必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.228.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.228.112.		IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:01:05 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
112.228.162.139.in-addr.arpa domain name pointer cue.savviihq.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
112.228.162.139.in-addr.arpa	name = cue.savviihq.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
102.157.51.244 attackspam
2020-02-27 15:20:04 H=(g.com) [102.157.51.244]:55930 I=[10.100.18.25]:25 sender verify fail for : Unrouteable address
2020-02-27 x@x
2020-02-27 15:20:05 unexpected disconnection while reading SMTP command from (g.com) [102.157.51.244]:55930 I=[10.100.18.25]:25

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.157.51.244
2020-02-28 05:00:11
162.218.244.84 attackspam
Email rejected due to spam filtering
2020-02-28 04:45:07
218.26.176.3 attack
Feb 27 15:20:58 debian-2gb-nbg1-2 kernel: \[5072452.171711\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=218.26.176.3 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=28887 PROTO=TCP SPT=46671 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-28 04:31:42
190.70.1.69 attackspambots
suspicious action Thu, 27 Feb 2020 11:20:44 -0300
2020-02-28 04:47:19
192.241.219.236 attack
W 31101,/var/log/nginx/access.log,-,-
2020-02-28 04:21:03
132.232.32.228 attack
Repeated brute force against a port
2020-02-28 04:29:28
117.50.2.186 attackbotsspam
Feb 27 19:05:03 MK-Soft-VM8 sshd[30868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.2.186 
Feb 27 19:05:05 MK-Soft-VM8 sshd[30868]: Failed password for invalid user test1 from 117.50.2.186 port 34706 ssh2
...
2020-02-28 04:29:47
139.198.123.106 attackbotsspam
Feb 27 15:04:48 vayu sshd[865705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.123.106  user=daemon
Feb 27 15:04:51 vayu sshd[865705]: Failed password for daemon from 139.198.123.106 port 57234 ssh2
Feb 27 15:04:51 vayu sshd[865705]: Received disconnect from 139.198.123.106: 11: Bye Bye [preauth]
Feb 27 15:11:10 vayu sshd[868208]: Connection closed by 139.198.123.106 [preauth]
Feb 27 15:13:53 vayu sshd[868875]: Invalid user dods from 139.198.123.106
Feb 27 15:13:53 vayu sshd[868875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.123.106 
Feb 27 15:13:54 vayu sshd[868875]: Failed password for invalid user dods from 139.198.123.106 port 36996 ssh2
Feb 27 15:13:54 vayu sshd[868875]: Received disconnect from 139.198.123.106: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.198.123.106
2020-02-28 04:24:19
113.128.105.198 attack
113.128.105.198 - - \[27/Feb/2020:16:20:44 +0200\] "HEAD http://123.125.114.144/ HTTP/1.1" 200 - "-" "Mozilla/5.01732016 Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\; rv:55.0\) Gecko/20100101 Firefox/55.0"
2020-02-28 04:46:37
74.82.47.5 attackbotsspam
20/2/27@11:32:23: FAIL: Alarm-Intrusion address from=74.82.47.5
...
2020-02-28 04:40:01
122.224.34.193 attackbots
[portscan] Port scan
2020-02-28 04:52:08
106.12.74.141 attackbotsspam
2020-02-28T04:22:40.404159luisaranguren sshd[1939559]: Invalid user user22 from 106.12.74.141 port 33954
2020-02-28T04:22:42.384393luisaranguren sshd[1939559]: Failed password for invalid user user22 from 106.12.74.141 port 33954 ssh2
...
2020-02-28 04:23:19
132.232.42.33 attack
Feb 27 20:32:47 lnxweb61 sshd[23418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.42.33
2020-02-28 04:46:07
178.169.80.150 attackspambots
suspicious action Thu, 27 Feb 2020 11:20:48 -0300
2020-02-28 04:44:34
116.202.24.192 attack
Lines containing failures of 116.202.24.192
/var/log/apache/pucorp.org.log:Feb 27 15:16:39 server01 postfix/smtpd[13351]: connect from static.192.24.202.116.clients.your-server.de[116.202.24.192]
/var/log/apache/pucorp.org.log:Feb x@x
/var/log/apache/pucorp.org.log:Feb x@x
/var/log/apache/pucorp.org.log:Feb 27 15:16:39 server01 postfix/smtpd[13351]: disconnect from static.192.24.202.116.clients.your-server.de[116.202.24.192]
/var/log/apache/pucorp.org.log:Feb 27 15:16:39 server01 postfix/smtpd[13351]: connect from static.192.24.202.116.clients.your-server.de[116.202.24.192]
/var/log/apache/pucorp.org.log:Feb x@x
/var/log/apache/pucorp.org.log:Feb x@x
/var/log/apache/pucorp.org.log:Feb 27 15:16:39 server01 postfix/smtpd[13351]: disconnect from static.192.24.202.116.clients.your-server.de[116.202.24.192]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.202.24.192
2020-02-28 04:48:04

最近上报的IP列表

139.162.226.161 139.162.222.218 139.162.231.112 139.162.227.132
139.162.229.59 139.162.221.220 139.162.224.43 139.162.23.180
139.162.234.175 139.162.236.17 139.162.234.54 139.162.236.52
139.162.236.24 139.162.235.208 139.162.239.47 139.162.236.54
139.162.241.15 139.162.236.69 139.162.24.117 139.162.241.145