必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.213.174.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.213.174.119.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 14:58:58 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
119.174.213.139.in-addr.arpa domain name pointer 119.174.213.139.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.174.213.139.in-addr.arpa	name = 119.174.213.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.155.35.47 attack
B: Abusive ssh attack
2020-09-17 07:58:56
74.120.14.23 attackspam
Brute force attack stopped by firewall
2020-09-17 08:20:35
110.164.151.100 attackspam
 TCP (SYN) 110.164.151.100:9278 -> port 445, len 52
2020-09-17 07:55:49
58.208.84.93 attackbots
SSH Brute Force
2020-09-17 08:20:48
111.229.251.83 attackspam
Fail2Ban - HTTP Auth Bruteforce Attempt
2020-09-17 08:22:03
83.27.189.9 attackbotsspam
Automatic report - Port Scan Attack
2020-09-17 08:17:29
128.70.223.234 attackspambots
Honeypot attack, port: 445, PTR: 128-70-223-234.broadband.corbina.ru.
2020-09-17 08:23:18
197.5.145.88 attackbotsspam
SSH Bruteforce Attempt on Honeypot
2020-09-17 08:02:56
45.55.60.215 attackbots
Trolling for resource vulnerabilities
2020-09-17 08:33:28
79.166.186.140 attackbots
Hits on port : 23
2020-09-17 08:15:18
89.178.206.37 attackspambots
Honeypot attack, port: 81, PTR: 89-178-206-37.broadband.corbina.ru.
2020-09-17 08:13:35
222.186.169.194 attack
Sep 17 02:06:11 eventyay sshd[4869]: Failed password for root from 222.186.169.194 port 20362 ssh2
Sep 17 02:06:21 eventyay sshd[4869]: Failed password for root from 222.186.169.194 port 20362 ssh2
Sep 17 02:06:24 eventyay sshd[4869]: Failed password for root from 222.186.169.194 port 20362 ssh2
Sep 17 02:06:24 eventyay sshd[4869]: error: maximum authentication attempts exceeded for root from 222.186.169.194 port 20362 ssh2 [preauth]
...
2020-09-17 08:18:44
176.195.139.130 attackspam
Honeypot attack, port: 445, PTR: ip-176-195-139-130.bb.netbynet.ru.
2020-09-17 08:32:02
167.114.113.141 attackspam
detected by Fail2Ban
2020-09-17 08:10:40
98.248.156.94 attackbots
"fail2ban match"
2020-09-17 08:33:14

最近上报的IP列表

204.2.135.217 197.161.193.170 253.212.126.172 49.119.215.71
217.249.238.109 165.117.87.211 91.45.46.212 172.141.22.72
54.195.42.212 115.150.158.161 171.235.25.27 130.201.230.162
189.250.226.175 198.187.145.168 239.78.106.218 14.19.75.139
58.51.59.111 144.131.237.42 130.249.10.137 211.152.138.206