必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.117.237.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.117.237.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:41:43 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
41.237.117.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-117-237-x.hidden-host.tietoevry.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.237.117.139.in-addr.arpa	name = tietoevry-owned-address-139-117-237-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.201.67.60 attackbotsspam
1433/tcp 445/tcp...
[2020-05-29/06-22]4pkt,2pt.(tcp)
2020-06-22 19:54:12
211.116.234.149 attack
$f2bV_matches
2020-06-22 19:50:01
180.153.71.134 attackbotsspam
3366/tcp
[2020-06-22]1pkt
2020-06-22 19:38:13
103.76.26.106 attackspam
20/6/21@23:47:35: FAIL: Alarm-Network address from=103.76.26.106
20/6/21@23:47:35: FAIL: Alarm-Network address from=103.76.26.106
...
2020-06-22 19:46:48
178.210.174.186 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-22 19:52:13
111.72.196.104 attack
Jun 22 05:46:45 srv01 postfix/smtpd\[1066\]: warning: unknown\[111.72.196.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 05:46:56 srv01 postfix/smtpd\[1066\]: warning: unknown\[111.72.196.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 05:47:13 srv01 postfix/smtpd\[1066\]: warning: unknown\[111.72.196.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 05:47:32 srv01 postfix/smtpd\[1066\]: warning: unknown\[111.72.196.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 05:47:45 srv01 postfix/smtpd\[1066\]: warning: unknown\[111.72.196.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-22 19:37:05
222.186.180.223 attackspambots
Jun 22 13:55:59 abendstille sshd\[21390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Jun 22 13:56:01 abendstille sshd\[21390\]: Failed password for root from 222.186.180.223 port 46378 ssh2
Jun 22 13:56:04 abendstille sshd\[21390\]: Failed password for root from 222.186.180.223 port 46378 ssh2
Jun 22 13:56:07 abendstille sshd\[21390\]: Failed password for root from 222.186.180.223 port 46378 ssh2
Jun 22 13:56:10 abendstille sshd\[21390\]: Failed password for root from 222.186.180.223 port 46378 ssh2
...
2020-06-22 20:00:06
198.98.61.68 attackbots
Jun 22 00:07:52 web9 sshd\[23839\]: Invalid user mauro from 198.98.61.68
Jun 22 00:07:52 web9 sshd\[23839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.61.68
Jun 22 00:07:54 web9 sshd\[23839\]: Failed password for invalid user mauro from 198.98.61.68 port 57548 ssh2
Jun 22 00:13:19 web9 sshd\[24490\]: Invalid user ubuntu from 198.98.61.68
Jun 22 00:13:19 web9 sshd\[24490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.61.68
2020-06-22 19:34:26
136.49.109.217 attack
Fail2Ban Ban Triggered
2020-06-22 20:01:41
200.41.199.250 attackbotsspam
Jun 22 14:03:53 eventyay sshd[21140]: Failed password for root from 200.41.199.250 port 35612 ssh2
Jun 22 14:08:15 eventyay sshd[21297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.199.250
Jun 22 14:08:17 eventyay sshd[21297]: Failed password for invalid user ki from 200.41.199.250 port 37136 ssh2
...
2020-06-22 20:14:53
186.67.27.174 attackspambots
Jun 22 14:04:19 eventyay sshd[21149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.27.174
Jun 22 14:04:21 eventyay sshd[21149]: Failed password for invalid user user from 186.67.27.174 port 42058 ssh2
Jun 22 14:08:46 eventyay sshd[21320]: Failed password for root from 186.67.27.174 port 43686 ssh2
...
2020-06-22 20:09:38
212.70.149.50 attackbotsspam
Jun 22 14:09:09 webserver postfix/smtpd\[1947\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:09:41 webserver postfix/smtpd\[1979\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:10:12 webserver postfix/smtpd\[1947\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:10:43 webserver postfix/smtpd\[1947\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:11:15 webserver postfix/smtpd\[1979\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-22 20:10:34
207.248.111.92 attack
(smtpauth) Failed SMTP AUTH login from 207.248.111.92 (MX/Mexico/dhcp-207.248.111.92.redes.rcm.net.mx): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-22 08:17:17 plain authenticator failed for ([207.248.111.92]) [207.248.111.92]: 535 Incorrect authentication data (set_id=phtd)
2020-06-22 19:57:35
114.135.73.54 attackspambots
06/21/2020-23:47:20.642970 114.135.73.54 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-22 20:07:41
64.227.79.125 attack
Jun 22 11:13:32 eventyay sshd[16222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.79.125
Jun 22 11:13:34 eventyay sshd[16222]: Failed password for invalid user fedora from 64.227.79.125 port 36764 ssh2
Jun 22 11:16:26 eventyay sshd[16305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.79.125
...
2020-06-22 19:41:02

最近上报的IP列表

242.215.195.83 220.126.32.119 14.7.65.43 27.118.250.66
218.159.142.65 48.119.79.69 115.165.168.60 57.157.97.165
73.129.154.253 134.18.36.33 254.225.62.35 226.139.182.27
190.127.73.153 233.208.155.130 129.96.75.113 196.255.47.5
249.163.101.211 35.228.141.55 198.206.75.197 220.59.69.157