必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lahore

省份(region): Punjab

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.135.41.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.135.41.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101001 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 11 16:30:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 109.41.135.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.41.135.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
72.208.216.150 attack
[Tue Feb 11 23:27:28 2020] [error] [client 72.208.216.150] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /
2020-02-13 01:26:50
91.217.197.176 attackspambots
[Tue Feb 11 13:04:48 2020] [error] [client 91.217.197.176] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /
2020-02-13 01:36:05
86.11.179.221 attackspambots
[Mon Feb 10 10:38:48 2020] [error] [client 86.11.179.221] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /
2020-02-13 01:45:13
221.181.197.226 attackbots
Feb 12 18:38:37 legacy sshd[11795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.181.197.226
Feb 12 18:38:39 legacy sshd[11795]: Failed password for invalid user tempuser from 221.181.197.226 port 45482 ssh2
Feb 12 18:43:18 legacy sshd[12108]: Failed password for root from 221.181.197.226 port 38686 ssh2
...
2020-02-13 01:58:16
222.186.52.139 attackspambots
02/12/2020-12:19:08.431659 222.186.52.139 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-13 01:24:53
185.176.27.254 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 28895 proto: TCP cat: Misc Attack
2020-02-13 02:03:38
138.197.147.128 attack
Feb 12 15:37:07 * sshd[26847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128
Feb 12 15:37:09 * sshd[26847]: Failed password for invalid user sharyl from 138.197.147.128 port 48610 ssh2
2020-02-13 01:31:31
198.199.100.5 attack
Feb 12 09:01:01 plusreed sshd[22468]: Invalid user ieee from 198.199.100.5
...
2020-02-13 01:28:03
157.230.231.39 attackbots
Feb 12 17:24:23 web8 sshd\[10793\]: Invalid user webadmin from 157.230.231.39
Feb 12 17:24:23 web8 sshd\[10793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39
Feb 12 17:24:25 web8 sshd\[10793\]: Failed password for invalid user webadmin from 157.230.231.39 port 54352 ssh2
Feb 12 17:26:43 web8 sshd\[11867\]: Invalid user test from 157.230.231.39
Feb 12 17:26:43 web8 sshd\[11867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39
2020-02-13 01:36:36
105.154.74.152 attackspambots
[Tue Feb 11 11:40:48 2020] [error] [client 105.154.74.152] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /
2020-02-13 01:38:37
77.68.81.58 attackspam
Brute forcing email accounts
2020-02-13 02:05:17
41.89.105.17 attackspambots
Automatic report - Port Scan
2020-02-13 01:40:28
178.161.203.128 attack
Feb 12 19:19:36 tuotantolaitos sshd[23469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.161.203.128
Feb 12 19:19:38 tuotantolaitos sshd[23469]: Failed password for invalid user dagger from 178.161.203.128 port 58126 ssh2
...
2020-02-13 02:06:49
45.234.116.2 attackbots
Received: from maerskline.com (45.234.116.2) Wed, 12 Feb 2020 14:23:07
From: Maersk Notification 
To: <>
Subject: Maersk : Arrival Notice ready for Bill of Lading 969812227
Date: Wed, 12 Feb 2020 11:21:29 -0300
Message-ID: <20200212112129@maerskline.com>
Return-Path: notification@maerskline.com
X-MS-Exchange-Organization-PRD: maerskline.com
Received-SPF: SoftFail (domain of transitioning notification@maerskline.com discourages use of 45.234.116.2 as permitted sender)
OrigIP:45.234.116.2
2020-02-13 01:47:19
66.240.192.138 attack
Automatic report - Banned IP Access
2020-02-13 01:53:59

最近上报的IP列表

79.124.40.174 46.137.6.119 87.120.191.91 87.120.191.90
54.217.246.147 113.215.188.91 14.212.75.75 93.123.109.25
2409:895a:1849:2cd3:e154:1e2c:e5b4:f5d9 2409:8459:1910:1927:b967:c00b:9282:cfc6 240e:3b1:1900:2c50:87b0:eaac:1824:b755 183.1.88.110
111.0.143.121 111.177.170.105 111.177.170.95 111.177.170.167
111.177.170.185 110.18.101.91 185.235.63.185 66.249.76.73