必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.157.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.157.168.		IN	A

;; AUTHORITY SECTION:
.			193	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:02:24 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
168.157.180.139.in-addr.arpa domain name pointer 139.180.157.168.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.157.180.139.in-addr.arpa	name = 139.180.157.168.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.153.196.230 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-04-16 07:56:23
181.1.235.95 attack
Automatic report - Port Scan Attack
2020-04-16 08:05:10
51.68.127.137 attackbotsspam
Apr 16 00:37:58 srv01 sshd[30171]: Invalid user kms from 51.68.127.137 port 49224
Apr 16 00:37:58 srv01 sshd[30171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.127.137
Apr 16 00:37:58 srv01 sshd[30171]: Invalid user kms from 51.68.127.137 port 49224
Apr 16 00:38:00 srv01 sshd[30171]: Failed password for invalid user kms from 51.68.127.137 port 49224 ssh2
Apr 16 00:40:17 srv01 sshd[30434]: Invalid user joe from 51.68.127.137 port 40496
...
2020-04-16 07:48:16
94.237.45.244 attackspambots
Bruteforce detected by fail2ban
2020-04-16 07:50:33
138.197.32.150 attack
Invalid user pzserver from 138.197.32.150 port 38738
2020-04-16 07:29:08
162.243.132.42 attackbotsspam
Brute force attack stopped by firewall
2020-04-16 07:49:58
190.64.213.155 attack
Port Scan: Events[2] countPorts[1]: 22 ..
2020-04-16 07:36:51
106.12.56.143 attackbotsspam
SSH Invalid Login
2020-04-16 07:44:51
106.13.181.147 attackspambots
Invalid user j from 106.13.181.147 port 40748
2020-04-16 07:58:35
87.251.74.250 attackspambots
Multiport scan : 35 ports scanned 60 123 300 303 404 443 444 500 505 909 999 1010 1234 2002 3333 3344 3385 3386 3390 3399 4321 5566 6060 6655 6677 7000 17000 23000 33383 33389 33398 33899 40000 60000 63389
2020-04-16 07:45:51
118.89.219.116 attackspambots
Apr 15 22:09:59 vps sshd[1907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.219.116 
Apr 15 22:10:01 vps sshd[1907]: Failed password for invalid user vanessa from 118.89.219.116 port 34074 ssh2
Apr 15 22:28:54 vps sshd[3212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.219.116 
...
2020-04-16 07:26:31
222.186.173.238 attackspambots
04/15/2020-19:58:13.172948 222.186.173.238 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-16 08:04:14
192.241.239.229 attackbots
scans once in preceeding hours on the ports (in chronological order) 1527 resulting in total of 25 scans from 192.241.128.0/17 block.
2020-04-16 07:51:20
152.67.67.89 attackspam
$f2bV_matches
2020-04-16 07:37:04
139.59.67.82 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-16 07:32:42

最近上报的IP列表

139.180.156.24 139.180.158.37 139.180.159.46 139.180.157.233
139.180.163.233 139.180.161.123 139.180.163.100 139.180.17.67
139.180.169.229 139.180.174.168 139.180.175.241 139.180.184.52
139.180.173.34 139.180.178.218 139.180.187.28 139.180.190.4
139.180.184.8 139.180.191.237 139.180.191.209 139.180.185.187