必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.14.189.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.14.189.254.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 11:24:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 254.189.14.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 254.189.14.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.1.166 attackspambots
Invalid user ariel from 139.199.1.166 port 51608
2020-06-29 06:30:40
120.92.42.123 attackbotsspam
Jun 29 00:59:47 journals sshd\[40445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.42.123  user=root
Jun 29 00:59:48 journals sshd\[40445\]: Failed password for root from 120.92.42.123 port 20186 ssh2
Jun 29 01:03:13 journals sshd\[40781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.42.123  user=root
Jun 29 01:03:15 journals sshd\[40781\]: Failed password for root from 120.92.42.123 port 63128 ssh2
Jun 29 01:06:45 journals sshd\[41131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.42.123  user=root
...
2020-06-29 06:29:00
111.229.167.10 attackspam
Jun 29 00:18:38 piServer sshd[20212]: Failed password for root from 111.229.167.10 port 37342 ssh2
Jun 29 00:21:13 piServer sshd[20459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.10 
Jun 29 00:21:15 piServer sshd[20459]: Failed password for invalid user night from 111.229.167.10 port 52362 ssh2
...
2020-06-29 06:46:26
122.51.167.108 attackbotsspam
$f2bV_matches
2020-06-29 06:41:13
211.246.253.30 attackspam
2020-06-28T22:26:24.886758shield sshd\[11750\]: Invalid user cisco from 211.246.253.30 port 47809
2020-06-28T22:26:24.890289shield sshd\[11750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.246.253.30
2020-06-28T22:26:26.955334shield sshd\[11750\]: Failed password for invalid user cisco from 211.246.253.30 port 47809 ssh2
2020-06-28T22:29:09.903401shield sshd\[12763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.246.253.30  user=root
2020-06-28T22:29:11.953427shield sshd\[12763\]: Failed password for root from 211.246.253.30 port 52072 ssh2
2020-06-29 06:31:29
140.238.25.151 attackbots
Jun 28 22:40:31 ns392434 sshd[20965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151  user=root
Jun 28 22:40:33 ns392434 sshd[20965]: Failed password for root from 140.238.25.151 port 34872 ssh2
Jun 28 22:47:46 ns392434 sshd[21058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151  user=root
Jun 28 22:47:49 ns392434 sshd[21058]: Failed password for root from 140.238.25.151 port 35582 ssh2
Jun 28 22:50:06 ns392434 sshd[21210]: Invalid user silas from 140.238.25.151 port 44986
Jun 28 22:50:06 ns392434 sshd[21210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151
Jun 28 22:50:06 ns392434 sshd[21210]: Invalid user silas from 140.238.25.151 port 44986
Jun 28 22:50:08 ns392434 sshd[21210]: Failed password for invalid user silas from 140.238.25.151 port 44986 ssh2
Jun 28 22:52:22 ns392434 sshd[21224]: Invalid user grc from 140.238.25.151 port 54402
2020-06-29 06:50:39
132.232.120.145 attack
Jun 28 22:32:21 onepixel sshd[1364486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.120.145 
Jun 28 22:32:21 onepixel sshd[1364486]: Invalid user user from 132.232.120.145 port 48202
Jun 28 22:32:22 onepixel sshd[1364486]: Failed password for invalid user user from 132.232.120.145 port 48202 ssh2
Jun 28 22:34:01 onepixel sshd[1365337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.120.145  user=root
Jun 28 22:34:03 onepixel sshd[1365337]: Failed password for root from 132.232.120.145 port 44584 ssh2
2020-06-29 06:35:26
51.255.64.58 attackspambots
Automatic report - XMLRPC Attack
2020-06-29 06:46:57
198.199.125.87 attack
SSH Invalid Login
2020-06-29 06:24:27
106.12.88.246 attack
Jun 29 00:24:10 piServer sshd[20828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.246 
Jun 29 00:24:12 piServer sshd[20828]: Failed password for invalid user unix from 106.12.88.246 port 45580 ssh2
Jun 29 00:27:19 piServer sshd[21303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.246 
...
2020-06-29 06:45:23
65.52.233.250 attack
1627. On Jun 28 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 65.52.233.250.
2020-06-29 06:53:19
123.19.133.81 attackspam
xmlrpc attack
2020-06-29 06:39:14
195.97.75.174 attackspambots
Jun 29 00:08:37 piServer sshd[18780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.97.75.174 
Jun 29 00:08:39 piServer sshd[18780]: Failed password for invalid user postgres from 195.97.75.174 port 47620 ssh2
Jun 29 00:12:29 piServer sshd[19588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.97.75.174 
...
2020-06-29 06:23:10
1.0.212.175 attackspam
Unauthorized IMAP connection attempt
2020-06-29 06:20:09
51.77.215.18 attackbotsspam
Jun 28 23:09:28 vps639187 sshd\[31330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.18  user=root
Jun 28 23:09:29 vps639187 sshd\[31330\]: Failed password for root from 51.77.215.18 port 46950 ssh2
Jun 28 23:12:41 vps639187 sshd\[31380\]: Invalid user admin from 51.77.215.18 port 47204
Jun 28 23:12:41 vps639187 sshd\[31380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.18
...
2020-06-29 06:57:10

最近上报的IP列表

117.66.81.232 125.99.232.243 154.106.85.88 97.213.53.3
166.119.63.96 73.233.136.157 174.195.85.117 18.216.249.218
228.85.166.55 195.15.160.39 250.89.171.103 104.53.221.6
209.122.67.237 209.126.189.155 71.81.95.144 150.137.0.188
235.118.61.187 86.102.148.11 236.207.42.200 31.20.36.242