必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.144.244.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.144.244.127.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:11:27 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 127.244.144.139.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 139.144.244.127.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.136.75.213 attackbots
1588391446 - 05/02/2020 05:50:46 Host: 103.136.75.213/103.136.75.213 Port: 445 TCP Blocked
2020-05-02 17:45:13
162.253.129.90 attack
0,56-03/03 [bc01/m09] PostRequest-Spammer scoring: zurich
2020-05-02 17:18:58
139.199.228.133 attack
May  2 10:29:55 vmd17057 sshd[29214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133 
May  2 10:29:57 vmd17057 sshd[29214]: Failed password for invalid user internet from 139.199.228.133 port 13033 ssh2
...
2020-05-02 17:30:43
106.12.171.65 attackspam
May  2 09:48:09 *** sshd[7188]: Invalid user pizza from 106.12.171.65
2020-05-02 17:49:08
222.186.15.10 attack
2020-05-02T09:07:01.025051shield sshd\[6711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
2020-05-02T09:07:03.006936shield sshd\[6711\]: Failed password for root from 222.186.15.10 port 23953 ssh2
2020-05-02T09:07:05.513225shield sshd\[6711\]: Failed password for root from 222.186.15.10 port 23953 ssh2
2020-05-02T09:07:07.946854shield sshd\[6711\]: Failed password for root from 222.186.15.10 port 23953 ssh2
2020-05-02T09:07:33.143249shield sshd\[6759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
2020-05-02 17:19:42
51.178.182.18 attackbotsspam
May  2 08:23:20 ns382633 sshd\[2536\]: Invalid user ntps from 51.178.182.18 port 59708
May  2 08:23:20 ns382633 sshd\[2536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.18
May  2 08:23:22 ns382633 sshd\[2536\]: Failed password for invalid user ntps from 51.178.182.18 port 59708 ssh2
May  2 08:23:50 ns382633 sshd\[2555\]: Invalid user synthing from 51.178.182.18 port 60446
May  2 08:23:50 ns382633 sshd\[2555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.18
2020-05-02 17:51:03
152.32.254.193 attackbotsspam
May  2 06:46:38 master sshd[27560]: Failed password for invalid user lk from 152.32.254.193 port 35428 ssh2
May  2 06:50:06 master sshd[27568]: Failed password for invalid user user from 152.32.254.193 port 55678 ssh2
May  2 06:52:20 master sshd[27573]: Failed password for invalid user jaime from 152.32.254.193 port 33888 ssh2
May  2 06:54:18 master sshd[27579]: Failed password for invalid user nextcloud from 152.32.254.193 port 40340 ssh2
May  2 06:56:20 master sshd[27585]: Failed password for invalid user test1 from 152.32.254.193 port 46778 ssh2
May  2 06:58:23 master sshd[27597]: Failed password for invalid user tomcat from 152.32.254.193 port 53214 ssh2
May  2 07:00:30 master sshd[27620]: Failed password for invalid user mn from 152.32.254.193 port 59650 ssh2
May  2 07:02:52 master sshd[27632]: Failed password for invalid user sjo from 152.32.254.193 port 37900 ssh2
May  2 07:05:01 master sshd[27640]: Failed password for invalid user hl from 152.32.254.193 port 44336 ssh2
2020-05-02 17:57:02
218.70.27.122 attackspambots
Lines containing failures of 218.70.27.122
May  2 08:12:18 www sshd[11515]: Invalid user test from 218.70.27.122 port 48356
May  2 08:12:18 www sshd[11515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.70.27.122
May  2 08:12:19 www sshd[11515]: Failed password for invalid user test from 218.70.27.122 port 48356 ssh2
May  2 08:12:20 www sshd[11515]: Received disconnect from 218.70.27.122 port 48356:11: Bye Bye [preauth]
May  2 08:12:20 www sshd[11515]: Disconnected from invalid user test 218.70.27.122 port 48356 [preauth]
May  2 08:41:28 www sshd[15772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.70.27.122  user=r.r
May  2 08:41:30 www sshd[15772]: Failed password for r.r from 218.70.27.122 port 58732 ssh2
May  2 08:41:30 www sshd[15772]: Received disconnect from 218.70.27.122 port 58732:11: Bye Bye [preauth]
May  2 08:41:30 www sshd[15772]: Disconnected from authenticating use........
------------------------------
2020-05-02 17:30:28
106.53.9.163 attackspam
invalid login attempt (drive)
2020-05-02 17:55:19
87.214.234.168 attack
Automatic report - Banned IP Access
2020-05-02 17:48:18
95.85.26.23 attackbotsspam
May  2 08:01:00 localhost sshd\[14899\]: Invalid user ftpadmin from 95.85.26.23
May  2 08:01:00 localhost sshd\[14899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.26.23
May  2 08:01:01 localhost sshd\[14899\]: Failed password for invalid user ftpadmin from 95.85.26.23 port 36752 ssh2
May  2 08:05:40 localhost sshd\[15202\]: Invalid user shiva from 95.85.26.23
May  2 08:05:40 localhost sshd\[15202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.26.23
...
2020-05-02 17:27:18
118.93.189.120 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-05-02 17:57:45
201.43.148.77 attackbotsspam
Automatic report - Port Scan Attack
2020-05-02 17:58:36
195.54.167.76 attack
May  2 11:04:55 debian-2gb-nbg1-2 kernel: \[10669203.973364\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.76 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=53464 PROTO=TCP SPT=50994 DPT=32006 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-02 17:34:45
120.92.164.236 attackbots
May  2 09:02:06 ift sshd\[20091\]: Failed password for root from 120.92.164.236 port 62061 ssh2May  2 09:05:55 ift sshd\[20710\]: Invalid user xiaojie from 120.92.164.236May  2 09:05:57 ift sshd\[20710\]: Failed password for invalid user xiaojie from 120.92.164.236 port 45270 ssh2May  2 09:09:42 ift sshd\[21394\]: Invalid user help from 120.92.164.236May  2 09:09:43 ift sshd\[21394\]: Failed password for invalid user help from 120.92.164.236 port 28475 ssh2
...
2020-05-02 17:43:01

最近上报的IP列表

135.100.245.141 33.254.199.123 61.192.19.44 241.171.186.35
239.46.36.50 22.224.158.18 56.231.141.183 220.222.79.191
130.121.46.162 206.147.231.95 87.178.95.184 116.183.63.55
98.1.208.31 2.233.214.38 74.60.210.214 240.69.30.208
159.11.85.16 48.92.220.158 76.252.200.82 22.152.71.135