp, 25511/tcp, 29955/tcp
2019-10-23 20:00:21
89.189.154.66 attack
Oct 23 07:11:20 server sshd\[31335\]: Failed password for invalid user admin from 89.189.154.66 port 49180 ssh2
Oct 23 13:41:08 server sshd\[24283\]: Invalid user ethos from 89.189.154.66
Oct 23 13:41:08 server sshd\[24283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.154.66.dynamic.ufanet.ru 
Oct 23 13:41:10 server sshd\[24283\]: Failed password for invalid user ethos from 89.189.154.66 port 38198 ssh2
Oct 23 14:25:28 server sshd\[5003\]: Invalid user applmgr from 89.189.154.66
Oct 23 14:25:28 server sshd\[5003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.154.66.dynamic.ufanet.ru 
...
2019-10-23 19:44:02
37.59.38.137 attack
Oct 23 06:23:24 icinga sshd[13799]: Failed password for root from 37.59.38.137 port 43833 ssh2
Oct 23 06:42:30 icinga sshd[27189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.38.137 
Oct 23 06:42:33 icinga sshd[27189]: Failed password for invalid user training from 37.59.38.137 port 47308 ssh2
...
2019-10-23 19:50:13
128.199.138.31 attackspambots
Automatic report - Banned IP Access
2019-10-23 19:38:30
187.167.31.93 attackbotsspam
Port Scan
2019-10-23 19:59:32
107.170.65.115 attackspambots
2019-10-23T11:50:18.426963abusebot-3.cloudsearch.cf sshd\[31339\]: Invalid user hillary from 107.170.65.115 port 50058
2019-10-23 20:09:13

最近上报的IP列表

164.224.94.147 117.89.239.46 133.226.239.82 165.81.23.137
143.215.253.253 15.144.229.198 157.93.177.104 134.161.215.23
0.200.137.137 130.85.248.240 218.192.125.238 157.154.246.139
110.166.212.110 11.90.150.59 0.75.4.142 139.148.21.107
91.79.200.126 246.211.216.247 17.202.163.239 117.178.248.26