必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.105.54.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.105.54.169.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 16:19:09 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
169.54.105.139.in-addr.arpa domain name pointer tietoevry-owned-address-139_105_54_x.hidden-host.tietoevry.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.54.105.139.in-addr.arpa	name = tietoevry-owned-address-139_105_54_x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.143.172.106 attack
Failed password for invalid user isup from 181.143.172.106 port 62801 ssh2
2020-07-12 19:21:33
37.98.75.217 attackspam
IP 37.98.75.217 attacked honeypot on port: 8080 at 7/11/2020 8:48:15 PM
2020-07-12 18:49:27
203.56.24.180 attackspambots
Triggered by Fail2Ban at Ares web server
2020-07-12 19:09:36
93.64.5.34 attack
Jul 12 05:32:21 web8 sshd\[6277\]: Invalid user lisirui from 93.64.5.34
Jul 12 05:32:21 web8 sshd\[6277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34
Jul 12 05:32:23 web8 sshd\[6277\]: Failed password for invalid user lisirui from 93.64.5.34 port 38444 ssh2
Jul 12 05:35:29 web8 sshd\[8067\]: Invalid user flavio from 93.64.5.34
Jul 12 05:35:29 web8 sshd\[8067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34
2020-07-12 19:16:31
191.8.94.237 attack
Jul 12 16:19:46 NG-HHDC-SVS-001 sshd[23790]: Invalid user default from 191.8.94.237
...
2020-07-12 19:06:33
185.210.218.206 attackspam
[2020-07-12 06:23:25] NOTICE[1150] chan_sip.c: Registration from '' failed for '185.210.218.206:53117' - Wrong password
[2020-07-12 06:23:25] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-12T06:23:25.291-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8264",SessionID="0x7fcb4c0dfe08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.210.218.206/53117",Challenge="037354be",ReceivedChallenge="037354be",ReceivedHash="914a2950916d17a2b44b12596b9787ee"
[2020-07-12 06:30:15] NOTICE[1150] chan_sip.c: Registration from '' failed for '185.210.218.206:61720' - Wrong password
[2020-07-12 06:30:15] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-12T06:30:15.750-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6035",SessionID="0x7fcb4c25c888",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.210
...
2020-07-12 19:11:27
222.186.180.130 attackspambots
Jul 12 12:57:09 santamaria sshd\[16873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jul 12 12:57:11 santamaria sshd\[16873\]: Failed password for root from 222.186.180.130 port 62132 ssh2
Jul 12 12:57:19 santamaria sshd\[16877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
...
2020-07-12 18:59:57
118.24.30.97 attackspambots
Jul 12 11:05:44 game-panel sshd[10386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.30.97
Jul 12 11:05:47 game-panel sshd[10386]: Failed password for invalid user prometheus from 118.24.30.97 port 36008 ssh2
Jul 12 11:12:55 game-panel sshd[10846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.30.97
2020-07-12 19:26:09
35.62.6.159 attackbotsspam
 UDP 35.62.6.159:8080 -> port 161, len 85
2020-07-12 18:58:28
139.59.4.200 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-12 19:17:57
186.206.139.166 attackspambots
$f2bV_matches
2020-07-12 18:57:56
106.13.71.1 attackspam
Jul 12 12:55:47 nextcloud sshd\[27187\]: Invalid user airflow from 106.13.71.1
Jul 12 12:55:47 nextcloud sshd\[27187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.71.1
Jul 12 12:55:49 nextcloud sshd\[27187\]: Failed password for invalid user airflow from 106.13.71.1 port 51764 ssh2
2020-07-12 19:27:15
23.252.141.250 attack
Automatic report - Banned IP Access
2020-07-12 19:18:27
203.143.20.89 attackbotsspam
Jul  9 00:29:51 pl1server sshd[16964]: Invalid user wcm from 203.143.20.89 port 47984
Jul  9 00:29:51 pl1server sshd[16964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.20.89
Jul  9 00:29:54 pl1server sshd[16964]: Failed password for invalid user wcm from 203.143.20.89 port 47984 ssh2
Jul  9 00:29:54 pl1server sshd[16964]: Received disconnect from 203.143.20.89 port 47984:11: Bye Bye [preauth]
Jul  9 00:29:54 pl1server sshd[16964]: Disconnected from 203.143.20.89 port 47984 [preauth]
Jul  9 00:48:39 pl1server sshd[19776]: Invalid user adminixxxr from 203.143.20.89 port 33848
Jul  9 00:48:39 pl1server sshd[19776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.20.89
Jul  9 00:48:41 pl1server sshd[19776]: Failed password for invalid user adminixxxr from 203.143.20.89 port 33848 ssh2
Jul  9 00:48:41 pl1server sshd[19776]: Received disconnect from 203.143.20.89 port 33848:11........
-------------------------------
2020-07-12 19:14:33
103.66.79.93 attack
1594525667 - 07/12/2020 05:47:47 Host: 103.66.79.93/103.66.79.93 Port: 445 TCP Blocked
2020-07-12 19:21:58

最近上报的IP列表

1.67.192.129 237.31.149.187 228.238.18.187 191.3.119.76
225.68.99.174 195.69.160.96 172.238.223.7 104.93.179.39
142.126.37.99 123.226.143.193 106.235.109.12 17.100.236.140
133.133.14.195 165.64.94.6 0.235.230.158 237.46.73.208
187.111.82.5 15.198.102.76 220.210.64.252 174.74.74.103