必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Aachen

省份(region): North Rhine-Westphalia

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.12.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.12.139.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062301 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 07:34:11 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.12.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.12.226.137.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.221.254.230 attackbots
Sep 19 20:43:00 www_kotimaassa_fi sshd[2083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.221.254.230
Sep 19 20:43:02 www_kotimaassa_fi sshd[2083]: Failed password for invalid user obama from 213.221.254.230 port 60216 ssh2
...
2019-09-20 04:47:51
206.189.153.178 attack
Sep 19 10:39:01 hcbb sshd\[31885\]: Invalid user postmaster from 206.189.153.178
Sep 19 10:39:01 hcbb sshd\[31885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178
Sep 19 10:39:02 hcbb sshd\[31885\]: Failed password for invalid user postmaster from 206.189.153.178 port 37262 ssh2
Sep 19 10:44:02 hcbb sshd\[32398\]: Invalid user debian from 206.189.153.178
Sep 19 10:44:02 hcbb sshd\[32398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178
2019-09-20 04:47:11
182.117.111.107 attackbots
Sep 19 21:12:33 xxxxxxx8434580 sshd[6013]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.117.111.107] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 19 21:12:33 xxxxxxx8434580 sshd[6013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.117.111.107  user=r.r
Sep 19 21:12:33 xxxxxxx8434580 sshd[6014]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.117.111.107] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 19 21:12:33 xxxxxxx8434580 sshd[6014]: Invalid user admin from 182.117.111.107
Sep 19 21:12:33 xxxxxxx8434580 sshd[6014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.117.111.107 
Sep 19 21:12:34 xxxxxxx8434580 sshd[6013]: Failed password for r.r from 182.117.111.107 port 54370 ssh2
Sep 19 21:12:35 xxxxxxx8434580 sshd[6014]: Failed password for invalid user admin from 182.117.111.107 port 54377 ssh2
Sep 19 21:12:37 xxxxxxx8434580 sshd[6013]: Failed password fo........
-------------------------------
2019-09-20 04:56:55
61.147.80.222 attackspambots
Sep 19 20:34:19 MK-Soft-VM4 sshd\[20690\]: Invalid user student from 61.147.80.222 port 57718
Sep 19 20:34:19 MK-Soft-VM4 sshd\[20690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.147.80.222
Sep 19 20:34:21 MK-Soft-VM4 sshd\[20690\]: Failed password for invalid user student from 61.147.80.222 port 57718 ssh2
...
2019-09-20 04:35:18
167.99.75.143 attack
xmlrpc attack
2019-09-20 04:52:19
110.35.173.2 attackspam
Sep 19 10:36:33 aiointranet sshd\[22900\]: Invalid user gmodserver from 110.35.173.2
Sep 19 10:36:33 aiointranet sshd\[22900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2
Sep 19 10:36:36 aiointranet sshd\[22900\]: Failed password for invalid user gmodserver from 110.35.173.2 port 7180 ssh2
Sep 19 10:40:46 aiointranet sshd\[23392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2  user=www-data
Sep 19 10:40:48 aiointranet sshd\[23392\]: Failed password for www-data from 110.35.173.2 port 16846 ssh2
2019-09-20 04:56:20
152.168.137.2 attack
Sep 19 22:35:54 dev0-dcfr-rnet sshd[2387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2
Sep 19 22:35:56 dev0-dcfr-rnet sshd[2387]: Failed password for invalid user admin from 152.168.137.2 port 53674 ssh2
Sep 19 22:41:05 dev0-dcfr-rnet sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2
2019-09-20 04:42:32
202.39.70.5 attackspam
Sep 19 22:27:06 OPSO sshd\[12235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5  user=root
Sep 19 22:27:08 OPSO sshd\[12235\]: Failed password for root from 202.39.70.5 port 35640 ssh2
Sep 19 22:31:55 OPSO sshd\[13262\]: Invalid user odroid from 202.39.70.5 port 50922
Sep 19 22:31:55 OPSO sshd\[13262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
