必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.17.131.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10213
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.17.131.150.			IN	A

;; AUTHORITY SECTION:
.			151	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 20:13:29 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 150.131.17.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.131.17.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.136.104.38 attackspambots
Sep 24 23:01:45 h1745522 sshd[28539]: Invalid user user1 from 14.136.104.38 port 5953
Sep 24 23:01:45 h1745522 sshd[28539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38
Sep 24 23:01:45 h1745522 sshd[28539]: Invalid user user1 from 14.136.104.38 port 5953
Sep 24 23:01:46 h1745522 sshd[28539]: Failed password for invalid user user1 from 14.136.104.38 port 5953 ssh2
Sep 24 23:05:18 h1745522 sshd[28653]: Invalid user huang from 14.136.104.38 port 45954
Sep 24 23:05:18 h1745522 sshd[28653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38
Sep 24 23:05:18 h1745522 sshd[28653]: Invalid user huang from 14.136.104.38 port 45954
Sep 24 23:05:20 h1745522 sshd[28653]: Failed password for invalid user huang from 14.136.104.38 port 45954 ssh2
Sep 24 23:09:00 h1745522 sshd[28823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38  user=root

...
2020-09-25 05:44:57
51.210.107.40 attackspambots
2020-09-24T21:26:05.068852randservbullet-proofcloud-66.localdomain sshd[28858]: Invalid user phpmyadmin from 51.210.107.40 port 59294
2020-09-24T21:26:05.073367randservbullet-proofcloud-66.localdomain sshd[28858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-88587485.vps.ovh.net
2020-09-24T21:26:05.068852randservbullet-proofcloud-66.localdomain sshd[28858]: Invalid user phpmyadmin from 51.210.107.40 port 59294
2020-09-24T21:26:07.253223randservbullet-proofcloud-66.localdomain sshd[28858]: Failed password for invalid user phpmyadmin from 51.210.107.40 port 59294 ssh2
...
2020-09-25 05:39:43
210.125.115.153 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:47:38
190.147.162.41 attackbots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 05:54:27
220.117.160.182 attackbots
2020-09-24T20:59:34.320540abusebot-4.cloudsearch.cf sshd[29165]: Invalid user admin from 220.117.160.182 port 44580
2020-09-24T20:59:34.327864abusebot-4.cloudsearch.cf sshd[29165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.160.182
2020-09-24T20:59:34.320540abusebot-4.cloudsearch.cf sshd[29165]: Invalid user admin from 220.117.160.182 port 44580
2020-09-24T20:59:36.088937abusebot-4.cloudsearch.cf sshd[29165]: Failed password for invalid user admin from 220.117.160.182 port 44580 ssh2
2020-09-24T21:06:09.734729abusebot-4.cloudsearch.cf sshd[29284]: Invalid user postgres from 220.117.160.182 port 53510
2020-09-24T21:06:09.740831abusebot-4.cloudsearch.cf sshd[29284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.160.182
2020-09-24T21:06:09.734729abusebot-4.cloudsearch.cf sshd[29284]: Invalid user postgres from 220.117.160.182 port 53510
2020-09-24T21:06:11.727832abusebot-4.cloudsearch.cf
...
2020-09-25 05:46:16
190.4.202.14 attackbots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 05:55:09
191.232.244.35 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:54:08
199.96.132.25 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:51:15
51.38.123.159 attackspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:40:48
51.75.71.111 attack
Sep 24 20:46:49 vps-51d81928 sshd[354014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.71.111 
Sep 24 20:46:49 vps-51d81928 sshd[354014]: Invalid user deploy from 51.75.71.111 port 45589
Sep 24 20:46:51 vps-51d81928 sshd[354014]: Failed password for invalid user deploy from 51.75.71.111 port 45589 ssh2
Sep 24 20:50:23 vps-51d81928 sshd[354100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.71.111  user=backup
Sep 24 20:50:25 vps-51d81928 sshd[354100]: Failed password for backup from 51.75.71.111 port 50119 ssh2
...
2020-09-25 05:40:17
128.199.29.118 attackspambots
Sep 24 23:19:33 ift sshd\[972\]: Failed password for root from 128.199.29.118 port 60562 ssh2Sep 24 23:23:49 ift sshd\[1664\]: Invalid user support from 128.199.29.118Sep 24 23:23:51 ift sshd\[1664\]: Failed password for invalid user support from 128.199.29.118 port 41278 ssh2Sep 24 23:28:02 ift sshd\[2283\]: Invalid user mike from 128.199.29.118Sep 24 23:28:04 ift sshd\[2283\]: Failed password for invalid user mike from 128.199.29.118 port 50224 ssh2
...
2020-09-25 05:22:17
104.131.126.10 attack
Brute-force attempt banned
2020-09-25 05:30:35
193.160.32.164 attackspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:52:46
5.68.154.203 attackspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 05:45:45
68.183.120.37 attackbotsspam
Invalid user steam from 68.183.120.37 port 46346
2020-09-25 05:35:53

最近上报的IP列表

190.117.23.92 225.151.157.150 173.138.38.159 6.112.71.124
123.254.146.8 74.194.233.72 225.186.9.32 132.205.192.168
75.198.164.73 216.58.178.73 149.216.193.95 250.44.203.21
61.91.177.74 157.110.144.203 255.227.75.165 230.121.5.9
141.204.151.225 139.142.201.163 113.253.1.199 55.121.205.131