必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.146.117.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.146.117.222.		IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:51:42 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 222.117.146.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.117.146.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.105.233.209 attack
Sep 10 14:57:56 hpm sshd\[28094\]: Invalid user deploy from 95.105.233.209
Sep 10 14:57:56 hpm sshd\[28094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-105-233-209.static.orange.sk
Sep 10 14:57:58 hpm sshd\[28094\]: Failed password for invalid user deploy from 95.105.233.209 port 36755 ssh2
Sep 10 15:03:31 hpm sshd\[28660\]: Invalid user admin from 95.105.233.209
Sep 10 15:03:31 hpm sshd\[28660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-105-233-209.static.orange.sk
2019-09-11 09:10:35
182.61.27.149 attackspambots
Sep 10 14:31:26 lcdev sshd\[3985\]: Invalid user test01 from 182.61.27.149
Sep 10 14:31:26 lcdev sshd\[3985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149
Sep 10 14:31:28 lcdev sshd\[3985\]: Failed password for invalid user test01 from 182.61.27.149 port 54864 ssh2
Sep 10 14:38:36 lcdev sshd\[4602\]: Invalid user tom from 182.61.27.149
Sep 10 14:38:36 lcdev sshd\[4602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149
2019-09-11 08:57:59
78.188.59.112 attackspam
Automatic report - Port Scan Attack
2019-09-11 09:05:02
199.249.230.103 attackbotsspam
Automatic report - Banned IP Access
2019-09-11 08:51:03
180.96.69.215 attack
Sep 11 02:23:39 ubuntu-2gb-nbg1-dc3-1 sshd[20872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.69.215
Sep 11 02:23:41 ubuntu-2gb-nbg1-dc3-1 sshd[20872]: Failed password for invalid user ubuntu from 180.96.69.215 port 56224 ssh2
...
2019-09-11 09:22:02
119.4.225.108 attackbots
Sep 11 03:39:48 site2 sshd\[51229\]: Invalid user rowland from 119.4.225.108Sep 11 03:39:50 site2 sshd\[51229\]: Failed password for invalid user rowland from 119.4.225.108 port 49070 ssh2Sep 11 03:42:37 site2 sshd\[51278\]: Failed password for root from 119.4.225.108 port 60513 ssh2Sep 11 03:45:19 site2 sshd\[51331\]: Invalid user cforziati from 119.4.225.108Sep 11 03:45:21 site2 sshd\[51331\]: Failed password for invalid user cforziati from 119.4.225.108 port 43714 ssh2
...
2019-09-11 09:04:32
103.3.226.230 attackspam
Sep 10 15:03:40 wbs sshd\[321\]: Invalid user user from 103.3.226.230
Sep 10 15:03:40 wbs sshd\[321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230
Sep 10 15:03:42 wbs sshd\[321\]: Failed password for invalid user user from 103.3.226.230 port 60024 ssh2
Sep 10 15:12:09 wbs sshd\[1285\]: Invalid user daniel from 103.3.226.230
Sep 10 15:12:09 wbs sshd\[1285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230
2019-09-11 09:25:22
118.169.241.26 attack
port 23 attempt blocked
2019-09-11 09:00:01
118.169.241.2 attack
port 23 attempt blocked
2019-09-11 09:15:52
222.186.30.165 attack
Sep 10 15:23:23 wbs sshd\[2733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Sep 10 15:23:24 wbs sshd\[2733\]: Failed password for root from 222.186.30.165 port 41868 ssh2
Sep 10 15:23:26 wbs sshd\[2733\]: Failed password for root from 222.186.30.165 port 41868 ssh2
Sep 10 15:23:28 wbs sshd\[2733\]: Failed password for root from 222.186.30.165 port 41868 ssh2
Sep 10 15:23:29 wbs sshd\[2746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
2019-09-11 09:25:50
64.187.227.125 attack
64.187.227.125 has been banned for [spam]
...
2019-09-11 09:18:13
109.167.98.27 attackbotsspam
Sep 11 02:33:04 tux-35-217 sshd\[7056\]: Invalid user sftp from 109.167.98.27 port 40716
Sep 11 02:33:04 tux-35-217 sshd\[7056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27
Sep 11 02:33:06 tux-35-217 sshd\[7056\]: Failed password for invalid user sftp from 109.167.98.27 port 40716 ssh2
Sep 11 02:38:42 tux-35-217 sshd\[7171\]: Invalid user ubuntu from 109.167.98.27 port 43718
Sep 11 02:38:42 tux-35-217 sshd\[7171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27
...
2019-09-11 09:13:17
106.13.52.234 attack
Sep 11 02:20:12 SilenceServices sshd[28029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234
Sep 11 02:20:13 SilenceServices sshd[28029]: Failed password for invalid user 1q2w3e4r from 106.13.52.234 port 54646 ssh2
Sep 11 02:24:00 SilenceServices sshd[30847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234
2019-09-11 08:45:41
115.213.61.9 attack
Automatic report - Port Scan Attack
2019-09-11 08:44:16
88.214.26.102 attack
09/10/2019-18:12:42.307384 88.214.26.102 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-11 09:20:10

最近上报的IP列表

176.189.249.78 130.155.45.54 17.233.235.147 90.178.252.107
104.26.202.175 136.254.137.43 159.105.146.255 248.10.168.35
222.250.31.14 180.19.232.211 12.74.61.146 154.16.50.251
125.195.228.132 149.110.82.93 26.249.123.96 137.158.73.217
178.36.56.1 111.120.255.108 177.210.136.130 196.121.88.75