必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.138.42.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.138.42.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:50:33 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
216.42.138.139.in-addr.arpa is an alias for 216.42.138.139.in-addr.arpa.ap.iphmx.com.
216.42.138.139.in-addr.arpa.ap.iphmx.com domain name pointer esa1.hc383-8.ap.iphmx.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.42.138.139.in-addr.arpa	canonical name = 216.42.138.139.in-addr.arpa.ap.iphmx.com.
216.42.138.139.in-addr.arpa.ap.iphmx.com	name = esa1.hc383-8.ap.iphmx.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.84.86.123 attack
Honeypot attack, port: 4567, PTR: static14.byfly.gomel.by.
2020-05-11 01:15:15
148.72.153.114 attack
1589112638 - 05/10/2020 14:10:38 Host: 148.72.153.114/148.72.153.114 Port: 445 TCP Blocked
2020-05-11 01:27:18
84.17.49.193 attackspambots
(From no-reply@hilkom-digital.de) hi there 
I have just checked griffithchiropractic.com for the ranking keywords and seen that your SEO metrics could use a boost. 
 
We will improve your SEO metrics and ranks organically and safely, using only whitehat methods, while providing monthly reports and outstanding support. 
 
Please check our pricelist here, we offer SEO at cheap rates. 
https://www.hilkom-digital.de/cheap-seo-packages/ 
 
Start increasing your sales and leads with us, today! 
 
regards 
Hilkom Digital Team 
support@hilkom-digital.de
2020-05-11 01:13:44
187.170.227.42 attackspam
Attempted connection to port 23.
2020-05-11 01:25:02
93.76.73.231 attackbotsspam
Honeypot attack, port: 5555, PTR: 93-76-73-231.zap.volia.net.
2020-05-11 01:13:24
62.219.208.63 attackbots
SSH Brute-Force. Ports scanning.
2020-05-11 00:52:55
118.70.128.66 attackbots
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-05-11 01:04:31
69.24.199.28 attackspam
Honeypot attack, port: 445, PTR: mail.clinicayaguez.com.
2020-05-11 01:14:08
159.65.11.253 attack
SSH Login Bruteforce
2020-05-11 01:28:50
104.248.130.10 attack
May 10 17:26:02 vpn01 sshd[10486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10
May 10 17:26:04 vpn01 sshd[10486]: Failed password for invalid user nagiosnagios from 104.248.130.10 port 56408 ssh2
...
2020-05-11 01:16:12
208.68.39.220 attackspam
May 10 15:30:49 server sshd[13014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.68.39.220
May 10 15:30:51 server sshd[13014]: Failed password for invalid user oo from 208.68.39.220 port 57124 ssh2
May 10 15:34:42 server sshd[13223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.68.39.220
...
2020-05-11 01:19:02
91.234.62.160 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-11 01:20:23
114.33.153.188 attack
Honeypot attack, port: 81, PTR: 114-33-153-188.HINET-IP.hinet.net.
2020-05-11 01:12:10
114.35.242.211 attackbots
scan z
2020-05-11 01:04:52
185.50.149.25 attackspam
May 10 18:41:16 relay postfix/smtpd\[17649\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:41:33 relay postfix/smtpd\[15094\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:42:56 relay postfix/smtpd\[15094\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:43:13 relay postfix/smtpd\[15092\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:43:31 relay postfix/smtpd\[17277\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-11 00:57:14

最近上报的IP列表

50.147.33.17 184.26.96.59 149.181.226.175 167.44.145.145
225.95.219.99 252.66.24.227 90.85.20.131 93.206.231.69
94.47.211.179 114.125.94.20 64.121.134.237 65.238.78.69
160.83.119.189 33.188.242.185 51.189.249.0 54.95.9.195
22.222.146.251 63.214.114.134 141.64.115.20 180.182.60.158