必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.248.139.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4932
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.248.139.121.			IN	A

;; AUTHORITY SECTION:
.			226	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:18:14 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
121.139.248.13.in-addr.arpa domain name pointer af9b8c2ce623cc28b.awsglobalaccelerator.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.139.248.13.in-addr.arpa	name = af9b8c2ce623cc28b.awsglobalaccelerator.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.21.176 attack
Invalid user ki from 118.25.21.176 port 33388
2020-04-22 01:09:00
113.173.194.162 attackbotsspam
Invalid user admin from 113.173.194.162 port 37789
2020-04-22 01:12:56
123.206.111.27 attackspam
3x Failed Password
2020-04-22 01:02:59
163.172.121.98 attackbots
2020-04-21T15:15:48.807201abusebot-3.cloudsearch.cf sshd[29096]: Invalid user vpn from 163.172.121.98 port 33692
2020-04-21T15:15:48.814089abusebot-3.cloudsearch.cf sshd[29096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.121.98
2020-04-21T15:15:48.807201abusebot-3.cloudsearch.cf sshd[29096]: Invalid user vpn from 163.172.121.98 port 33692
2020-04-21T15:15:51.080408abusebot-3.cloudsearch.cf sshd[29096]: Failed password for invalid user vpn from 163.172.121.98 port 33692 ssh2
2020-04-21T15:20:15.155008abusebot-3.cloudsearch.cf sshd[29328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.121.98  user=root
2020-04-21T15:20:16.407848abusebot-3.cloudsearch.cf sshd[29328]: Failed password for root from 163.172.121.98 port 47248 ssh2
2020-04-21T15:24:28.785588abusebot-3.cloudsearch.cf sshd[29597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.12
...
2020-04-22 00:50:14
176.31.170.245 attackbots
Invalid user admin from 176.31.170.245 port 50396
2020-04-22 00:48:34
152.136.76.230 attack
Apr 21 18:29:10 santamaria sshd\[28513\]: Invalid user test from 152.136.76.230
Apr 21 18:29:10 santamaria sshd\[28513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.76.230
Apr 21 18:29:12 santamaria sshd\[28513\]: Failed password for invalid user test from 152.136.76.230 port 41879 ssh2
...
2020-04-22 00:53:57
192.241.202.169 attack
prod11
...
2020-04-22 00:38:18
91.220.81.213 spambotsattackproxynormal
steam account hacked. 
method : free skins link, if you enter login, password and code from your phone your accounts will be taken by them and automatically it will change password, email, phone number and delete steam guard.
IP is from russia
2020-04-22 00:46:45
186.13.224.184 attackspam
Invalid user admin from 186.13.224.184 port 60966
2020-04-22 00:42:29
194.58.97.245 attackspambots
Invalid user test3 from 194.58.97.245 port 55418
2020-04-22 00:37:55
114.230.202.232 attackspam
2020-04-21T16:31:38.201735abusebot-6.cloudsearch.cf sshd[4145]: Invalid user admin from 114.230.202.232 port 34358
2020-04-21T16:31:38.208036abusebot-6.cloudsearch.cf sshd[4145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.230.202.232
2020-04-21T16:31:38.201735abusebot-6.cloudsearch.cf sshd[4145]: Invalid user admin from 114.230.202.232 port 34358
2020-04-21T16:31:39.776377abusebot-6.cloudsearch.cf sshd[4145]: Failed password for invalid user admin from 114.230.202.232 port 34358 ssh2
2020-04-21T16:38:58.837544abusebot-6.cloudsearch.cf sshd[4943]: Invalid user oracle from 114.230.202.232 port 38624
2020-04-21T16:38:58.843805abusebot-6.cloudsearch.cf sshd[4943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.230.202.232
2020-04-21T16:38:58.837544abusebot-6.cloudsearch.cf sshd[4943]: Invalid user oracle from 114.230.202.232 port 38624
2020-04-21T16:39:00.482469abusebot-6.cloudsearch.cf sshd[4943]
...
2020-04-22 01:12:00
150.136.154.228 attackbots
Invalid user postgres from 150.136.154.228 port 29192
2020-04-22 00:54:14
111.230.73.133 attackspam
Invalid user xt from 111.230.73.133 port 58806
2020-04-22 01:15:35
112.21.188.235 attackbots
Invalid user uy from 112.21.188.235 port 39756
2020-04-22 01:13:59
111.231.81.72 attackbotsspam
failed root login
2020-04-22 01:14:52

最近上报的IP列表

13.248.137.172 13.248.138.189 13.248.139.39 13.248.139.220
13.248.140.194 13.248.140.240 13.248.140.112 13.248.141.142
13.248.141.203 13.248.142.127 13.248.142.213 13.248.143.48
13.248.144.13 13.248.143.141 13.248.146.255 13.248.144.223
13.248.146.49 13.248.146.151 13.248.147.214 13.248.148.206