必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Batam

省份(region): Riau Islands

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 139.194.146.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;139.194.146.157.		IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:42:34 CST 2021
;; MSG SIZE  rcvd: 44

'
HOST信息:
157.146.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-146-157.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.146.194.139.in-addr.arpa	name = fm-dyn-139-194-146-157.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.68.93.14 attackspam
$f2bV_matches
2020-03-26 22:35:56
110.53.234.251 attack
ICMP MH Probe, Scan /Distributed -
2020-03-26 22:41:24
110.53.234.32 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-03-26 22:31:02
185.234.217.193 attack
2020-03-26T07:27:33.374641linuxbox-skyline auth[42111]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=recovery rhost=185.234.217.193
...
2020-03-26 22:08:53
61.244.196.102 attackspam
61.244.196.102 - - \[26/Mar/2020:13:24:33 +0100\] "POST /wp-login.php HTTP/1.0" 200 6640 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
61.244.196.102 - - \[26/Mar/2020:13:24:37 +0100\] "POST /wp-login.php HTTP/1.0" 200 6618 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
61.244.196.102 - - \[26/Mar/2020:13:24:39 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-03-26 22:34:53
99.185.76.161 attackspambots
Brute force acceess on sshd
2020-03-26 22:22:07
178.141.97.71 attackbotsspam
1585225493 - 03/26/2020 13:24:53 Host: 178.141.97.71/178.141.97.71 Port: 445 TCP Blocked
2020-03-26 22:16:31
180.76.171.53 attack
Brute force acceess on sshd
2020-03-26 22:20:49
104.186.44.88 attack
Mar 26 16:15:27 site3 sshd\[85354\]: Invalid user imai from 104.186.44.88
Mar 26 16:15:27 site3 sshd\[85354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.186.44.88
Mar 26 16:15:29 site3 sshd\[85354\]: Failed password for invalid user imai from 104.186.44.88 port 60762 ssh2
Mar 26 16:21:59 site3 sshd\[85391\]: Invalid user jose from 104.186.44.88
Mar 26 16:21:59 site3 sshd\[85391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.186.44.88
...
2020-03-26 22:34:34
185.164.72.133 attackbots
Invalid user admin from 185.164.72.133 port 46922
2020-03-26 22:04:32
182.77.7.181 attack
Email rejected due to spam filtering
2020-03-26 21:48:41
61.160.82.82 attack
SSH invalid-user multiple login try
2020-03-26 22:07:51
85.13.95.142 attack
Email rejected due to spam filtering
2020-03-26 22:02:04
35.199.154.128 attackbots
Invalid user oracle from 35.199.154.128 port 44226
2020-03-26 21:59:42
194.26.29.112 attack
Mar 26 15:33:34 debian-2gb-nbg1-2 kernel: \[7492289.026321\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.112 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=41724 PROTO=TCP SPT=50316 DPT=4105 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 22:38:56

最近上报的IP列表

144.91.112.83 178.156.67.172 213.7.7.44 193.136.137.251
37.120.151.123 202.57.24.164 189.112.63.207 195.211.231.172
2409:4050:2e13:e0d5:b822:a81a:c300:2b49 136.158.29.236 167.172.131.4 66.228.39.215
130.127.133.99 202.45.144.238 92.222.221.49 94.134.103.58
110.137.113.116 117.247.200.54 13.82.60.31 138.186.239.54