必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Evry Norge As

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.108.1.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2221
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.108.1.107.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 21:58:12 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 107.1.108.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 107.1.108.139.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.222.93.91 attackbotsspam
SSH login attempts.
2020-06-19 12:22:32
185.243.30.186 attackbotsspam
2020-06-19 12:23:08
111.229.155.209 attackbots
SSH login attempts.
2020-06-19 12:15:16
209.85.146.27 attack
SSH login attempts.
2020-06-19 12:07:45
185.234.216.29 attackspambots
Jun 19 04:36:44 scw-focused-cartwright sshd[15649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.234.216.29
2020-06-19 12:40:25
36.81.19.84 attack
SSH login attempts.
2020-06-19 12:10:32
182.61.6.64 attack
Jun 18 21:11:25 dignus sshd[30318]: Failed password for invalid user concrete from 182.61.6.64 port 58016 ssh2
Jun 18 21:14:45 dignus sshd[30623]: Invalid user mega from 182.61.6.64 port 47282
Jun 18 21:14:45 dignus sshd[30623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.6.64
Jun 18 21:14:47 dignus sshd[30623]: Failed password for invalid user mega from 182.61.6.64 port 47282 ssh2
Jun 18 21:18:05 dignus sshd[30958]: Invalid user admin from 182.61.6.64 port 36546
...
2020-06-19 12:19:55
193.147.162.169 attack
SSH login attempts.
2020-06-19 12:29:03
134.209.102.196 attackbots
Jun 19 05:58:12 vmd48417 sshd[27819]: Failed password for root from 134.209.102.196 port 55742 ssh2
2020-06-19 12:16:59
216.250.190.160 attackspambots
SSH login attempts.
2020-06-19 12:18:45
184.168.131.241 attackspam
SSH login attempts.
2020-06-19 12:25:19
54.81.4.123 attackbotsspam
Jun 19 06:35:43 * sshd[8225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.81.4.123
Jun 19 06:35:45 * sshd[8225]: Failed password for invalid user customer from 54.81.4.123 port 57138 ssh2
2020-06-19 12:46:48
37.218.254.106 attack
SSH login attempts.
2020-06-19 12:24:49
200.146.75.58 attackbotsspam
Jun 19 06:01:16 ncomp sshd[31519]: Invalid user bis from 200.146.75.58
Jun 19 06:01:16 ncomp sshd[31519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.75.58
Jun 19 06:01:16 ncomp sshd[31519]: Invalid user bis from 200.146.75.58
Jun 19 06:01:18 ncomp sshd[31519]: Failed password for invalid user bis from 200.146.75.58 port 48496 ssh2
2020-06-19 12:28:39
184.83.43.197 attack
Brute forcing email accounts
2020-06-19 12:42:48

最近上报的IP列表

38.118.232.94 102.49.114.242 74.245.85.179 194.85.93.190
153.205.166.253 221.14.192.75 122.32.237.193 155.253.240.99
122.223.180.0 79.8.3.31 159.201.67.230 111.1.5.55
179.133.50.49 118.100.224.97 95.46.44.193 146.118.18.159
171.38.93.151 170.183.24.47 146.174.153.143 190.175.19.42