必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.136.122.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.136.122.129.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 12:50:42 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 129.122.136.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.122.136.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.157.114 attackspambots
ssh brute force
2020-05-06 16:19:15
180.168.35.110 attackbotsspam
SSH Login Bruteforce
2020-05-06 17:04:07
106.1.48.146 attackspam
port scan and connect, tcp 23 (telnet)
2020-05-06 16:40:03
141.98.80.48 attack
May  6 10:16:24 mail.srvfarm.net postfix/smtpd[237959]: warning: unknown[141.98.80.48]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  6 10:16:24 mail.srvfarm.net postfix/smtpd[237959]: lost connection after AUTH from unknown[141.98.80.48]
May  6 10:16:29 mail.srvfarm.net postfix/smtpd[238454]: lost connection after AUTH from unknown[141.98.80.48]
May  6 10:16:34 mail.srvfarm.net postfix/smtpd[238457]: lost connection after AUTH from unknown[141.98.80.48]
May  6 10:16:38 mail.srvfarm.net postfix/smtpd[224026]: lost connection after AUTH from unknown[141.98.80.48]
2020-05-06 16:46:26
124.251.38.143 attackbotsspam
May  6 06:25:27 host sshd[4660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.38.143  user=root
May  6 06:25:29 host sshd[4660]: Failed password for root from 124.251.38.143 port 34878 ssh2
...
2020-05-06 16:46:56
159.89.171.81 attack
May  6 09:31:18 rotator sshd\[19903\]: Invalid user user7 from 159.89.171.81May  6 09:31:20 rotator sshd\[19903\]: Failed password for invalid user user7 from 159.89.171.81 port 49318 ssh2May  6 09:35:38 rotator sshd\[20678\]: Invalid user sl from 159.89.171.81May  6 09:35:40 rotator sshd\[20678\]: Failed password for invalid user sl from 159.89.171.81 port 59422 ssh2May  6 09:40:05 rotator sshd\[20805\]: Invalid user zy from 159.89.171.81May  6 09:40:06 rotator sshd\[20805\]: Failed password for invalid user zy from 159.89.171.81 port 41294 ssh2
...
2020-05-06 16:48:59
157.230.109.166 attackbotsspam
May  6 07:50:14 ns381471 sshd[21043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.109.166
May  6 07:50:16 ns381471 sshd[21043]: Failed password for invalid user lila from 157.230.109.166 port 41706 ssh2
2020-05-06 16:44:20
219.250.188.143 attackbotsspam
May  6 09:06:21 h2646465 sshd[3789]: Invalid user sompong from 219.250.188.143
May  6 09:06:21 h2646465 sshd[3789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.143
May  6 09:06:21 h2646465 sshd[3789]: Invalid user sompong from 219.250.188.143
May  6 09:06:23 h2646465 sshd[3789]: Failed password for invalid user sompong from 219.250.188.143 port 57462 ssh2
May  6 09:09:11 h2646465 sshd[3986]: Invalid user work from 219.250.188.143
May  6 09:09:11 h2646465 sshd[3986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.143
May  6 09:09:11 h2646465 sshd[3986]: Invalid user work from 219.250.188.143
May  6 09:09:13 h2646465 sshd[3986]: Failed password for invalid user work from 219.250.188.143 port 45405 ssh2
May  6 09:10:19 h2646465 sshd[4489]: Invalid user tech from 219.250.188.143
...
2020-05-06 16:40:17
218.92.0.212 attack
May  6 10:14:52 MainVPS sshd[22280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
May  6 10:14:54 MainVPS sshd[22280]: Failed password for root from 218.92.0.212 port 62835 ssh2
May  6 10:15:07 MainVPS sshd[22280]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 62835 ssh2 [preauth]
May  6 10:14:52 MainVPS sshd[22280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
May  6 10:14:54 MainVPS sshd[22280]: Failed password for root from 218.92.0.212 port 62835 ssh2
May  6 10:15:07 MainVPS sshd[22280]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 62835 ssh2 [preauth]
May  6 10:15:12 MainVPS sshd[22595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
May  6 10:15:15 MainVPS sshd[22595]: Failed password for root from 218.92.0.212 port 32891 ssh2
...
2020-05-06 16:23:47
157.245.134.168 attackbots
Connection by 157.245.134.168 on port: 5900 got caught by honeypot at 5/6/2020 9:50:55 AM
2020-05-06 16:58:28
134.122.76.222 attack
May  6 07:42:51 buvik sshd[1683]: Failed password for invalid user ftpuser from 134.122.76.222 port 32768 ssh2
May  6 07:46:39 buvik sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.76.222  user=root
May  6 07:46:41 buvik sshd[2184]: Failed password for root from 134.122.76.222 port 43368 ssh2
...
2020-05-06 16:42:19
185.176.27.162 attackbots
[MySQL inject/portscan] tcp/3306
*(RWIN=1024)(05061053)
2020-05-06 16:36:21
178.128.243.225 attackbotsspam
2020-05-06T06:19:34.027666server.espacesoutien.com sshd[30686]: Failed password for root from 178.128.243.225 port 34474 ssh2
2020-05-06T06:22:49.011016server.espacesoutien.com sshd[31368]: Invalid user shailesh from 178.128.243.225 port 44420
2020-05-06T06:22:49.022889server.espacesoutien.com sshd[31368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.243.225
2020-05-06T06:22:49.011016server.espacesoutien.com sshd[31368]: Invalid user shailesh from 178.128.243.225 port 44420
2020-05-06T06:22:51.024860server.espacesoutien.com sshd[31368]: Failed password for invalid user shailesh from 178.128.243.225 port 44420 ssh2
...
2020-05-06 16:41:15
171.103.43.138 attackbotsspam
2020-05-0605:48:211jWB2i-0004Wt-Ai\<=info@whatsup2013.chH=171-103-43-138.static.asianet.co.th\(localhost\)[171.103.43.138]:34062P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3059id=2dcf46151e35e0eccb8e386b9f58525e6dd3f3a9@whatsup2013.chT="Youtrulymakemysoulwarm"forjordankiner98@icloud.commattgwoerner@gmail.com2020-05-0605:50:441jWB51-0004jo-N6\<=info@whatsup2013.chH=\(localhost\)[203.252.90.83]:39911P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3098id=04e31b0a012aff0c2fd127747fab92be9d77b0264a@whatsup2013.chT="Heycharmingman"forcresentg22@gmail.combelinskicary81@gmail.com2020-05-0605:50:581jWB5F-0004l9-GI\<=info@whatsup2013.chH=\(localhost\)[186.226.6.40]:35706P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3186id=acb90a343f14c13211ef194a4195ac80a349a51d2f@whatsup2013.chT="Youareasbeautifulasasunlight"forplenty_thoughts@yahoo.comjanet.pabon@yahoo.com2020-05-0605:48:361jWB2
2020-05-06 16:59:43
168.83.76.7 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-05-06 16:43:01

最近上报的IP列表

116.141.50.221 234.91.29.231 142.223.99.241 2.236.91.64
30.69.137.138 137.195.127.243 249.178.76.74 176.215.220.136
250.22.229.146 248.228.96.21 237.119.204.33 2.62.122.16
229.93.212.98 82.135.55.218 218.178.140.221 70.110.1.208
169.64.69.87 206.60.195.66 197.117.228.211 63.112.98.113