必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.129.146.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.129.146.213.		IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:32:35 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 213.146.129.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.146.129.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.65.182.29 attackbotsspam
Sep 16 08:40:17 web8 sshd\[21864\]: Invalid user ibmuser from 103.65.182.29
Sep 16 08:40:17 web8 sshd\[21864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.65.182.29
Sep 16 08:40:18 web8 sshd\[21864\]: Failed password for invalid user ibmuser from 103.65.182.29 port 47981 ssh2
Sep 16 08:45:40 web8 sshd\[24599\]: Invalid user sshvpn from 103.65.182.29
Sep 16 08:45:40 web8 sshd\[24599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.65.182.29
2019-09-16 16:50:05
202.101.194.242 attackspam
SMB Server BruteForce Attack
2019-09-16 17:02:37
213.152.162.181 attackspambots
Unauthorized IMAP connection attempt
2019-09-16 17:12:09
208.187.166.181 attackbots
Sep 16 09:41:56 srv1 postfix/smtpd[29605]: connect from vest.onvacationnow.com[208.187.166.181]
Sep 16 09:41:59 srv1 postfix/smtpd[28416]: connect from vest.onvacationnow.com[208.187.166.181]
Sep 16 09:42:11 srv1 postfix/smtpd[30967]: connect from vest.onvacationnow.com[208.187.166.181]
Sep x@x
Sep x@x
Sep 16 09:42:21 srv1 postfix/smtpd[29605]: disconnect from vest.onvacationnow.com[208.187.166.181]
Sep 16 09:42:21 srv1 postfix/smtpd[28416]: disconnect from vest.onvacationnow.com[208.187.166.181]
Sep x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=208.187.166.181
2019-09-16 17:13:58
61.244.186.37 attack
Sep 16 10:25:18 MainVPS sshd[3323]: Invalid user nanamiya from 61.244.186.37 port 40362
Sep 16 10:25:18 MainVPS sshd[3323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.244.186.37
Sep 16 10:25:18 MainVPS sshd[3323]: Invalid user nanamiya from 61.244.186.37 port 40362
Sep 16 10:25:20 MainVPS sshd[3323]: Failed password for invalid user nanamiya from 61.244.186.37 port 40362 ssh2
Sep 16 10:29:25 MainVPS sshd[3592]: Invalid user admin from 61.244.186.37 port 33439
...
2019-09-16 17:01:17
41.218.205.36 attack
Sep 16 04:21:07 master sshd[25930]: Failed password for invalid user admin from 41.218.205.36 port 48810 ssh2
2019-09-16 17:12:59
95.54.168.243 attackspam
Sep 16 04:21:01 master sshd[25928]: Failed password for invalid user admin from 95.54.168.243 port 50003 ssh2
2019-09-16 17:14:44
94.41.222.39 attackbots
Sep 15 22:24:48 aiointranet sshd\[4596\]: Invalid user allison from 94.41.222.39
Sep 15 22:24:48 aiointranet sshd\[4596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.41.222.39.dynamic.ufanet.ru
Sep 15 22:24:50 aiointranet sshd\[4596\]: Failed password for invalid user allison from 94.41.222.39 port 40874 ssh2
Sep 15 22:29:45 aiointranet sshd\[4955\]: Invalid user test from 94.41.222.39
Sep 15 22:29:45 aiointranet sshd\[4955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.41.222.39.dynamic.ufanet.ru
2019-09-16 16:48:36
94.177.229.191 attackbots
Sep 15 22:42:01 lcprod sshd\[1637\]: Invalid user 12345 from 94.177.229.191
Sep 15 22:42:01 lcprod sshd\[1637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.229.191
Sep 15 22:42:04 lcprod sshd\[1637\]: Failed password for invalid user 12345 from 94.177.229.191 port 38334 ssh2
Sep 15 22:46:13 lcprod sshd\[2006\]: Invalid user yy from 94.177.229.191
Sep 15 22:46:13 lcprod sshd\[2006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.229.191
2019-09-16 16:53:08
35.205.119.6 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/35.205.119.6/ 
 US - 1H : (233)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN15169 
 
 IP : 35.205.119.6 
 
 CIDR : 35.204.0.0/15 
 
 PREFIX COUNT : 602 
 
 UNIQUE IP COUNT : 8951808 
 
 
 WYKRYTE ATAKI Z ASN15169 :  
  1H - 4 
  3H - 4 
  6H - 5 
 12H - 13 
 24H - 19 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-16 17:26:41
190.206.61.222 attack
Honeypot attack, port: 23, PTR: 190-206-61-222.dyn.dsl.cantv.net.
2019-09-16 17:30:08
104.244.72.98 attackspambots
rain
2019-09-16 17:26:11
106.12.178.127 attackspam
Sep 16 11:49:12 server sshd\[30364\]: Invalid user john@123 from 106.12.178.127 port 59844
Sep 16 11:49:12 server sshd\[30364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.127
Sep 16 11:49:14 server sshd\[30364\]: Failed password for invalid user john@123 from 106.12.178.127 port 59844 ssh2
Sep 16 11:53:59 server sshd\[11452\]: Invalid user graphics123 from 106.12.178.127 port 45058
Sep 16 11:53:59 server sshd\[11452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.127
2019-09-16 16:56:45
202.186.68.31 attackspambots
C2,WP GET /wp-login.php
2019-09-16 16:56:13
113.1.153.16 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-16 17:21:57

最近上报的IP列表

139.129.146.4 139.129.146.37 139.129.147.113 139.129.146.72
139.129.147.20 139.129.147.212 139.129.147.57 139.129.146.8
139.129.147.49 139.129.147.82 139.129.146.82 139.129.148.33
139.129.148.54 139.129.148.55 139.129.148.66 139.129.150.130
139.129.152.104 139.129.149.152 139.129.148.74 139.129.150.162