必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.112.206.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.112.206.155.		IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010401 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 05 03:51:46 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 155.206.112.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 155.206.112.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.186.118.82 attackbotsspam
Automatic report - Port Scan Attack
2019-08-21 23:49:17
181.31.134.69 attack
Aug 21 06:16:24 hiderm sshd\[15839\]: Invalid user user from 181.31.134.69
Aug 21 06:16:24 hiderm sshd\[15839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.31.134.69
Aug 21 06:16:26 hiderm sshd\[15839\]: Failed password for invalid user user from 181.31.134.69 port 38996 ssh2
Aug 21 06:22:04 hiderm sshd\[16289\]: Invalid user ethereal from 181.31.134.69
Aug 21 06:22:04 hiderm sshd\[16289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.31.134.69
2019-08-22 00:30:05
51.255.174.215 attack
Aug 21 18:03:22 vmd17057 sshd\[14659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.174.215  user=root
Aug 21 18:03:24 vmd17057 sshd\[14659\]: Failed password for root from 51.255.174.215 port 43146 ssh2
Aug 21 18:08:11 vmd17057 sshd\[15521\]: Invalid user dan from 51.255.174.215 port 36692
...
2019-08-22 00:08:16
18.188.208.229 attack
Aug 21 17:32:59 root sshd[13261]: Failed password for sys from 18.188.208.229 port 35312 ssh2
Aug 21 17:48:23 root sshd[13446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.188.208.229 
Aug 21 17:48:25 root sshd[13446]: Failed password for invalid user lt from 18.188.208.229 port 54886 ssh2
...
2019-08-22 00:22:48
117.48.202.15 attackspam
Aug 21 17:45:20 legacy sshd[27746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.202.15
Aug 21 17:45:22 legacy sshd[27746]: Failed password for invalid user dev from 117.48.202.15 port 47386 ssh2
Aug 21 17:52:33 legacy sshd[28061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.202.15
...
2019-08-22 00:00:40
140.143.80.138 attackbotsspam
Aug 21 18:16:13 server sshd\[22709\]: Invalid user devol from 140.143.80.138 port 54760
Aug 21 18:16:14 server sshd\[22709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.80.138
Aug 21 18:16:15 server sshd\[22709\]: Failed password for invalid user devol from 140.143.80.138 port 54760 ssh2
Aug 21 18:22:19 server sshd\[13774\]: Invalid user ra from 140.143.80.138 port 41100
Aug 21 18:22:19 server sshd\[13774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.80.138
2019-08-21 23:53:38
217.182.186.227 attackbots
Aug 21 10:32:38 zn013 sshd[21054]: Invalid user oracle from 217.182.186.227
Aug 21 10:32:41 zn013 sshd[21054]: Failed password for invalid user oracle from 217.182.186.227 port 39012 ssh2
Aug 21 10:32:41 zn013 sshd[21054]: Received disconnect from 217.182.186.227: 11: Bye Bye [preauth]
Aug 21 10:46:21 zn013 sshd[21457]: Invalid user ark from 217.182.186.227
Aug 21 10:46:23 zn013 sshd[21457]: Failed password for invalid user ark from 217.182.186.227 port 56846 ssh2
Aug 21 10:46:23 zn013 sshd[21457]: Received disconnect from 217.182.186.227: 11: Bye Bye [preauth]
Aug 21 10:50:31 zn013 sshd[21531]: Invalid user hjz from 217.182.186.227
Aug 21 10:50:33 zn013 sshd[21531]: Failed password for invalid user hjz from 217.182.186.227 port 42030 ssh2
Aug 21 10:50:33 zn013 sshd[21531]: Received disconnect from 217.182.186.227: 11: Bye Bye [preauth]
Aug 21 10:55:03 zn013 sshd[21655]: Invalid user paulj from 217.182.186.227
Aug 21 10:55:05 zn013 sshd[21655]: Failed password for inval........
-------------------------------
2019-08-21 23:00:19
51.68.141.62 attack
Aug 21 16:49:48 srv-4 sshd\[12170\]: Invalid user system from 51.68.141.62
Aug 21 16:49:48 srv-4 sshd\[12170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.141.62
Aug 21 16:49:50 srv-4 sshd\[12170\]: Failed password for invalid user system from 51.68.141.62 port 39866 ssh2
...
2019-08-22 00:13:44
116.196.116.9 attack
Aug 21 14:02:34 dedicated sshd[22830]: Invalid user anne from 116.196.116.9 port 46724
2019-08-22 00:11:01
78.176.253.233 attackspambots
Automatic report - Port Scan Attack
2019-08-21 23:56:02
180.150.189.206 attackspambots
Repeated brute force against a port
2019-08-21 23:26:04
106.13.6.116 attackspambots
Aug 21 14:51:53 sshgateway sshd\[7281\]: Invalid user admin from 106.13.6.116
Aug 21 14:51:53 sshgateway sshd\[7281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Aug 21 14:51:55 sshgateway sshd\[7281\]: Failed password for invalid user admin from 106.13.6.116 port 38932 ssh2
2019-08-22 00:07:33
51.211.171.125 attack
RDP Bruteforce
2019-08-22 00:02:48
176.62.224.58 attack
Aug 21 16:45:13 www sshd\[15322\]: Invalid user ubuntu from 176.62.224.58Aug 21 16:45:15 www sshd\[15322\]: Failed password for invalid user ubuntu from 176.62.224.58 port 49292 ssh2Aug 21 16:49:27 www sshd\[15461\]: Failed password for root from 176.62.224.58 port 44094 ssh2
...
2019-08-21 23:15:30
119.28.62.90 attackbots
Unauthorised access (Aug 21) SRC=119.28.62.90 LEN=40 TOS=0x08 TTL=245 ID=12817 TCP DPT=445 WINDOW=1024 SYN
2019-08-21 23:59:38

最近上报的IP列表

25.228.182.205 41.255.204.49 227.94.64.120 58.143.31.176
194.175.126.150 121.207.39.221 35.205.223.214 133.114.115.193
153.181.11.168 183.225.206.103 45.33.59.87 168.181.65.220
99.212.100.36 114.35.153.15 124.50.179.236 160.14.116.160
49.91.232.211 241.43.131.7 119.199.132.108 65.162.159.135