必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.126.194.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.126.194.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 17:36:37 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 99.194.126.136.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 136.126.194.99.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.236.34.58 attackspambots
Invalid user sysadm from 120.236.34.58 port 41472
2020-08-27 08:44:26
134.249.106.21 attackspam
(mod_security) mod_security (id:949110) triggered by 134.249.106.21 (UA/Ukraine/134-249-106-21.broadband.kyivstar.net): 5 in the last 14400 secs; ID: rub
2020-08-27 08:42:31
51.77.200.139 attackspam
(sshd) Failed SSH login from 51.77.200.139 (FR/France/139.ip-51-77-200.eu): 5 in the last 3600 secs
2020-08-27 08:56:26
75.13.70.187 attack
20 attempts against mh_ha-misbehave-ban on flame
2020-08-27 08:39:41
64.227.97.122 attack
Invalid user zyy from 64.227.97.122 port 60902
2020-08-27 08:41:04
5.57.33.65 attack
Unauthorised access (Aug 26) SRC=5.57.33.65 LEN=52 TOS=0x10 PREC=0x40 TTL=108 ID=15956 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-27 08:38:13
192.241.228.137 attackbotsspam
port scan and connect, tcp 113 (ident)
2020-08-27 08:36:28
157.245.237.33 attackbotsspam
Aug 26 16:19:46 XXX sshd[62569]: Invalid user ruben from 157.245.237.33 port 34424
2020-08-27 08:29:39
210.55.3.250 attackbots
Aug 27 05:53:47 dhoomketu sshd[2689491]: Invalid user user from 210.55.3.250 port 34390
Aug 27 05:53:47 dhoomketu sshd[2689491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.55.3.250 
Aug 27 05:53:47 dhoomketu sshd[2689491]: Invalid user user from 210.55.3.250 port 34390
Aug 27 05:53:48 dhoomketu sshd[2689491]: Failed password for invalid user user from 210.55.3.250 port 34390 ssh2
Aug 27 05:57:46 dhoomketu sshd[2689548]: Invalid user os from 210.55.3.250 port 34278
...
2020-08-27 08:38:36
121.122.50.157 attack
Brute Force
2020-08-27 08:25:04
221.182.36.41 attackspam
Aug 26 23:48:31 melroy-server sshd[3674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.182.36.41 
Aug 26 23:48:34 melroy-server sshd[3674]: Failed password for invalid user user from 221.182.36.41 port 30154 ssh2
...
2020-08-27 08:22:00
82.3.145.31 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-27 08:49:47
222.186.180.41 attackspambots
Aug 26 20:28:41 NPSTNNYC01T sshd[2546]: Failed password for root from 222.186.180.41 port 21912 ssh2
Aug 26 20:28:44 NPSTNNYC01T sshd[2546]: Failed password for root from 222.186.180.41 port 21912 ssh2
Aug 26 20:28:47 NPSTNNYC01T sshd[2546]: Failed password for root from 222.186.180.41 port 21912 ssh2
Aug 26 20:28:50 NPSTNNYC01T sshd[2546]: Failed password for root from 222.186.180.41 port 21912 ssh2
...
2020-08-27 08:31:17
50.236.62.30 attackspam
Aug 27 01:51:59 db sshd[17842]: Invalid user zd from 50.236.62.30 port 35829
...
2020-08-27 08:38:59
185.202.1.204 attack
185.202.1.204
2020-08-27 08:42:08

最近上报的IP列表

150.226.249.185 209.245.186.193 144.88.97.4 50.250.232.14
159.65.157.7 46.213.160.56 251.164.127.29 117.208.91.153
174.75.81.157 198.251.193.213 132.5.78.211 85.127.104.188
84.101.105.40 170.53.61.203 133.213.147.102 229.79.10.157
103.38.196.107 78.241.94.62 39.22.157.174 163.104.238.243