必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.172.249.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.172.249.217.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 10:04:38 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 217.249.172.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.249.172.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.15.192.14 attack
Dec  2 11:30:24 php1 sshd\[16364\]: Invalid user test from 51.15.192.14
Dec  2 11:30:24 php1 sshd\[16364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.192.14
Dec  2 11:30:27 php1 sshd\[16364\]: Failed password for invalid user test from 51.15.192.14 port 59478 ssh2
Dec  2 11:35:43 php1 sshd\[16838\]: Invalid user apache from 51.15.192.14
Dec  2 11:35:43 php1 sshd\[16838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.192.14
2019-12-03 05:36:50
5.249.145.245 attackbots
Dec  2 21:47:20 hcbbdb sshd\[29909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.145.245  user=root
Dec  2 21:47:22 hcbbdb sshd\[29909\]: Failed password for root from 5.249.145.245 port 50849 ssh2
Dec  2 21:52:40 hcbbdb sshd\[30527\]: Invalid user wing from 5.249.145.245
Dec  2 21:52:40 hcbbdb sshd\[30527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.145.245
Dec  2 21:52:42 hcbbdb sshd\[30527\]: Failed password for invalid user wing from 5.249.145.245 port 56341 ssh2
2019-12-03 05:53:39
124.156.13.156 attackbots
2019-12-02T21:19:54.038624abusebot-5.cloudsearch.cf sshd\[1309\]: Invalid user coduoserver from 124.156.13.156 port 58220
2019-12-03 05:32:35
106.13.173.141 attack
Dec  2 21:28:37 MK-Soft-VM7 sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.141 
Dec  2 21:28:39 MK-Soft-VM7 sshd[3344]: Failed password for invalid user ftpuser from 106.13.173.141 port 59080 ssh2
...
2019-12-03 05:34:25
103.55.91.51 attackspam
Dec  2 17:46:36 server sshd\[30032\]: Invalid user bassetti from 103.55.91.51
Dec  2 17:46:36 server sshd\[30032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.55.91.51 
Dec  2 17:46:39 server sshd\[30032\]: Failed password for invalid user bassetti from 103.55.91.51 port 52802 ssh2
Dec  2 17:53:24 server sshd\[32085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.55.91.51  user=root
Dec  2 17:53:27 server sshd\[32085\]: Failed password for root from 103.55.91.51 port 37400 ssh2
...
2019-12-03 05:33:30
116.196.82.187 attackspam
Dec  2 22:55:47 localhost sshd\[29920\]: Invalid user webusers from 116.196.82.187 port 46761
Dec  2 22:55:47 localhost sshd\[29920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.187
Dec  2 22:55:48 localhost sshd\[29920\]: Failed password for invalid user webusers from 116.196.82.187 port 46761 ssh2
2019-12-03 05:57:23
46.38.144.57 attackbots
Dec  2 22:58:41 webserver postfix/smtpd\[7583\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  2 22:59:27 webserver postfix/smtpd\[8709\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  2 23:00:14 webserver postfix/smtpd\[8709\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  2 23:01:00 webserver postfix/smtpd\[7583\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  2 23:01:48 webserver postfix/smtpd\[8709\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-03 06:02:07
112.85.42.182 attackbots
2019-12-02T22:40:04.428572vps751288.ovh.net sshd\[4580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
2019-12-02T22:40:05.871956vps751288.ovh.net sshd\[4580\]: Failed password for root from 112.85.42.182 port 23614 ssh2
2019-12-02T22:40:09.411638vps751288.ovh.net sshd\[4580\]: Failed password for root from 112.85.42.182 port 23614 ssh2
2019-12-02T22:40:12.695369vps751288.ovh.net sshd\[4580\]: Failed password for root from 112.85.42.182 port 23614 ssh2
2019-12-02T22:40:16.195072vps751288.ovh.net sshd\[4580\]: Failed password for root from 112.85.42.182 port 23614 ssh2
2019-12-03 05:40:41
181.191.241.6 attackbotsspam
Dec  3 03:05:32 areeb-Workstation sshd[10457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.241.6 
Dec  3 03:05:34 areeb-Workstation sshd[10457]: Failed password for invalid user osilvera from 181.191.241.6 port 43014 ssh2
...
2019-12-03 05:45:29
165.22.103.237 attackspam
Dec  2 22:35:26 ArkNodeAT sshd\[27493\]: Invalid user castis from 165.22.103.237
Dec  2 22:35:26 ArkNodeAT sshd\[27493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.103.237
Dec  2 22:35:29 ArkNodeAT sshd\[27493\]: Failed password for invalid user castis from 165.22.103.237 port 59608 ssh2
2019-12-03 05:35:48
45.95.168.105 attack
Dec  2 13:54:32 ihweb003 sshd[17190]: Connection from 45.95.168.105 port 54470 on 139.59.173.177 port 22
Dec  2 13:54:32 ihweb003 sshd[17190]: Did not receive identification string from 45.95.168.105 port 54470
Dec  2 13:57:35 ihweb003 sshd[17742]: Connection from 45.95.168.105 port 54086 on 139.59.173.177 port 22
Dec  2 13:57:36 ihweb003 sshd[17742]: Address 45.95.168.105 maps to maxko-hosting.com, but this does not map back to the address.
Dec  2 13:57:36 ihweb003 sshd[17742]: User r.r from 45.95.168.105 not allowed because none of user's groups are listed in AllowGroups
Dec  2 13:57:36 ihweb003 sshd[17742]: Received disconnect from 45.95.168.105 port 54086:11: Normal Shutdown, Thank you for playing [preauth]
Dec  2 13:57:36 ihweb003 sshd[17742]: Disconnected from 45.95.168.105 port 54086 [preauth]
Dec  2 13:58:36 ihweb003 sshd[17907]: Connection from 45.95.168.105 port 42174 on 139.59.173.177 port 22
Dec  2 13:58:36 ihweb003 sshd[17907]: Address 45.95.168.105 maps to........
-------------------------------
2019-12-03 05:59:01
209.85.220.69 attackbotsspam
Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69])
        by mx.google.com with SMTPS id a130sor408591ybg.114.2019.12.02.12.31.39
        for <@gmail.com>
        (Google Transport Security);
        Mon, 02 Dec 2019 12:31:39 -0800 (PST)


