必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.240.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.194.240.46.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:16:46 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
46.240.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-240-46.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.240.194.139.in-addr.arpa	name = fm-dyn-139-194-240-46.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.55.231.94 attack
Brute-force attempt banned
2020-05-01 17:31:20
178.128.215.16 attackspam
May  1 12:17:32 ift sshd\[6378\]: Failed password for root from 178.128.215.16 port 57126 ssh2May  1 12:21:44 ift sshd\[7116\]: Invalid user cdn from 178.128.215.16May  1 12:21:46 ift sshd\[7116\]: Failed password for invalid user cdn from 178.128.215.16 port 40070 ssh2May  1 12:26:02 ift sshd\[7875\]: Invalid user tf from 178.128.215.16May  1 12:26:03 ift sshd\[7875\]: Failed password for invalid user tf from 178.128.215.16 port 51256 ssh2
...
2020-05-01 17:51:12
183.111.206.111 attackbots
2020-05-01T04:21:54.459649abusebot-5.cloudsearch.cf sshd[31892]: Invalid user vagrant from 183.111.206.111 port 38961
2020-05-01T04:21:54.466389abusebot-5.cloudsearch.cf sshd[31892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.206.111
2020-05-01T04:21:54.459649abusebot-5.cloudsearch.cf sshd[31892]: Invalid user vagrant from 183.111.206.111 port 38961
2020-05-01T04:21:56.405932abusebot-5.cloudsearch.cf sshd[31892]: Failed password for invalid user vagrant from 183.111.206.111 port 38961 ssh2
2020-05-01T04:28:41.922790abusebot-5.cloudsearch.cf sshd[31996]: Invalid user natural from 183.111.206.111 port 14673
2020-05-01T04:28:41.929816abusebot-5.cloudsearch.cf sshd[31996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.206.111
2020-05-01T04:28:41.922790abusebot-5.cloudsearch.cf sshd[31996]: Invalid user natural from 183.111.206.111 port 14673
2020-05-01T04:28:44.411132abusebot-5.cloudsearc
...
2020-05-01 17:49:51
150.223.8.92 attackspam
hit -> srv3:22
2020-05-01 17:59:15
188.166.16.118 attack
Invalid user sinusbot from 188.166.16.118 port 48830
2020-05-01 17:47:11
49.247.131.96 attackbots
Invalid user ywb from 49.247.131.96 port 35500
2020-05-01 17:27:26
200.89.174.235 attackbots
Invalid user testsftp from 200.89.174.235 port 35138
2020-05-01 17:44:55
35.227.108.34 attack
Invalid user vega from 35.227.108.34 port 50718
2020-05-01 17:33:57
207.107.139.150 attackbotsspam
Invalid user admin from 207.107.139.150 port 33044
2020-05-01 17:41:54
60.251.57.189 attackspam
Invalid user xc from 60.251.57.189 port 45798
2020-05-01 17:22:39
13.232.125.150 attackbots
Invalid user cj from 13.232.125.150 port 32835
2020-05-01 17:35:53
134.175.87.31 attack
May  1 08:56:42 localhost sshd[75549]: Invalid user liza from 134.175.87.31 port 40374
May  1 08:56:42 localhost sshd[75549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.87.31
May  1 08:56:42 localhost sshd[75549]: Invalid user liza from 134.175.87.31 port 40374
May  1 08:56:44 localhost sshd[75549]: Failed password for invalid user liza from 134.175.87.31 port 40374 ssh2
May  1 09:05:04 localhost sshd[76486]: Invalid user test3 from 134.175.87.31 port 49316
...
2020-05-01 18:04:47
137.117.80.185 attackspambots
Invalid user jetty from 137.117.80.185 port 42476
2020-05-01 18:04:17
41.63.1.38 attackbots
Brute-force attempt banned
2020-05-01 17:33:08
188.106.30.252 attackbots
Invalid user team2 from 188.106.30.252 port 34639
2020-05-01 17:48:23

最近上报的IP列表

139.194.241.117 139.194.240.41 139.194.242.87 139.194.240.105
139.194.243.1 118.24.8.55 139.194.243.28 139.194.249.150
139.194.248.196 139.194.251.133 139.194.243.33 139.194.251.112
139.194.249.86 139.194.251.146 139.194.251.115 139.194.251.239
7.235.93.7 139.194.252.206 139.194.252.255 118.24.81.122