必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.110.121.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.110.121.217.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:34:06 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
217.121.110.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-110-121-x.hidden-host.tietoevry.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.121.110.139.in-addr.arpa	name = tietoevry-owned-address-139-110-121-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.67.240.217 attackspambots
Apr 26 18:50:28 ws25vmsma01 sshd[207210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.67.240.217
Apr 26 18:50:30 ws25vmsma01 sshd[207210]: Failed password for invalid user dls from 177.67.240.217 port 53821 ssh2
...
2020-04-27 03:04:39
165.22.54.171 attackspambots
Invalid user mind from 165.22.54.171 port 46726
2020-04-27 03:37:04
181.97.223.175 attackbots
Invalid user admin from 181.97.223.175 port 46449
2020-04-27 03:33:09
192.210.192.165 attackbotsspam
*Port Scan* detected from 192.210.192.165 (US/United States/California/Los Angeles (Downtown)/host.colocrossing.com). 4 hits in the last 116 seconds
2020-04-27 03:29:32
187.188.90.141 attack
Apr 26 16:50:58 sshgateway sshd\[11024\]: Invalid user pdf from 187.188.90.141
Apr 26 16:50:58 sshgateway sshd\[11024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-90-141.totalplay.net
Apr 26 16:51:01 sshgateway sshd\[11024\]: Failed password for invalid user pdf from 187.188.90.141 port 58592 ssh2
2020-04-27 03:31:26
90.180.92.121 attackspam
SSH brute-force attempt
2020-04-27 03:20:28
103.78.209.204 attack
no
2020-04-27 03:19:23
182.74.25.246 attackspambots
2020-04-26T21:20:39.472227vps751288.ovh.net sshd\[584\]: Invalid user openlava from 182.74.25.246 port 37879
2020-04-26T21:20:39.480792vps751288.ovh.net sshd\[584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246
2020-04-26T21:20:41.306424vps751288.ovh.net sshd\[584\]: Failed password for invalid user openlava from 182.74.25.246 port 37879 ssh2
2020-04-26T21:27:20.264448vps751288.ovh.net sshd\[630\]: Invalid user testuser from 182.74.25.246 port 63196
2020-04-26T21:27:20.272397vps751288.ovh.net sshd\[630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246
2020-04-27 03:32:13
138.197.89.212 attackspambots
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-27 03:08:39
165.22.63.73 attackspam
Invalid user remi from 165.22.63.73 port 44532
2020-04-27 03:06:10
188.254.0.182 attackbots
Apr 26 14:46:58 lock-38 sshd[1566849]: Failed password for invalid user jaguar from 188.254.0.182 port 50122 ssh2
Apr 26 14:46:59 lock-38 sshd[1566849]: Disconnected from invalid user jaguar 188.254.0.182 port 50122 [preauth]
Apr 26 14:55:05 lock-38 sshd[1567097]: Invalid user test from 188.254.0.182 port 32864
Apr 26 14:55:05 lock-38 sshd[1567097]: Invalid user test from 188.254.0.182 port 32864
Apr 26 14:55:05 lock-38 sshd[1567097]: Failed password for invalid user test from 188.254.0.182 port 32864 ssh2
...
2020-04-27 03:02:58
62.171.154.89 attackspam
Apr 26 21:02:56 xeon sshd[34232]: Failed password for invalid user chiudi from 62.171.154.89 port 54026 ssh2
2020-04-27 03:23:19
106.13.195.172 attackspambots
Apr 26 18:56:26 h2829583 sshd[25152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.195.172
Apr 26 18:56:28 h2829583 sshd[25152]: Failed password for invalid user ann from 106.13.195.172 port 33588 ssh2
2020-04-27 03:15:23
145.239.198.218 attackspam
SSH Bruteforce attack
2020-04-27 03:07:11
178.33.67.12 attack
Repeated brute force against a port
2020-04-27 03:35:11

最近上报的IP列表

149.250.92.108 109.219.94.88 104.213.116.137 231.101.203.150
204.150.49.136 35.21.41.27 57.39.37.88 156.164.239.218
78.202.186.213 213.114.199.255 15.195.2.125 67.227.192.214
146.122.173.12 248.83.148.132 232.104.93.30 138.115.73.2
147.2.14.180 98.221.98.166 181.43.237.231 132.211.72.238