必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.99.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.99.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 07:42:46 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
159.99.180.139.in-addr.arpa domain name pointer ip-139-180-99-159.as55850.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.99.180.139.in-addr.arpa	name = ip-139-180-99-159.as55850.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.175.42.162 attackspambots
SSH Brute Force
2019-06-29 11:31:03
5.196.110.170 attackspambots
Reported by AbuseIPDB proxy server.
2019-06-29 11:40:07
103.44.15.131 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-29 01:17:13]
2019-06-29 11:20:11
177.130.138.76 attack
SMTP-sasl brute force
...
2019-06-29 11:46:50
120.230.96.120 attackspam
[portscan] Port scan
2019-06-29 11:31:23
51.255.98.249 attack
Automatic report generated by Wazuh
2019-06-29 11:16:12
218.219.246.124 attack
Jun 29 04:46:57 dev sshd\[2352\]: Invalid user install from 218.219.246.124 port 52802
Jun 29 04:46:57 dev sshd\[2352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.219.246.124
...
2019-06-29 11:05:13
193.201.224.12 attackbotsspam
SSH-BruteForce
2019-06-29 11:45:32
86.181.41.38 attackspam
Unauthorised access (Jun 29) SRC=86.181.41.38 LEN=44 TTL=53 ID=5943 TCP DPT=8080 WINDOW=20360 SYN 
Unauthorised access (Jun 28) SRC=86.181.41.38 LEN=44 TTL=53 ID=18453 TCP DPT=8080 WINDOW=20360 SYN 
Unauthorised access (Jun 26) SRC=86.181.41.38 LEN=44 TTL=53 ID=21345 TCP DPT=8080 WINDOW=40809 SYN
2019-06-29 11:04:15
62.210.139.53 attackbotsspam
[portscan] Port scan
2019-06-29 11:31:46
111.121.220.219 attack
$f2bV_matches
2019-06-29 11:18:44
94.177.250.221 attackspambots
Jun 29 02:17:01 srv-4 sshd\[7498\]: Invalid user Rupesh from 94.177.250.221
Jun 29 02:17:01 srv-4 sshd\[7498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.250.221
Jun 29 02:17:03 srv-4 sshd\[7498\]: Failed password for invalid user Rupesh from 94.177.250.221 port 42524 ssh2
...
2019-06-29 11:33:09
46.3.96.67 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-29 11:47:38
207.244.87.139 attackspam
2019-06-28T19:18:20.079484WS-Zach sshd[22846]: Invalid user no from 207.244.87.139 port 54484
2019-06-28T19:18:20.222547WS-Zach sshd[22846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.244.87.139
2019-06-28T19:18:20.079484WS-Zach sshd[22846]: Invalid user no from 207.244.87.139 port 54484
2019-06-28T19:18:22.964780WS-Zach sshd[22846]: Failed password for invalid user no from 207.244.87.139 port 54484 ssh2
2019-06-28T19:18:26.527101WS-Zach sshd[22900]: User root from 207.244.87.139 not allowed because none of user's groups are listed in AllowGroups
...
2019-06-29 11:11:14
51.75.248.164 attack
Jun 29 01:40:54 dev sshd\[12478\]: Invalid user test3 from 51.75.248.164 port 53354
Jun 29 01:40:54 dev sshd\[12478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.164
...
2019-06-29 11:15:55

最近上报的IP列表

31.194.233.83 120.127.3.89 4.86.126.128 30.70.172.105
139.27.134.122 139.26.79.2 51.187.89.173 61.13.159.113
96.126.91.214 145.96.152.158 148.96.184.234 251.246.35.93
70.42.143.213 19.23.87.8 101.169.152.101 45.103.230.197
74.244.205.107 223.155.193.146 52.40.39.10 64.98.209.120