必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Semarang

省份(region): Jawa Tengah

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.109.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.109.100.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024011800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 18 21:01:54 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
100.109.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-109-100.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.109.0.139.in-addr.arpa	name = fm-dyn-139-0-109-100.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.44.3.207 attack
Unauthorised access (Mar  9) SRC=103.44.3.207 LEN=40 TTL=246 ID=65181 DF TCP DPT=23 WINDOW=14600 SYN
2020-03-09 17:43:30
14.143.74.186 attackspam
Unauthorized connection attempt from IP address 14.143.74.186 on Port 445(SMB)
2020-03-09 18:05:50
175.6.32.134 attackspam
2020-03-09T05:21:15.705612ns386461 sshd\[11141\]: Invalid user xsbk from 175.6.32.134 port 46908
2020-03-09T05:21:15.710131ns386461 sshd\[11141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.32.134
2020-03-09T05:21:17.558455ns386461 sshd\[11141\]: Failed password for invalid user xsbk from 175.6.32.134 port 46908 ssh2
2020-03-09T05:36:12.936509ns386461 sshd\[24851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.32.134  user=root
2020-03-09T05:36:15.259645ns386461 sshd\[24851\]: Failed password for root from 175.6.32.134 port 44502 ssh2
...
2020-03-09 17:35:36
118.69.35.129 attackspam
Unauthorized connection attempt from IP address 118.69.35.129 on Port 445(SMB)
2020-03-09 17:36:21
51.159.35.94 attackbots
Mar  9 08:41:56 *** sshd[11143]: Invalid user cpanelphppgadmin from 51.159.35.94
2020-03-09 17:54:47
180.176.177.21 attack
Port probing on unauthorized port 23
2020-03-09 17:35:22
14.162.124.199 attack
1583725562 - 03/09/2020 04:46:02 Host: 14.162.124.199/14.162.124.199 Port: 445 TCP Blocked
2020-03-09 18:09:45
192.145.239.217 attackspam
192.145.239.217 - - \[09/Mar/2020:06:13:54 +0100\] "POST /wp-login.php HTTP/1.1" 200 2100 "-" "-"
2020-03-09 18:10:39
118.173.134.31 attackspambots
Unauthorized connection attempt from IP address 118.173.134.31 on Port 445(SMB)
2020-03-09 18:06:55
192.184.46.240 attackbots
20/3/8@23:46:06: FAIL: Alarm-Intrusion address from=192.184.46.240
...
2020-03-09 18:04:49
117.4.104.38 attackspam
Unauthorized connection attempt from IP address 117.4.104.38 on Port 445(SMB)
2020-03-09 18:00:00
94.231.247.183 attackspam
Automatic report - Port Scan Attack
2020-03-09 17:47:52
210.56.28.219 attackbots
fail2ban
2020-03-09 17:37:20
218.161.56.136 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-09 18:01:57
41.40.62.5 attackspambots
Unauthorized connection attempt from IP address 41.40.62.5 on Port 445(SMB)
2020-03-09 17:57:32

最近上报的IP列表

128.199.208.120 141.163.238.55 116.203.73.29 1.192.241.147
49.160.215.240 154.193.11.30 150.11.202.171 106.119.251.11
137.156.79.21 252.236.78.117 166.57.78.2 198.185.199.151
130.201.232.229 31.51.107.226 115.49.83.120 167.172.77.61
167.172.77.16 117.138.44.42 13.95.101.155 122.238.69.134