CareyHolzman just uploaded a video
What Did Windows 10 1809 Do To Your USB Speeds? A Lesson That Everyone  
Should Know About!
http://www.youtube.com/watch?v=au-niXiKYXo&feature=em-uploademail


Name: Carey Alan Holzman
Michelle Lee Holzman
Address: 5381 N 87th Ave, Glendale, Arizona, 85305
https://careyholzman.com
Phone Numbers:
(602) 527-9723 
(623) 628-4266 
carey@tech-vets.com carey.holzman@yahoo.com cholzman@cox.net 
carey@careyholzman.com ,cholzman@outlook.com,cholzman@gmail.com 
IP Number : 68.231.131.39
x-originating-ip: [199.189.26.30]
2019-12-03 06:03:20
156.0.229.194 attackbots
proto=tcp  .  spt=47329  .  dpt=25  .     (Found on   Dark List de Dec 02)     (731)
2019-12-03 05:29:58
80.211.169.93 attackspambots
Dec  2 11:30:25 hanapaa sshd\[18447\]: Invalid user salsohc from 80.211.169.93
Dec  2 11:30:25 hanapaa sshd\[18447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.169.93
Dec  2 11:30:28 hanapaa sshd\[18447\]: Failed password for invalid user salsohc from 80.211.169.93 port 57852 ssh2
Dec  2 11:35:42 hanapaa sshd\[18978\]: Invalid user pacific from 80.211.169.93
Dec  2 11:35:42 hanapaa sshd\[18978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.169.93
2019-12-03 05:36:32
92.222.72.234 attack
Dec  2 22:55:59 localhost sshd\[29945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234  user=root
Dec  2 22:56:01 localhost sshd\[29945\]: Failed password for root from 92.222.72.234 port 46745 ssh2
Dec  2 23:01:11 localhost sshd\[30688\]: Invalid user wwwadmin from 92.222.72.234 port 52371
Dec  2 23:01:11 localhost sshd\[30688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
2019-12-03 06:01:51

最近上报的IP列表

82.160.5.123 62.200.3.114 120.0.21.102 228.157.112.198
90.226.76.18 245.113.20.143 134.228.209.220 160.147.212.255
65.75.183.136 42.74.133.40 218.106.107.60 54.95.213.249
53.101.151.201 174.141.119.44 195.195.211.22 243.171.5.90
38.46.168.38 221.107.228.136 56.107.227.249 89.142.33.200