必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.201.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24847
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.0.201.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 06 08:40:32 CST 2019
;; MSG SIZE  rcvd: 116

HOST信息:
29.201.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-201-29.fast.net.id.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
29.201.0.139.in-addr.arpa	name = fm-dyn-139-0-201-29.fast.net.id.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.49.117.166 attackbots
Aug 14 14:45:43 XXX sshd[6444]: Invalid user demuji from 181.49.117.166 port 42928
2019-08-15 02:28:26
87.67.201.6 attackbots
Unauthorised access (Aug 14) SRC=87.67.201.6 LEN=44 TOS=0x18 TTL=55 ID=9465 TCP DPT=8080 WINDOW=35552 SYN 
Unauthorised access (Aug 14) SRC=87.67.201.6 LEN=44 TOS=0x18 TTL=55 ID=5961 TCP DPT=8080 WINDOW=20479 SYN
2019-08-15 02:13:50
37.187.0.223 attackspam
Aug 14 13:25:41 plusreed sshd[22178]: Invalid user ashton from 37.187.0.223
...
2019-08-15 02:52:51
89.163.130.244 attack
[ssh] SSH attack
2019-08-15 02:43:29
157.230.128.195 attack
Splunk® : port scan detected:
Aug 14 12:54:48 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=157.230.128.195 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=16800 PROTO=TCP SPT=43262 DPT=931 WINDOW=1024 RES=0x00 SYN URGP=0
2019-08-15 02:01:14
177.135.43.127 attackbots
Automatic report - Port Scan Attack
2019-08-15 02:08:45
27.124.46.241 attackbotsspam
Unauthorised access (Aug 14) SRC=27.124.46.241 LEN=40 TTL=242 ID=11180 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Aug 13) SRC=27.124.46.241 LEN=40 TTL=242 ID=1426 TCP DPT=445 WINDOW=1024 SYN
2019-08-15 02:49:14
222.218.220.247 attackbots
ssh failed login
2019-08-15 02:11:46
182.18.208.27 attackspam
Aug 14 20:11:04 vps691689 sshd[25829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.18.208.27
Aug 14 20:11:06 vps691689 sshd[25829]: Failed password for invalid user app from 182.18.208.27 port 54954 ssh2
...
2019-08-15 02:18:48
202.29.236.131 attackspambots
Aug 14 21:29:47 server sshd\[6731\]: Invalid user testftp from 202.29.236.131 port 33864
Aug 14 21:29:47 server sshd\[6731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.236.131
Aug 14 21:29:48 server sshd\[6731\]: Failed password for invalid user testftp from 202.29.236.131 port 33864 ssh2
Aug 14 21:36:02 server sshd\[10388\]: Invalid user john from 202.29.236.131 port 54974
Aug 14 21:36:02 server sshd\[10388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.236.131
2019-08-15 02:39:16
134.209.59.66 attackbotsspam
Aug 15 00:48:49 lcl-usvr-02 sshd[6468]: Invalid user rotzloeffel from 134.209.59.66 port 60894
Aug 15 00:48:49 lcl-usvr-02 sshd[6468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.59.66
Aug 15 00:48:49 lcl-usvr-02 sshd[6468]: Invalid user rotzloeffel from 134.209.59.66 port 60894
Aug 15 00:48:51 lcl-usvr-02 sshd[6468]: Failed password for invalid user rotzloeffel from 134.209.59.66 port 60894 ssh2
Aug 15 00:53:15 lcl-usvr-02 sshd[7405]: Invalid user zxin10 from 134.209.59.66 port 53856
...
2019-08-15 02:21:56
165.22.64.118 attackspambots
Aug 14 12:57:57 localhost sshd\[8446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.64.118  user=root
Aug 14 12:57:59 localhost sshd\[8446\]: Failed password for root from 165.22.64.118 port 48722 ssh2
Aug 14 13:09:21 localhost sshd\[8656\]: Invalid user sansforensics from 165.22.64.118 port 55870
...
2019-08-15 01:58:40
194.204.208.10 attackspambots
Aug 14 14:46:18 XXX sshd[6463]: Invalid user mustafa from 194.204.208.10 port 42092
2019-08-15 02:21:22
201.251.10.200 attack
Aug 14 19:35:45 icinga sshd[32033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.251.10.200
Aug 14 19:35:46 icinga sshd[32033]: Failed password for invalid user okilab from 201.251.10.200 port 33258 ssh2
...
2019-08-15 02:45:13
79.20.189.147 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-15 02:20:08

最近上报的IP列表

210.16.103.21 23.248.219.69 37.193.112.91 101.203.175.192
59.124.94.145 175.126.166.140 185.148.243.15 91.200.225.194
191.222.1.58 121.201.67.79 116.122.36.90 13.75.45.53
4.71.194.130 181.210.247.33 239.147.157.34 111.68.98.169
74.212.155.201 201.144.53.210 152.169.184.117 122.156.17.255