必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.249.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.194.249.150.		IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:16:49 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
150.249.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-249-150.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.249.194.139.in-addr.arpa	name = fm-dyn-139-194-249-150.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.94 attack
SSH Brute Force
2020-05-12 07:59:55
36.7.80.168 attack
Multiport scan 39 ports : 656 1418 5184 5465 6072 6543 6826 7709 8324 8462 8626 8727 9753 11204 11584 12262 12804 13599 13674 13828 14306 14814 16242 17077 17163 17562 17863 19220 19801 20428 22082 24026 25768 27908 27968 28213 29151 29627 32143
2020-05-12 08:17:01
80.82.64.219 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 3389 proto: TCP cat: Misc Attack
2020-05-12 08:42:24
94.102.50.144 attack
May 12 00:25:31 debian-2gb-nbg1-2 kernel: \[11494796.919649\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.50.144 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=45914 PROTO=TCP SPT=44429 DPT=33895 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 08:31:49
79.124.62.66 attackspam
05/11/2020-20:26:57.036568 79.124.62.66 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-12 08:43:24
185.175.93.24 attackbots
May 12 02:13:30 debian-2gb-nbg1-2 kernel: \[11501275.196961\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.24 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48359 PROTO=TCP SPT=58820 DPT=5904 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 08:21:22
66.117.12.196 attackspam
Multiport scan 47 ports : 395 2107 2186 2483 4012 4943 5047 6595 7261 7679 7998 8657 9035 10445 10519 11339 13291 13533 13667 13808 15248 15284 15647 15788 15995 16006 17328 17908 18494 20311 21519 22680 22706 23272 23875 23972 24982 25211 25394 26200 26482 27171 28141 28514 29865 29938 32354
2020-05-12 08:46:17
92.118.234.234 attackspam
*Port Scan* detected from 92.118.234.234 (US/United States/California/Los Angeles/-). 4 hits in the last 130 seconds
2020-05-12 08:33:22
146.185.180.60 attackspam
May 12 01:48:29 mail sshd\[25766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.180.60  user=root
May 12 01:48:31 mail sshd\[25766\]: Failed password for root from 146.185.180.60 port 41371 ssh2
May 12 01:55:46 mail sshd\[25905\]: Invalid user postgres from 146.185.180.60
May 12 01:55:46 mail sshd\[25905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.180.60
...
2020-05-12 07:57:30
185.175.93.104 attackspambots
05/11/2020-20:00:04.334432 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-12 08:21:07
92.118.234.242 attackspam
*Port Scan* detected from 92.118.234.242 (US/United States/California/Los Angeles/-). 4 hits in the last 40 seconds
2020-05-12 08:32:57
185.153.198.240 attackspambots
May 12 01:32:25 debian-2gb-nbg1-2 kernel: \[11498810.427960\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.198.240 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=23210 PROTO=TCP SPT=47666 DPT=15157 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 07:53:03
111.53.195.115 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-12 08:26:18
94.191.71.213 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 20375 proto: TCP cat: Misc Attack
2020-05-12 08:29:38
187.188.156.72 attackspambots
1433/tcp 445/tcp...
[2020-03-27/05-10]6pkt,2pt.(tcp)
2020-05-12 07:52:46

最近上报的IP列表

139.194.243.28 139.194.248.196 139.194.251.133 139.194.243.33
139.194.251.112 139.194.249.86 139.194.251.146 139.194.251.115
139.194.251.239 7.235.93.7 139.194.252.206 139.194.252.255
118.24.81.122 139.194.253.129 139.194.27.165 139.194.254.240
139.194.255.41 139.194.3.138 139.194.27.166 139.194.3.124