必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.196.221.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.196.221.201.		IN	A

;; AUTHORITY SECTION:
.			134	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:03:12 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 201.221.196.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.221.196.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
40.121.130.23 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-27 16:45:36
118.114.244.27 attackbotsspam
Nov 27 09:18:02 vps666546 sshd\[26967\]: Invalid user tamakisa from 118.114.244.27 port 28445
Nov 27 09:18:02 vps666546 sshd\[26967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.114.244.27
Nov 27 09:18:04 vps666546 sshd\[26967\]: Failed password for invalid user tamakisa from 118.114.244.27 port 28445 ssh2
Nov 27 09:22:51 vps666546 sshd\[27043\]: Invalid user funeral from 118.114.244.27 port 18989
Nov 27 09:22:51 vps666546 sshd\[27043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.114.244.27
...
2019-11-27 16:41:42
62.217.225.178 attack
RDP Bruteforce
2019-11-27 16:43:30
181.115.168.69 attackbots
postfix (unknown user, SPF fail or relay access denied)
2019-11-27 17:02:36
49.81.159.214 attack
Email spam message
2019-11-27 16:55:50
112.30.133.241 attackspambots
Invalid user annamaria from 112.30.133.241 port 59442
2019-11-27 16:52:15
218.92.0.156 attack
Nov 26 23:00:33 eddieflores sshd\[7581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.156  user=root
Nov 26 23:00:35 eddieflores sshd\[7581\]: Failed password for root from 218.92.0.156 port 8344 ssh2
Nov 26 23:00:51 eddieflores sshd\[7604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.156  user=root
Nov 26 23:00:53 eddieflores sshd\[7604\]: Failed password for root from 218.92.0.156 port 44378 ssh2
Nov 26 23:00:56 eddieflores sshd\[7604\]: Failed password for root from 218.92.0.156 port 44378 ssh2
2019-11-27 17:01:34
49.234.211.228 attackbotsspam
Port scan on 3 port(s): 2375 2376 2377
2019-11-27 16:42:56
46.218.7.227 attack
Nov 26 22:25:18 auw2 sshd\[10012\]: Invalid user ts3serverbot from 46.218.7.227
Nov 26 22:25:18 auw2 sshd\[10012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
Nov 26 22:25:20 auw2 sshd\[10012\]: Failed password for invalid user ts3serverbot from 46.218.7.227 port 41719 ssh2
Nov 26 22:31:29 auw2 sshd\[10463\]: Invalid user eijsink from 46.218.7.227
Nov 26 22:31:29 auw2 sshd\[10463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
2019-11-27 16:40:38
218.92.0.137 attackspam
Nov 27 09:25:22 fr01 sshd[11280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.137  user=root
Nov 27 09:25:24 fr01 sshd[11280]: Failed password for root from 218.92.0.137 port 40381 ssh2
...
2019-11-27 16:31:16
60.250.50.235 attackspambots
Nov 27 09:24:09 vtv3 sshd[24829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.50.235 
Nov 27 09:24:11 vtv3 sshd[24829]: Failed password for invalid user admin from 60.250.50.235 port 33534 ssh2
Nov 27 09:29:01 vtv3 sshd[27197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.50.235 
Nov 27 10:08:33 vtv3 sshd[12515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.50.235 
Nov 27 10:08:35 vtv3 sshd[12515]: Failed password for invalid user gutto from 60.250.50.235 port 35705 ssh2
Nov 27 10:13:18 vtv3 sshd[14575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.50.235 
Nov 27 10:31:45 vtv3 sshd[23157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.50.235 
Nov 27 10:31:47 vtv3 sshd[23157]: Failed password for invalid user kokila from 60.250.50.235 port 40523 ssh2
Nov 27 10:38:5
2019-11-27 16:59:02
77.77.149.170 attackbots
Detected by ModSecurity. Request URI: /.well-known/pki-validation/00F79153117348CAD686244EB2902156.txt
2019-11-27 16:51:03
49.88.112.60 attackbots
Nov 27 10:23:53 pkdns2 sshd\[35869\]: Failed password for root from 49.88.112.60 port 48835 ssh2Nov 27 10:24:10 pkdns2 sshd\[35895\]: Failed password for root from 49.88.112.60 port 37935 ssh2Nov 27 10:24:39 pkdns2 sshd\[35900\]: Failed password for root from 49.88.112.60 port 10110 ssh2Nov 27 10:25:17 pkdns2 sshd\[35976\]: Failed password for root from 49.88.112.60 port 58945 ssh2Nov 27 10:25:48 pkdns2 sshd\[35978\]: Failed password for root from 49.88.112.60 port 42404 ssh2Nov 27 10:25:51 pkdns2 sshd\[35978\]: Failed password for root from 49.88.112.60 port 42404 ssh2
...
2019-11-27 16:39:08
77.247.108.56 attackbots
11/27/2019-01:42:22.014195 77.247.108.56 Protocol: 17 ET SCAN Sipvicious Scan
2019-11-27 16:57:53
123.136.161.146 attackspambots
sshd jail - ssh hack attempt
2019-11-27 16:38:41

最近上报的IP列表

139.196.215.44 139.196.23.140 139.196.222.25 139.196.233.202
139.196.249.125 139.196.24.88 139.196.249.207 139.196.250.119
139.196.250.199 139.196.28.122 139.196.29.246 139.196.36.248
139.196.3.150 139.196.43.176 139.196.8.94 139.198.1.205
139.196.82.176 139.196.40.122 139.196.37.244 139.198.122.132