必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Shenzhen Tencent Computer Systems Company Limited

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.231.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44118
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.199.231.205.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062100 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 21 14:59:24 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 205.231.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 205.231.199.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.70.217.179 attackbotsspam
Sep 30 21:46:37 ift sshd\[48824\]: Failed password for root from 34.70.217.179 port 12240 ssh2Sep 30 21:50:03 ift sshd\[49276\]: Invalid user globalflash from 34.70.217.179Sep 30 21:50:06 ift sshd\[49276\]: Failed password for invalid user globalflash from 34.70.217.179 port 12250 ssh2Sep 30 21:53:29 ift sshd\[49519\]: Invalid user user1 from 34.70.217.179Sep 30 21:53:31 ift sshd\[49519\]: Failed password for invalid user user1 from 34.70.217.179 port 12246 ssh2
...
2020-10-01 02:58:10
45.178.141.20 attackbotsspam
Invalid user elastic from 45.178.141.20 port 49742
2020-10-01 02:52:08
148.70.33.136 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-01 02:52:26
14.248.64.180 attack
Attempted Email Sync. Password Hacking/Probing.
2020-10-01 03:06:25
36.250.5.117 attackbotsspam
Invalid user newharmony from 36.250.5.117 port 35070
2020-10-01 02:53:11
123.233.116.36 attackbots
Port Scan
...
2020-10-01 02:47:05
54.240.48.101 attackspambots
SpamScore above: 10.0
2020-10-01 03:12:25
108.58.170.198 attackspambots
Invalid user tester from 108.58.170.198 port 42690
2020-10-01 02:50:18
97.74.6.64 attackspam
fake user registration/login attempts
2020-10-01 02:58:35
176.59.115.90 attack
Attempted Email Sync. Password Hacking/Probing.
2020-10-01 03:04:35
80.79.158.29 attackspam
Sep 30 14:41:55 ny01 sshd[13151]: Failed password for root from 80.79.158.29 port 49738 ssh2
Sep 30 14:47:11 ny01 sshd[13809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.79.158.29
Sep 30 14:47:13 ny01 sshd[13809]: Failed password for invalid user admin from 80.79.158.29 port 58674 ssh2
2020-10-01 02:57:10
220.132.168.28 attackspam
SSH Scan
2020-10-01 02:53:54
103.139.212.208 attackbotsspam
[H1.VM10] Blocked by UFW
2020-10-01 03:04:53
123.16.70.144 attack
Attempted Email Sync. Password Hacking/Probing.
2020-10-01 03:01:24
51.15.12.78 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-01 02:46:37

最近上报的IP列表

195.35.164.156 165.53.253.29 104.160.190.194 219.114.125.83
94.240.14.115 112.81.195.53 59.93.63.123 49.77.2.11
133.80.156.219 206.153.218.45 171.240.216.188 83.209.143.189
195.91.155.114 94.195.24.201 141.105.111.244 193.194.92.254
125.113.1.130 8.182.86.185 61.163.159.200 92.145.132.253