必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.139.217.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.139.217.93.			IN	A

;; AUTHORITY SECTION:
.			173	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 20:49:47 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 93.217.139.132.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
server can't find 132.139.217.93.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.57.190.131 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-15 05:04:12
159.203.201.203 attack
Hits on port : 135
2019-09-15 05:01:14
128.199.47.148 attackspambots
Sep 14 22:58:22 vps647732 sshd[3515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148
Sep 14 22:58:24 vps647732 sshd[3515]: Failed password for invalid user it2 from 128.199.47.148 port 39960 ssh2
...
2019-09-15 05:08:02
194.15.36.216 attackbots
Sep 14 11:11:29 lcdev sshd\[14518\]: Invalid user jobs from 194.15.36.216
Sep 14 11:11:29 lcdev sshd\[14518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.15.36.216
Sep 14 11:11:31 lcdev sshd\[14518\]: Failed password for invalid user jobs from 194.15.36.216 port 51790 ssh2
Sep 14 11:15:34 lcdev sshd\[14847\]: Invalid user admin from 194.15.36.216
Sep 14 11:15:34 lcdev sshd\[14847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.15.36.216
2019-09-15 05:30:19
188.166.236.211 attackbotsspam
Sep 14 11:04:59 php2 sshd\[15735\]: Invalid user Anelma from 188.166.236.211
Sep 14 11:04:59 php2 sshd\[15735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
Sep 14 11:05:01 php2 sshd\[15735\]: Failed password for invalid user Anelma from 188.166.236.211 port 59725 ssh2
Sep 14 11:10:06 php2 sshd\[16337\]: Invalid user gmodserver from 188.166.236.211
Sep 14 11:10:06 php2 sshd\[16337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
2019-09-15 05:31:25
165.227.96.190 attackspam
Sep 14 21:04:29 core sshd[2098]: Invalid user passwdroot from 165.227.96.190 port 45758
Sep 14 21:04:31 core sshd[2098]: Failed password for invalid user passwdroot from 165.227.96.190 port 45758 ssh2
...
2019-09-15 05:21:55
218.92.0.163 attackbots
Sep 14 20:18:54 ns341937 sshd[9450]: Failed password for root from 218.92.0.163 port 46213 ssh2
Sep 14 20:18:57 ns341937 sshd[9450]: Failed password for root from 218.92.0.163 port 46213 ssh2
Sep 14 20:18:59 ns341937 sshd[9450]: Failed password for root from 218.92.0.163 port 46213 ssh2
Sep 14 20:19:02 ns341937 sshd[9450]: Failed password for root from 218.92.0.163 port 46213 ssh2
...
2019-09-15 05:28:31
173.248.228.75 attackspambots
Sep 14 20:19:36 vpn01 sshd\[3431\]: Invalid user foo from 173.248.228.75
Sep 14 20:19:36 vpn01 sshd\[3431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.228.75
Sep 14 20:19:38 vpn01 sshd\[3431\]: Failed password for invalid user foo from 173.248.228.75 port 36658 ssh2
2019-09-15 05:33:21
27.105.252.36 attackbotsspam
Honeypot attack, port: 23, PTR: 27-105-252-36-adsl-TPE.dynamic.so-net.net.tw.
2019-09-15 05:15:28
95.33.225.176 attackbotsspam
Sep 15 00:02:26 tuotantolaitos sshd[18214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.33.225.176
Sep 15 00:02:27 tuotantolaitos sshd[18214]: Failed password for invalid user test from 95.33.225.176 port 43694 ssh2
...
2019-09-15 05:09:05
191.252.125.115 attack
2019-09-14T22:33:12.319331  sshd[9073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.125.115  user=root
2019-09-14T22:33:14.986455  sshd[9073]: Failed password for root from 191.252.125.115 port 50818 ssh2
2019-09-14T22:38:32.347083  sshd[9116]: Invalid user tatiana from 191.252.125.115 port 39398
2019-09-14T22:38:32.362701  sshd[9116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.125.115
2019-09-14T22:38:32.347083  sshd[9116]: Invalid user tatiana from 191.252.125.115 port 39398
2019-09-14T22:38:34.291818  sshd[9116]: Failed password for invalid user tatiana from 191.252.125.115 port 39398 ssh2
...
2019-09-15 05:30:50
219.142.28.206 attackspambots
Sep 14 21:10:19 OPSO sshd\[25787\]: Invalid user domain from 219.142.28.206 port 55036
Sep 14 21:10:19 OPSO sshd\[25787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.28.206
Sep 14 21:10:21 OPSO sshd\[25787\]: Failed password for invalid user domain from 219.142.28.206 port 55036 ssh2
Sep 14 21:14:28 OPSO sshd\[26740\]: Invalid user test from 219.142.28.206 port 38474
Sep 14 21:14:28 OPSO sshd\[26740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.28.206
2019-09-15 05:28:12
104.131.29.92 attackbots
Sep 14 23:08:32 [host] sshd[13417]: Invalid user petru from 104.131.29.92
Sep 14 23:08:32 [host] sshd[13417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.29.92
Sep 14 23:08:34 [host] sshd[13417]: Failed password for invalid user petru from 104.131.29.92 port 34693 ssh2
2019-09-15 05:38:22
35.198.237.235 attackspam
ft-1848-basketball.de 35.198.237.235 \[14/Sep/2019:20:20:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 2165 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-basketball.de 35.198.237.235 \[14/Sep/2019:20:20:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 2136 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-15 05:10:41
12.197.157.62 attack
Unauthorised access (Sep 14) SRC=12.197.157.62 LEN=52 TTL=110 ID=21295 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-15 04:59:28

最近上报的IP列表

129.121.83.23 165.156.116.56 43.147.253.94 80.118.33.180
189.19.243.169 25.185.87.44 227.57.79.122 181.98.131.18
221.231.209.166 219.60.149.22 56.54.204.196 178.13.153.92
58.82.160.27 28.84.129.40 237.188.126.52 100.67.244.17
10.106.255.18 194.223.30.202 17.57.145.37 85.181.123.184