必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.18.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24083
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.118.18.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:42:19 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
113.18.118.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-118-18-x.hidden-host.tietoevry.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.18.118.139.in-addr.arpa	name = tietoevry-owned-address-139-118-18-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.119.81.50 attackbotsspam
Automatic report - Banned IP Access
2019-08-10 09:25:02
129.211.106.144 attack
Brute force SMTP login attempted.
...
2019-08-10 09:04:26
177.153.28.63 attackbots
namecheap spam
2019-08-10 08:49:17
101.95.105.74 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-10 08:50:49
129.211.121.155 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 09:01:26
89.248.171.174 attack
Automatic report - Banned IP Access
2019-08-10 08:41:23
77.158.196.146 attackspam
RDP Bruteforce
2019-08-10 08:51:16
129.211.132.124 attackspam
Brute force SMTP login attempted.
...
2019-08-10 09:00:36
187.189.74.203 attackspambots
Mail sent to address hacked/leaked from Last.fm
2019-08-10 08:44:52
37.191.206.219 attackspam
Honeypot attack, port: 5555, PTR: host-37-191-206-219.lynet.no.
2019-08-10 08:57:42
106.75.103.35 attackbotsspam
Aug  9 23:37:56 vps691689 sshd[27055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35
Aug  9 23:37:58 vps691689 sshd[27055]: Failed password for invalid user git from 106.75.103.35 port 53232 ssh2
...
2019-08-10 08:53:02
46.105.157.97 attack
Aug 10 02:55:28 vps647732 sshd[26014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.157.97
Aug 10 02:55:30 vps647732 sshd[26014]: Failed password for invalid user pgsql from 46.105.157.97 port 51591 ssh2
...
2019-08-10 09:16:53
106.13.117.96 attack
Aug  9 20:29:56 [host] sshd[29702]: Invalid user postgres from 106.13.117.96
Aug  9 20:29:56 [host] sshd[29702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.96
Aug  9 20:29:57 [host] sshd[29702]: Failed password for invalid user postgres from 106.13.117.96 port 44876 ssh2
2019-08-10 09:17:43
188.131.140.115 attack
Aug  9 23:49:43 localhost sshd\[4454\]: Invalid user zimbra from 188.131.140.115 port 48126
Aug  9 23:49:43 localhost sshd\[4454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.140.115
Aug  9 23:49:45 localhost sshd\[4454\]: Failed password for invalid user zimbra from 188.131.140.115 port 48126 ssh2
Aug  9 23:58:27 localhost sshd\[4657\]: Invalid user andreia from 188.131.140.115 port 36700
Aug  9 23:58:27 localhost sshd\[4657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.140.115
...
2019-08-10 09:22:30
129.204.52.150 attack
Brute force SMTP login attempted.
...
2019-08-10 09:15:09

最近上报的IP列表

223.253.98.125 47.80.78.198 214.97.121.83 232.159.88.17
18.12.91.49 81.68.125.95 109.138.96.9 87.230.241.9
211.5.46.120 134.188.90.176 145.3.15.132 70.135.109.175
140.245.183.232 200.37.21.211 193.155.188.57 81.217.189.14
41.73.185.165 71.57.218.241 36.85.154.185 74.80.175.237