必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.46.139.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.46.139.193.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:30:37 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 193.139.46.131.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 131.46.139.193.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.126.183.171 attack
spam
2020-08-27 19:40:58
119.130.107.92 attackbots
Port scan detected on ports: 3389[TCP], 3389[TCP], 3389[TCP]
2020-08-27 20:18:10
151.80.119.61 attackbots
Aug 26 22:37:59 php1 sshd\[22169\]: Invalid user musikbot from 151.80.119.61
Aug 26 22:37:59 php1 sshd\[22169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.119.61
Aug 26 22:38:01 php1 sshd\[22169\]: Failed password for invalid user musikbot from 151.80.119.61 port 58238 ssh2
Aug 26 22:41:41 php1 sshd\[22717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.119.61  user=root
Aug 26 22:41:43 php1 sshd\[22717\]: Failed password for root from 151.80.119.61 port 36498 ssh2
2020-08-27 19:48:59
90.83.66.163 attack
Unauthorised access (Aug 27) SRC=90.83.66.163 LEN=52 TOS=0x08 PREC=0x40 TTL=109 ID=20724 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-27 19:37:16
107.180.122.20 attackspam
107.180.122.20 - - [27/Aug/2020:05:41:12 +0200] "POST /xmlrpc.php HTTP/1.1" 403 795 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
107.180.122.20 - - [27/Aug/2020:05:41:12 +0200] "POST /xmlrpc.php HTTP/1.1" 403 795 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-08-27 19:56:21
109.79.28.228 attackbotsspam
Aug 27 05:30:45 xxxxxxx sshd[3382]: Failed password for invalid user pi from 109.79.28.228 port 40370 ssh2
Aug 27 05:30:45 xxxxxxx sshd[3383]: Failed password for invalid user pi from 109.79.28.228 port 40372 ssh2
Aug 27 05:30:46 xxxxxxx sshd[3382]: Connection closed by 109.79.28.228 [preauth]
Aug 27 05:30:46 xxxxxxx sshd[3383]: Connection closed by 109.79.28.228 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.79.28.228
2020-08-27 19:38:57
46.39.204.127 attackspambots
Automatic report - Port Scan Attack
2020-08-27 19:58:35
161.8.35.180 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-27 19:48:05
113.172.250.240 attackbots
1598499729 - 08/27/2020 05:42:09 Host: 113.172.250.240/113.172.250.240 Port: 445 TCP Blocked
...
2020-08-27 19:40:23
118.70.233.6 attack
firewall-block, port(s): 445/tcp
2020-08-27 20:18:35
49.149.105.72 attackbots
Brute Force
2020-08-27 20:11:46
181.67.136.214 attack
181.67.136.214 - - [27/Aug/2020:04:40:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
181.67.136.214 - - [27/Aug/2020:04:40:28 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
181.67.136.214 - - [27/Aug/2020:04:40:34 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
...
2020-08-27 20:09:21
142.4.213.12 attackbots
Automatic report - XMLRPC Attack
2020-08-27 20:09:58
161.35.61.27 attack
 TCP (SYN) 161.35.61.27:49990 -> port 27017, len 44
2020-08-27 20:14:26
157.230.248.89 attackbots
CMS (WordPress or Joomla) login attempt.
2020-08-27 20:07:08

最近上报的IP列表

146.53.230.33 14.53.200.152 202.100.13.218 53.116.254.142
2.250.54.177 120.219.51.86 127.194.127.24 97.189.68.49
140.249.175.152 50.249.110.183 114.248.114.209 162.243.143.109
200.77.24.205 167.63.156.126 244.184.121.4 66.173.16.71
2.77.157.187 220.65.179.60 133.94.223.170 47.55.125.186