必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Tele Danmark

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.145.178.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31821
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.145.178.196.		IN	A

;; AUTHORITY SECTION:
.			3271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050100 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 18:53:52 +08 2019
;; MSG SIZE  rcvd: 119

HOST信息:
Host 196.178.145.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 196.178.145.139.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.106.137.130 attackbots
Automatic report - Port Scan Attack
2019-08-29 12:36:51
104.131.113.106 attackbotsspam
Aug 28 16:59:03 wbs sshd\[21875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.113.106  user=mysql
Aug 28 16:59:05 wbs sshd\[21875\]: Failed password for mysql from 104.131.113.106 port 55476 ssh2
Aug 28 17:03:57 wbs sshd\[22263\]: Invalid user rpcuser from 104.131.113.106
Aug 28 17:03:57 wbs sshd\[22263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.113.106
Aug 28 17:03:59 wbs sshd\[22263\]: Failed password for invalid user rpcuser from 104.131.113.106 port 42544 ssh2
2019-08-29 12:13:43
119.56.186.244 attackspam
firewall-block, port(s): 60001/tcp
2019-08-29 11:53:23
36.108.170.241 attackspambots
Aug 29 03:56:49 [host] sshd[26939]: Invalid user 123456 from 36.108.170.241
Aug 29 03:56:49 [host] sshd[26939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.170.241
Aug 29 03:56:51 [host] sshd[26939]: Failed password for invalid user 123456 from 36.108.170.241 port 33372 ssh2
2019-08-29 11:52:46
190.244.20.16 attackspam
Aug 28 16:00:32 php2 sshd\[15964\]: Invalid user rolo from 190.244.20.16
Aug 28 16:00:32 php2 sshd\[15964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.244.20.16
Aug 28 16:00:34 php2 sshd\[15964\]: Failed password for invalid user rolo from 190.244.20.16 port 41552 ssh2
Aug 28 16:05:41 php2 sshd\[16407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.244.20.16  user=root
Aug 28 16:05:44 php2 sshd\[16407\]: Failed password for root from 190.244.20.16 port 57288 ssh2
2019-08-29 12:14:33
1.186.45.250 attackbotsspam
Aug 29 05:05:23 root sshd[16943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.186.45.250 
Aug 29 05:05:25 root sshd[16943]: Failed password for invalid user monero from 1.186.45.250 port 36357 ssh2
Aug 29 05:09:56 root sshd[17033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.186.45.250 
...
2019-08-29 12:16:44
80.20.20.63 attackspambots
firewall-block, port(s): 23/tcp
2019-08-29 11:58:19
92.222.36.216 attackbotsspam
SSH Brute-Forcing (ownc)
2019-08-29 11:57:24
49.232.46.135 attack
Aug 29 03:46:31 mail sshd\[29921\]: Invalid user adolph from 49.232.46.135 port 52672
Aug 29 03:46:31 mail sshd\[29921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.46.135
Aug 29 03:46:33 mail sshd\[29921\]: Failed password for invalid user adolph from 49.232.46.135 port 52672 ssh2
Aug 29 03:49:17 mail sshd\[30119\]: Invalid user minecraft from 49.232.46.135 port 48222
Aug 29 03:49:17 mail sshd\[30119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.46.135
2019-08-29 12:37:27
118.83.160.28 attackbotsspam
" "
2019-08-29 12:27:30
185.10.187.36 attack
Spammer
2019-08-29 12:09:47
80.245.117.82 attackbots
[portscan] Port scan
2019-08-29 12:05:59
159.65.81.187 attackspam
Aug 29 06:02:18 vpn01 sshd\[6494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.81.187  user=root
Aug 29 06:02:20 vpn01 sshd\[6494\]: Failed password for root from 159.65.81.187 port 48930 ssh2
Aug 29 06:07:17 vpn01 sshd\[6510\]: Invalid user test from 159.65.81.187
2019-08-29 12:24:04
185.104.184.214 attack
(From mnoyahwq@krystinvalevo.online) Having cash open to you is imperative when venturing in the housing sell. When i was a gravedigger and embalmer, Was once in charge and my clients were pretty passive. Will cause the inflammation in part is cytokine.Grate a potato and apply on the affected area for an hour. However when we explore outside our comfortable zone is a sort of spectacular. Just maybe, check out a plant nusery and have someone.
 
Bioxyn การหลอกลวง
Alluramin letak
 
To really rock at karaoke, follow basic tips. While the burning of calories is much lower than that during they day, it still occurs. In addition, you get to fill your own water bottle along method.The heat will trigger better pass. The best creams don't contain such harmful chemical substances. This is your money and your own life investment you're talking relating to.
 
2019-08-29 12:17:45
210.245.20.72 attackspam
masters-of-media.de 210.245.20.72 \[29/Aug/2019:01:50:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 5855 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
masters-of-media.de 210.245.20.72 \[29/Aug/2019:01:50:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 5854 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-29 11:50:51

最近上报的IP列表

1.169.66.106 57.96.211.163 156.204.68.43 114.26.154.163
216.62.81.238 113.179.82.240 177.155.16.218 109.184.36.35
79.71.197.161 27.54.183.116 110.138.204.140 63.39.126.229
90.151.180.215 49.147.175.107 91.191.206.131 103.228.143.161
143.208.184.5 24.116.176.182 39.153.216.106 62.16.62.241