必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.119.24.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.119.24.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:30:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
220.24.119.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-119-24-x.hidden-host.tietoevry.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.24.119.139.in-addr.arpa	name = tietoevry-owned-address-139-119-24-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.73.183.169 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-08-01 04:53:57
185.143.221.186 attackspambots
31.07.2019 20:39:13 Connection to port 3239 blocked by firewall
2019-08-01 05:43:18
106.12.176.3 attackspam
Jul 31 22:56:51 minden010 sshd[13258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3
Jul 31 22:56:53 minden010 sshd[13258]: Failed password for invalid user ubuntu from 106.12.176.3 port 40382 ssh2
Jul 31 23:01:12 minden010 sshd[14801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3
...
2019-08-01 05:07:41
1.217.98.44 attackbots
Jul 31 21:42:16 ks10 sshd[10025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.217.98.44 
Jul 31 21:42:19 ks10 sshd[10025]: Failed password for invalid user pava from 1.217.98.44 port 33410 ssh2
...
2019-08-01 05:27:50
106.52.116.101 attackbotsspam
2019-07-31T21:07:19.306660lon01.zurich-datacenter.net sshd\[30544\]: Invalid user lynda from 106.52.116.101 port 22235
2019-07-31T21:07:19.312549lon01.zurich-datacenter.net sshd\[30544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.116.101
2019-07-31T21:07:21.543124lon01.zurich-datacenter.net sshd\[30544\]: Failed password for invalid user lynda from 106.52.116.101 port 22235 ssh2
2019-07-31T21:10:28.418909lon01.zurich-datacenter.net sshd\[30598\]: Invalid user amt from 106.52.116.101 port 52769
2019-07-31T21:10:28.427350lon01.zurich-datacenter.net sshd\[30598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.116.101
...
2019-08-01 04:52:58
81.22.45.54 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-08-01 05:16:28
91.236.116.89 attackspambots
Jul 31 23:15:17 piServer sshd\[28726\]: Invalid user 0 from 91.236.116.89 port 20369
Jul 31 23:15:17 piServer sshd\[28726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.236.116.89
Jul 31 23:15:19 piServer sshd\[28726\]: Failed password for invalid user 0 from 91.236.116.89 port 20369 ssh2
Jul 31 23:15:20 piServer sshd\[28733\]: Invalid user 22 from 91.236.116.89 port 27066
Jul 31 23:15:20 piServer sshd\[28733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.236.116.89
...
2019-08-01 05:42:29
115.76.79.217 attack
Automatic report - Port Scan Attack
2019-08-01 05:21:58
119.81.39.105 attack
Port scan on 1 port(s): 111
2019-08-01 05:04:11
89.65.17.100 attack
Jul 31 20:03:21 MK-Soft-VM4 sshd\[10962\]: Invalid user Ken from 89.65.17.100 port 59187
Jul 31 20:03:21 MK-Soft-VM4 sshd\[10962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.65.17.100
Jul 31 20:03:23 MK-Soft-VM4 sshd\[10962\]: Failed password for invalid user Ken from 89.65.17.100 port 59187 ssh2
...
2019-08-01 05:08:24
178.128.158.199 attack
Jul 31 17:44:50 ghostname-secure sshd[4775]: Failed password for invalid user wangyi from 178.128.158.199 port 37040 ssh2
Jul 31 17:44:50 ghostname-secure sshd[4775]: Received disconnect from 178.128.158.199: 11: Bye Bye [preauth]
Jul 31 17:50:15 ghostname-secure sshd[4821]: Failed password for invalid user bj from 178.128.158.199 port 48076 ssh2
Jul 31 17:50:15 ghostname-secure sshd[4821]: Received disconnect from 178.128.158.199: 11: Bye Bye [preauth]
Jul 31 17:54:25 ghostname-secure sshd[4870]: Failed password for daemon from 178.128.158.199 port 44886 ssh2
Jul 31 17:54:25 ghostname-secure sshd[4870]: Received disconnect from 178.128.158.199: 11: Bye Bye [preauth]
Jul 31 17:58:35 ghostname-secure sshd[4914]: Failed password for invalid user ct from 178.128.158.199 port 41918 ssh2
Jul 31 17:58:35 ghostname-secure sshd[4914]: Received disconnect from 178.128.158.199: 11: Bye Bye [preauth]
Jul 31 18:02:44 ghostname-secure sshd[4936]: Failed password for invalid user web........
-------------------------------
2019-08-01 05:23:29
119.196.83.26 attackspam
Jul 31 20:47:03 [munged] sshd[30817]: Invalid user pd from 119.196.83.26 port 38462
Jul 31 20:47:03 [munged] sshd[30817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.83.26
2019-08-01 05:25:44
123.207.86.68 attackbotsspam
Jul 31 20:55:15 localhost sshd\[1524\]: Invalid user nagios from 123.207.86.68 port 41232
Jul 31 20:55:15 localhost sshd\[1524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.86.68
...
2019-08-01 05:07:18
36.189.253.226 attackspam
Jul 31 21:11:34 OPSO sshd\[20426\]: Invalid user unix from 36.189.253.226 port 49364
Jul 31 21:11:34 OPSO sshd\[20426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226
Jul 31 21:11:36 OPSO sshd\[20426\]: Failed password for invalid user unix from 36.189.253.226 port 49364 ssh2
Jul 31 21:12:43 OPSO sshd\[20611\]: Invalid user jean from 36.189.253.226 port 55114
Jul 31 21:12:43 OPSO sshd\[20611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226
2019-08-01 05:10:21
134.209.106.112 attackspam
Jul 11 20:41:17 server sshd\[102696\]: Invalid user host from 134.209.106.112
Jul 11 20:41:17 server sshd\[102696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.106.112
Jul 11 20:41:20 server sshd\[102696\]: Failed password for invalid user host from 134.209.106.112 port 42718 ssh2
...
2019-08-01 05:06:49

最近上报的IP列表

162.187.229.21 56.9.141.195 98.147.34.137 98.68.132.60
241.140.241.94 196.58.226.136 17.41.179.254 252.191.185.42
197.44.186.53 18.119.232.136 206.123.4.247 143.31.208.223
51.151.3.27 4.37.114.156 187.104.213.33 85.78.142.229
128.221.0.179 28.239.224.179 122.30.248.139 78.241.219.167