Sep 19 22:31:57 OPSO sshd\[13262\]: Failed password for invalid user odroid from 202.39.70.5 port 50922 ssh2
2019-09-20 04:34:50
139.59.87.250 attack
Sep 19 20:26:42 hcbbdb sshd\[9218\]: Invalid user pi from 139.59.87.250
Sep 19 20:26:42 hcbbdb sshd\[9218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.250
Sep 19 20:26:44 hcbbdb sshd\[9218\]: Failed password for invalid user pi from 139.59.87.250 port 59384 ssh2
Sep 19 20:31:32 hcbbdb sshd\[9780\]: Invalid user admin2 from 139.59.87.250
Sep 19 20:31:32 hcbbdb sshd\[9780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.87.250
2019-09-20 04:41:58
77.247.109.72 attackspam
\[2019-09-19 16:21:03\] NOTICE\[2270\] chan_sip.c: Registration from '"7001" \' failed for '77.247.109.72:5916' - Wrong password
\[2019-09-19 16:21:03\] SECURITY\[2283\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-19T16:21:03.681-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7001",SessionID="0x7fcd8c0e88d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.72/5916",Challenge="1c1711ef",ReceivedChallenge="1c1711ef",ReceivedHash="b079bb192c8399280b99d70908977ee0"
\[2019-09-19 16:21:03\] NOTICE\[2270\] chan_sip.c: Registration from '"7001" \' failed for '77.247.109.72:5916' - Wrong password
\[2019-09-19 16:21:03\] SECURITY\[2283\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-19T16:21:03.820-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7001",SessionID="0x7fcd8c1c4788",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
2019-09-20 04:36:57
114.26.24.153 attackbots
SMB Server BruteForce Attack
2019-09-20 04:31:55
198.57.203.54 attackspambots
2019-09-19T23:45:23.606779tmaserv sshd\[17945\]: Invalid user changeme from 198.57.203.54 port 48084
2019-09-19T23:45:23.610706tmaserv sshd\[17945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.scme-nm.net
2019-09-19T23:45:25.373241tmaserv sshd\[17945\]: Failed password for invalid user changeme from 198.57.203.54 port 48084 ssh2
2019-09-19T23:49:42.585900tmaserv sshd\[18157\]: Invalid user qwer1234!@\#$ from 198.57.203.54 port 35360
2019-09-19T23:49:42.589882tmaserv sshd\[18157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.scme-nm.net
2019-09-19T23:49:45.453621tmaserv sshd\[18157\]: Failed password for invalid user qwer1234!@\#$ from 198.57.203.54 port 35360 ssh2
...
2019-09-20 04:53:27
174.138.6.146 attackspambots
Sep 19 22:51:21 tux-35-217 sshd\[12423\]: Invalid user ubnt from 174.138.6.146 port 54652
Sep 19 22:51:21 tux-35-217 sshd\[12423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.6.146
Sep 19 22:51:23 tux-35-217 sshd\[12423\]: Failed password for invalid user ubnt from 174.138.6.146 port 54652 ssh2
Sep 19 22:54:51 tux-35-217 sshd\[12447\]: Invalid user jack from 174.138.6.146 port 39056
Sep 19 22:54:51 tux-35-217 sshd\[12447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.6.146
...
2019-09-20 05:03:22
167.71.251.86 attackbotsspam
WordPress brute force
2019-09-20 04:52:33
91.221.109.101 attackbotsspam
/_admin/
/core/packages/.gitignore
/cms/admin/index.php
/cms/lang/ru_utf8/css/sbIndex.css
/js/admin.js
/netcat/admin/
/registration/
/manager/includes/accesscontrol.inc.php
/phpshop/admpanel/
/typo3/border.html
/shop_content.php
/vamshop.txt
/wp-login.php
/password_double_opt.php
/js/easy.php
/manager/
/admin/events/last/
/user/register
/include/ajax/textPreview.php
/admin/login.php
/admin/
/bitrix/admin/
/core/xpdo/changelog.txt
/
/assets/index.html
/
/store_closed.html
/admin/login
/administrator/
/hostcmsfiles/main.js
/includes/init.php
/js/api.js
/engine/engine.php
/assets/modules/docmanager/js/docmanager.js
/

Mozilla/5.0 (Windows NT 6.2; WOW64) Runet-Research-Crawler (itrack.ru/research/cmsrate; rating@itrack.ru)
2019-09-20 04:27:43

最近上报的IP列表

137.226.21.211 137.226.12.141 43.155.81.211 137.226.12.143
43.155.98.74 23.225.194.88 220.135.224.149 72.224.193.161
35.165.215.76 139.228.183.102 124.222.77.10 121.156.160.79
202.180.20.11 104.248.161.88 94.232.40.92 45.229.234.128
179.43.142.21 1.120.210.45 222.242.106.7 43.159.55.244