必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.187.197.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.187.197.221.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:31:55 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 221.197.187.139.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 221.197.187.139.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
145.239.210.220 attack
Dec 14 08:03:29 tdfoods sshd\[25491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip220.ip-145-239-210.eu  user=mysql
Dec 14 08:03:32 tdfoods sshd\[25491\]: Failed password for mysql from 145.239.210.220 port 45753 ssh2
Dec 14 08:12:59 tdfoods sshd\[26497\]: Invalid user activemq from 145.239.210.220
Dec 14 08:12:59 tdfoods sshd\[26497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip220.ip-145-239-210.eu
Dec 14 08:13:01 tdfoods sshd\[26497\]: Failed password for invalid user activemq from 145.239.210.220 port 49762 ssh2
2019-12-15 02:14:14
178.116.236.42 attack
Dec 14 20:01:23 pkdns2 sshd\[29958\]: Invalid user vic from 178.116.236.42Dec 14 20:01:25 pkdns2 sshd\[29958\]: Failed password for invalid user vic from 178.116.236.42 port 53000 ssh2Dec 14 20:01:53 pkdns2 sshd\[29966\]: Invalid user giacomini from 178.116.236.42Dec 14 20:01:55 pkdns2 sshd\[29966\]: Failed password for invalid user giacomini from 178.116.236.42 port 55080 ssh2Dec 14 20:02:26 pkdns2 sshd\[29997\]: Failed password for root from 178.116.236.42 port 57160 ssh2Dec 14 20:02:58 pkdns2 sshd\[30015\]: Invalid user kjs from 178.116.236.42
...
2019-12-15 02:45:13
217.112.142.136 attackbots
Lines containing failures of 217.112.142.136
Dec 14 15:20:08 shared01 postfix/smtpd[10589]: connect from sugar.yobaat.com[217.112.142.136]
Dec 14 15:20:08 shared01 policyd-spf[19676]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=217.112.142.136; helo=sugar.moveincool.com; envelope-from=x@x
Dec x@x
Dec 14 15:20:08 shared01 postfix/smtpd[10589]: disconnect from sugar.yobaat.com[217.112.142.136] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Dec 14 15:22:43 shared01 postfix/smtpd[18634]: connect from sugar.yobaat.com[217.112.142.136]
Dec 14 15:22:43 shared01 policyd-spf[23524]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=217.112.142.136; helo=sugar.moveincool.com; envelope-from=x@x
Dec x@x
Dec 14 15:22:43 shared01 postfix/smtpd[18634]: disconnect from sugar.yobaat.com[217.112.142.136] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Dec 14 15:23:01 shared01 postfix/smtpd[10586]: connect from sugar.........
------------------------------
2019-12-15 02:35:15
112.85.42.172 attackspambots
Dec 14 19:27:48 localhost sshd\[11696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Dec 14 19:27:50 localhost sshd\[11696\]: Failed password for root from 112.85.42.172 port 54414 ssh2
Dec 14 19:27:54 localhost sshd\[11696\]: Failed password for root from 112.85.42.172 port 54414 ssh2
2019-12-15 02:55:31
31.24.236.13 attackbotsspam
--- report ---
Dec 14 14:54:33 sshd: Connection from 31.24.236.13 port 34096
Dec 14 14:54:35 sshd: Invalid user brigg from 31.24.236.13
Dec 14 14:54:35 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.24.236.13
Dec 14 14:54:38 sshd: Failed password for invalid user brigg from 31.24.236.13 port 34096 ssh2
Dec 14 14:54:38 sshd: Received disconnect from 31.24.236.13: 11: Bye Bye [preauth]
2019-12-15 02:18:49
202.151.30.141 attack
Dec 14 07:34:03 eddieflores sshd\[10343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.151.30.141  user=root
Dec 14 07:34:05 eddieflores sshd\[10343\]: Failed password for root from 202.151.30.141 port 37266 ssh2
Dec 14 07:41:52 eddieflores sshd\[11131\]: Invalid user paillet from 202.151.30.141
Dec 14 07:41:52 eddieflores sshd\[11131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.151.30.141
Dec 14 07:41:54 eddieflores sshd\[11131\]: Failed password for invalid user paillet from 202.151.30.141 port 43634 ssh2
2019-12-15 02:13:03
123.31.24.142 attack
xmlrpc attack
2019-12-15 02:55:09
217.182.95.16 attackbots
--- report ---
Dec 14 14:58:19 sshd: Connection from 217.182.95.16 port 53742
Dec 14 14:58:20 sshd: Invalid user anjan from 217.182.95.16
Dec 14 14:58:20 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.95.16
Dec 14 14:58:21 sshd: Failed password for invalid user anjan from 217.182.95.16 port 53742 ssh2
Dec 14 14:58:22 sshd: Received disconnect from 217.182.95.16: 11: Bye Bye [preauth]
2019-12-15 02:12:30
51.91.212.81 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 42 - port: 2096 proto: TCP cat: Misc Attack
2019-12-15 02:40:19
138.68.86.55 attackspambots
Dec 14 20:09:39 hosting sshd[394]: Invalid user offill from 138.68.86.55 port 59068
...
2019-12-15 02:48:57
221.132.85.120 attackspambots
$f2bV_matches
2019-12-15 02:28:47
175.147.163.37 attackspam
" "
2019-12-15 02:26:13
156.213.112.189 attack
Dec 15 00:49:27 our-server-hostname postfix/smtpd[8407]: connect from unknown[156.213.112.189]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=156.213.112.189
2019-12-15 02:48:31
69.94.143.12 attackspam
2019-12-14T15:42:32.103685stark.klein-stark.info postfix/smtpd\[21510\]: NOQUEUE: reject: RCPT from tasteful.nabhaa.com\[69.94.143.12\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-15 02:56:00
60.189.114.107 attack
Dec 14 09:23:19 esmtp postfix/smtpd[22958]: lost connection after AUTH from unknown[60.189.114.107]
Dec 14 09:23:26 esmtp postfix/smtpd[22958]: lost connection after AUTH from unknown[60.189.114.107]
Dec 14 09:23:48 esmtp postfix/smtpd[22958]: lost connection after AUTH from unknown[60.189.114.107]
Dec 14 09:24:07 esmtp postfix/smtpd[22958]: lost connection after AUTH from unknown[60.189.114.107]
Dec 14 09:24:51 esmtp postfix/smtpd[22958]: lost connection after AUTH from unknown[60.189.114.107]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.189.114.107
2019-12-15 02:33:06

最近上报的IP列表

198.172.118.103 155.168.174.244 49.206.122.156 94.242.9.97
201.132.112.225 182.104.12.67 87.152.12.151 40.185.254.12
89.111.30.100 33.150.15.116 157.250.86.184 166.121.48.221
237.227.214.124 121.33.195.154 48.101.68.75 97.115.96.98
85.244.206.20 12.167.113.16 73.163.24.6 156.49.24.125