必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bath

省份(region): Maine

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.140.105.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.140.105.136.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:11:48 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
136.105.140.139.in-addr.arpa is an alias for 136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa.
136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa domain name pointer DESKTOP-H6QS8Q2.campus.bowdoin.edu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.105.140.139.in-addr.arpa	canonical name = 136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa.
136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa	name = DESKTOP-H6QS8Q2.campus.bowdoin.edu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.99.70.2 attackspambots
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:41:11
222.186.175.154 attack
Jan  2 18:05:35 nextcloud sshd\[30528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Jan  2 18:05:37 nextcloud sshd\[30528\]: Failed password for root from 222.186.175.154 port 36146 ssh2
Jan  2 18:05:41 nextcloud sshd\[30528\]: Failed password for root from 222.186.175.154 port 36146 ssh2
...
2020-01-03 01:55:51
190.0.159.8 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:46:27
186.105.28.1 attackbotsspam
web Attack on Website at 2020-01-02.
2020-01-03 01:57:27
216.218.206.110 attack
3389BruteforceFW23
2020-01-03 01:26:40
184.105.247.1 attack
web Attack on Website at 2020-01-02.
2020-01-03 01:59:06
206.189.146.1 attackspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:24:58
200.95.197.1 attackbotsspam
web Attack on Website at 2020-01-02.
2020-01-03 01:29:51
185.56.153.2 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:58:43
187.241.175.1 attackbots
web Attack on Wordpress site at 2020-01-02.
2020-01-03 01:48:30
79.10.175.103 attackbotsspam
Unauthorized connection attempt detected from IP address 79.10.175.103 to port 23
2020-01-03 01:36:02
202.119.81.2 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:27:28
198.181.37.2 attackspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:35:00
207.96.90.42 attackbotsspam
proto=tcp  .  spt=60618  .  dpt=25  .     (Found on   Dark List de Jan 02)     (497)
2020-01-03 02:03:07
138.68.72.7 attackbotsspam
Jan  2 15:54:48 localhost sshd\[80623\]: Invalid user khalid from 138.68.72.7 port 54306
Jan  2 15:54:48 localhost sshd\[80623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.72.7
Jan  2 15:54:49 localhost sshd\[80623\]: Failed password for invalid user khalid from 138.68.72.7 port 54306 ssh2
Jan  2 15:57:42 localhost sshd\[80675\]: Invalid user 1234 from 138.68.72.7 port 55156
Jan  2 15:57:42 localhost sshd\[80675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.72.7
...
2020-01-03 01:49:28

最近上报的IP列表

200.80.30.46 185.54.124.218 63.254.151.179 206.28.134.64
151.54.241.248 152.151.183.248 69.241.183.219 239.214.20.240
154.160.89.234 151.123.178.185 204.80.167.167 238.74.77.69
68.188.188.168 222.229.104.208 252.209.198.12 119.5.156.38
187.241.227.198 15.188.178.16 13.36.173.254 207.171.229.48