必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.239.122.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.239.122.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:19:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
142.122.239.13.in-addr.arpa domain name pointer ec2-13-239-122-142.ap-southeast-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.122.239.13.in-addr.arpa	name = ec2-13-239-122-142.ap-southeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.210.127 attack
(sshd) Failed SSH login from 106.12.210.127 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  5 23:40:03 ubnt-55d23 sshd[23065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.127  user=root
Apr  5 23:40:04 ubnt-55d23 sshd[23065]: Failed password for root from 106.12.210.127 port 51524 ssh2
2020-04-06 05:49:50
51.68.126.248 attackbots
Try 24 times to connect to SMTP server with "EHLO ADMIN" ports 25 265 587
2020-04-06 05:29:04
5.196.140.219 attack
$f2bV_matches
2020-04-06 05:34:55
32.224.199.64 attack
Teardrop or derivative	 4 	 Mon Apr 06 02:55:14 2020  	 156.195.202.9:0 	 32.224.199.64:0 
Illegal Fragments	 1 	 Mon Apr 06 02:55:14 2020  	 156.195.202.9:0 	 32.224.199.64:0 
Ping Of Death	 3 	 Mon Apr 06 02:56:08 2020  	 156.195.202.9:0 	 32.224.199.64:0 
Teardrop or derivative	 4 	 Mon Apr 06 02:56:19 2020  	 156.195.202.9:0 	 32.224.199.64:0
2020-04-06 05:51:46
61.224.81.201 attackspambots
445/tcp
[2020-04-05]1pkt
2020-04-06 05:16:28
212.33.250.241 attackbotsspam
Apr  5 21:40:08 *** sshd[19450]: User root from 212.33.250.241 not allowed because not listed in AllowUsers
2020-04-06 05:42:27
115.159.203.199 attackspam
(sshd) Failed SSH login from 115.159.203.199 (JP/Japan/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  5 21:29:50 ubnt-55d23 sshd[26613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.203.199  user=root
Apr  5 21:29:52 ubnt-55d23 sshd[26613]: Failed password for root from 115.159.203.199 port 47868 ssh2
2020-04-06 05:32:36
218.250.254.228 attackbotsspam
5555/tcp
[2020-04-05]1pkt
2020-04-06 05:20:21
49.234.63.140 attackbots
20 attempts against mh-ssh on cloud
2020-04-06 05:44:54
186.139.240.110 attack
9530/tcp
[2020-04-05]1pkt
2020-04-06 05:30:38
188.166.251.156 attackbotsspam
leo_www
2020-04-06 05:40:34
23.80.97.243 attack
(From darwin.lindsay@msn.com) Hi,

We're wondering if you've considered taking the written content from siegelchiropractic.com and converting it into videos to promote on Youtube? It's another method of generating traffic.

There's a free trial available to you at the following link: https://turntextintovideo.com

Regards,
Darwin
2020-04-06 05:31:51
188.150.224.150 attackspam
firewall-block, port(s): 23/tcp
2020-04-06 05:44:20
133.242.155.85 attackspambots
(sshd) Failed SSH login from 133.242.155.85 (JP/Japan/www.fm-net.ne.jp): 5 in the last 3600 secs
2020-04-06 05:17:19
207.154.195.24 attack
Apr  3 12:56:18 host sshd[31230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.195.24  user=r.r
Apr  3 12:56:19 host sshd[31230]: Failed password for r.r from 207.154.195.24 port 49504 ssh2
Apr  3 12:56:19 host sshd[31230]: Received disconnect from 207.154.195.24: 11: Bye Bye [preauth]
Apr  3 13:08:34 host sshd[4951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.195.24  user=r.r
Apr  3 13:08:36 host sshd[4951]: Failed password for r.r from 207.154.195.24 port 56664 ssh2
Apr  3 13:08:36 host sshd[4951]: Received disconnect from 207.154.195.24: 11: Bye Bye [preauth]
Apr  3 13:14:41 host sshd[23300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.195.24  user=r.r
Apr  3 13:14:42 host sshd[23300]: Failed password for r.r from 207.154.195.24 port 50074 ssh2
Apr  3 13:14:42 host sshd[23300]: Received disconnect from 207.154.195........
-------------------------------
2020-04-06 05:27:28

最近上报的IP列表

89.131.204.96 23.124.7.149 199.138.219.148 212.209.115.21
222.250.244.187 48.156.59.144 128.196.114.238 73.129.5.59
220.247.80.33 173.122.14.182 65.235.205.59 251.186.52.96
79.109.253.208 180.112.120.125 210.85.155.28 168.235.199.2
16.193.17.117 99.165.40.230 120.16.15.165 43.171.98.184