必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.219.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.2.219.52.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032600 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 15:46:14 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 52.219.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.219.2.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.103.219.225 attackbots
email spam
2019-12-19 21:51:15
78.29.44.57 attackspambots
email spam
2019-12-19 22:04:13
203.114.102.69 attackspam
Dec 19 14:57:05 server sshd\[25055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69  user=root
Dec 19 14:57:08 server sshd\[25055\]: Failed password for root from 203.114.102.69 port 34632 ssh2
Dec 19 15:07:05 server sshd\[27806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69  user=mysql
Dec 19 15:07:07 server sshd\[27806\]: Failed password for mysql from 203.114.102.69 port 55938 ssh2
Dec 19 15:13:09 server sshd\[29279\]: Invalid user cradduck from 203.114.102.69
Dec 19 15:13:09 server sshd\[29279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69 
...
2019-12-19 22:28:34
128.199.162.108 attack
Invalid user zzzzzzzzzz from 128.199.162.108 port 57490
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108
Failed password for invalid user zzzzzzzzzz from 128.199.162.108 port 57490 ssh2
Invalid user cretin from 128.199.162.108 port 34284
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108
2019-12-19 21:58:13
181.115.221.254 attackbots
email spam
2019-12-19 21:54:30
79.187.192.249 attackspambots
Invalid user hg from 79.187.192.249 port 33758
2019-12-19 22:24:55
92.242.255.45 attackbotsspam
proto=tcp  .  spt=38492  .  dpt=25  .     (Found on   Blocklist de  Dec 18)     (478)
2019-12-19 22:02:14
168.194.83.18 attackbotsspam
email spam
2019-12-19 21:56:20
51.68.214.170 attack
WordPress login Brute force / Web App Attack on client site.
2019-12-19 22:13:08
203.110.179.26 attackbotsspam
Invalid user eds from 203.110.179.26 port 48182
2019-12-19 22:23:03
200.188.129.178 attackspambots
Invalid user busroh from 200.188.129.178 port 36288
2019-12-19 22:18:21
92.72.162.1 attack
email spam
2019-12-19 22:11:58
190.92.48.27 attack
email spam
2019-12-19 21:51:51
138.197.89.212 attackspam
Dec 19 04:17:18 web9 sshd\[4240\]: Invalid user meygan from 138.197.89.212
Dec 19 04:17:18 web9 sshd\[4240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
Dec 19 04:17:20 web9 sshd\[4240\]: Failed password for invalid user meygan from 138.197.89.212 port 52640 ssh2
Dec 19 04:22:47 web9 sshd\[5003\]: Invalid user bostyn from 138.197.89.212
Dec 19 04:22:47 web9 sshd\[5003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
2019-12-19 22:25:44
178.76.69.132 attackbots
email spam
2019-12-19 21:54:52

最近上报的IP列表

74.236.201.203 35.206.135.154 147.135.112.187 49.228.11.129
198.199.109.16 192.241.235.179 185.98.87.120 162.243.133.125
162.243.132.182 162.243.132.38 152.32.69.61 86.210.70.254
117.24.12.108 113.22.87.189 111.229.72.47 88.204.198.42
87.64.93.166 85.187.218.189 50.115.168.161 47.244.229.121