必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.147.130.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.147.130.101.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 12:54:27 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 101.130.147.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.130.147.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.205.203.159 attackspambots
Oct  6 22:53:42 hosting sshd[21696]: Invalid user pi from 49.205.203.159 port 45704
Oct  6 22:53:42 hosting sshd[21695]: Invalid user pi from 49.205.203.159 port 45698
Oct  6 22:53:42 hosting sshd[21696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.205.203.159
Oct  6 22:53:42 hosting sshd[21696]: Invalid user pi from 49.205.203.159 port 45704
Oct  6 22:53:44 hosting sshd[21696]: Failed password for invalid user pi from 49.205.203.159 port 45704 ssh2
Oct  6 22:53:42 hosting sshd[21695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.205.203.159
Oct  6 22:53:42 hosting sshd[21695]: Invalid user pi from 49.205.203.159 port 45698
Oct  6 22:53:44 hosting sshd[21695]: Failed password for invalid user pi from 49.205.203.159 port 45698 ssh2
...
2019-10-07 04:10:33
165.22.112.45 attackbotsspam
Aug 29 18:52:22 vtv3 sshd\[31808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45  user=root
Aug 29 18:52:24 vtv3 sshd\[31808\]: Failed password for root from 165.22.112.45 port 54332 ssh2
Aug 29 18:56:22 vtv3 sshd\[1667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45  user=root
Aug 29 18:56:24 vtv3 sshd\[1667\]: Failed password for root from 165.22.112.45 port 43758 ssh2
Aug 29 19:00:22 vtv3 sshd\[3910\]: Invalid user audit from 165.22.112.45 port 33178
Aug 29 19:00:22 vtv3 sshd\[3910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45
Aug 29 19:12:20 vtv3 sshd\[9738\]: Invalid user abel from 165.22.112.45 port 57960
Aug 29 19:12:20 vtv3 sshd\[9738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45
Aug 29 19:12:22 vtv3 sshd\[9738\]: Failed password for invalid user abel from 165.2
2019-10-07 04:09:15
139.59.141.196 attackspambots
fail2ban honeypot
2019-10-07 04:29:55
91.121.136.44 attackbotsspam
Oct  6 21:46:04 OPSO sshd\[16924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44  user=root
Oct  6 21:46:06 OPSO sshd\[16924\]: Failed password for root from 91.121.136.44 port 45782 ssh2
Oct  6 21:49:52 OPSO sshd\[17657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44  user=root
Oct  6 21:49:54 OPSO sshd\[17657\]: Failed password for root from 91.121.136.44 port 57346 ssh2
Oct  6 21:53:49 OPSO sshd\[18387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44  user=root
2019-10-07 04:05:42
190.202.54.12 attack
Oct  6 10:03:56 php1 sshd\[18429\]: Invalid user 7y8u9i0o from 190.202.54.12
Oct  6 10:03:56 php1 sshd\[18429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.54.12
Oct  6 10:03:58 php1 sshd\[18429\]: Failed password for invalid user 7y8u9i0o from 190.202.54.12 port 10621 ssh2
Oct  6 10:09:03 php1 sshd\[18860\]: Invalid user PassW0rd@2018 from 190.202.54.12
Oct  6 10:09:03 php1 sshd\[18860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.54.12
2019-10-07 04:21:11
150.95.110.90 attackspambots
2019-10-06T20:06:59.811674shield sshd\[29715\]: Invalid user Ricardo2017 from 150.95.110.90 port 43464
2019-10-06T20:06:59.816665shield sshd\[29715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-110-90.a00d.g.han1.static.cnode.io
2019-10-06T20:07:02.274925shield sshd\[29715\]: Failed password for invalid user Ricardo2017 from 150.95.110.90 port 43464 ssh2
2019-10-06T20:11:36.605674shield sshd\[30292\]: Invalid user Ricardo2017 from 150.95.110.90 port 55462
2019-10-06T20:11:36.609872shield sshd\[30292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-110-90.a00d.g.han1.static.cnode.io
2019-10-07 04:27:54
168.0.189.13 attackbots
Brute force attempt
2019-10-07 04:06:59
160.202.145.1 attackbots
Automatic report - XMLRPC Attack
2019-10-07 04:23:34
124.127.133.158 attackspambots
Oct  6 15:50:17 xtremcommunity sshd\[254803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.133.158  user=root
Oct  6 15:50:19 xtremcommunity sshd\[254803\]: Failed password for root from 124.127.133.158 port 40622 ssh2
Oct  6 15:53:43 xtremcommunity sshd\[254867\]: Invalid user 123 from 124.127.133.158 port 44938
Oct  6 15:53:43 xtremcommunity sshd\[254867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.133.158
Oct  6 15:53:46 xtremcommunity sshd\[254867\]: Failed password for invalid user 123 from 124.127.133.158 port 44938 ssh2
...
2019-10-07 04:09:38
191.243.143.170 attack
2019-10-06T15:20:25.620264lon01.zurich-datacenter.net sshd\[31742\]: Invalid user Losenord123!@\# from 191.243.143.170 port 37964
2019-10-06T15:20:25.629010lon01.zurich-datacenter.net sshd\[31742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.243.143.170
2019-10-06T15:20:27.879964lon01.zurich-datacenter.net sshd\[31742\]: Failed password for invalid user Losenord123!@\# from 191.243.143.170 port 37964 ssh2
2019-10-06T15:25:22.636624lon01.zurich-datacenter.net sshd\[31854\]: Invalid user Traduire1@3 from 191.243.143.170 port 50914
2019-10-06T15:25:22.642106lon01.zurich-datacenter.net sshd\[31854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.243.143.170
...
2019-10-07 03:52:31
157.25.160.75 attack
Oct  6 13:01:11 microserver sshd[23061]: Invalid user 1qaz@WSX#EDC from 157.25.160.75 port 57236
Oct  6 13:01:11 microserver sshd[23061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.25.160.75
Oct  6 13:01:13 microserver sshd[23061]: Failed password for invalid user 1qaz@WSX#EDC from 157.25.160.75 port 57236 ssh2
Oct  6 13:05:26 microserver sshd[23706]: Invalid user @34WerSdf from 157.25.160.75 port 49212
Oct  6 13:05:26 microserver sshd[23706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.25.160.75
Oct  6 13:17:55 microserver sshd[25207]: Invalid user Darkness@2017 from 157.25.160.75 port 53365
Oct  6 13:17:55 microserver sshd[25207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.25.160.75
Oct  6 13:17:57 microserver sshd[25207]: Failed password for invalid user Darkness@2017 from 157.25.160.75 port 53365 ssh2
Oct  6 13:22:10 microserver sshd[25839]: Invalid user Parola1
2019-10-07 04:20:40
104.198.25.75 attackspambots
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2019-10-07 04:17:19
92.53.114.87 attack
Automatic report - XMLRPC Attack
2019-10-07 03:54:56
82.64.25.207 attack
Oct  6 22:53:07 sauna sshd[205100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.25.207
Oct  6 22:53:08 sauna sshd[205102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.25.207
...
2019-10-07 04:31:16
197.51.177.251 attackbotsspam
3389BruteforceFW21
2019-10-07 03:55:46

最近上报的IP列表

194.104.209.141 5.245.225.51 173.163.28.77 159.157.243.140
238.107.11.248 15.9.156.147 180.1.180.5 221.192.232.141
114.124.94.197 43.127.219.5 72.13.210.55 248.40.30.121
42.33.166.54 25.86.228.120 66.158.200.0 61.52.150.16
239.60.14.243 95.116.233.65 177.239.153.103 123.234.108.148