必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.204.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.204.195.		IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 176 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:36:38 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
195.204.162.139.in-addr.arpa domain name pointer li1367-195.members.linode.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.204.162.139.in-addr.arpa	name = li1367-195.members.linode.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.213.124.182 attackspambots
SASL PLAIN auth failed: ruser=...
2020-05-28 08:04:29
106.13.148.104 attackspambots
Invalid user admin from 106.13.148.104 port 59152
2020-05-28 07:39:31
201.48.109.195 attack
Unauthorized connection attempt from IP address 201.48.109.195 on Port 445(SMB)
2020-05-28 07:46:05
13.71.24.82 attack
May 27 23:37:33 : SSH login attempts with invalid user
2020-05-28 08:08:19
124.115.214.178 attackspambots
Port probing on unauthorized port 1433
2020-05-28 07:51:42
106.13.83.251 attackspambots
May 27 21:37:16 ns382633 sshd\[32319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251  user=root
May 27 21:37:19 ns382633 sshd\[32319\]: Failed password for root from 106.13.83.251 port 44502 ssh2
May 27 21:44:08 ns382633 sshd\[1170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251  user=root
May 27 21:44:11 ns382633 sshd\[1170\]: Failed password for root from 106.13.83.251 port 43244 ssh2
May 27 21:46:27 ns382633 sshd\[1852\]: Invalid user redmine from 106.13.83.251 port 39114
May 27 21:46:27 ns382633 sshd\[1852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251
2020-05-28 07:45:07
85.38.164.51 attackbotsspam
Invalid user sir from 85.38.164.51 port 41610
2020-05-28 07:39:12
187.210.165.130 attack
Unauthorized connection attempt from IP address 187.210.165.130 on Port 445(SMB)
2020-05-28 07:55:28
90.143.200.103 attackspam
1590608017 - 05/27/2020 21:33:37 Host: 90.143.200.103/90.143.200.103 Port: 445 TCP Blocked
2020-05-28 08:02:00
86.127.253.233 attack
Unauthorized connection attempt from IP address 86.127.253.233 on Port 445(SMB)
2020-05-28 08:05:05
5.39.95.38 attack
Invalid user tomcat from 5.39.95.38 port 34794
2020-05-28 07:41:59
68.183.227.252 attackspambots
May 28 01:55:19 vps647732 sshd[11381]: Failed password for root from 68.183.227.252 port 49664 ssh2
...
2020-05-28 08:08:31
105.247.37.37 attackspambots
Unauthorized connection attempt from IP address 105.247.37.37 on Port 445(SMB)
2020-05-28 07:44:42
181.129.217.53 attackspam
Unauthorized connection attempt from IP address 181.129.217.53 on Port 445(SMB)
2020-05-28 07:56:02
61.180.122.122 attackbotsspam
Web Attack: Zyxel NAS Command Injection CVE-2020-9054
2020-05-28 07:50:47

最近上报的IP列表

139.162.202.94 139.162.204.181 139.162.207.174 139.162.206.219
139.162.204.22 139.162.207.150 139.162.208.133 139.162.207.204
139.162.208.241 187.57.224.145 139.162.212.22 139.162.214.9
139.162.212.156 139.162.217.37 139.162.215.183 139.162.215.63
139.162.215.48 139.162.216.129 139.162.217.225 139.162.213.132