必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.213.34.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.213.34.233.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:37:45 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
233.34.213.139.in-addr.arpa domain name pointer 233.34.213.139.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
233.34.213.139.in-addr.arpa	name = 233.34.213.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.233.240.94 attackbotsspam
Jul  9 20:08:25 ws12vmsma01 sshd[15467]: Invalid user http from 58.233.240.94
Jul  9 20:08:27 ws12vmsma01 sshd[15467]: Failed password for invalid user http from 58.233.240.94 port 54194 ssh2
Jul  9 20:15:34 ws12vmsma01 sshd[16698]: Invalid user huey from 58.233.240.94
...
2020-07-10 07:51:10
68.183.19.26 attackbots
2020-07-10T02:17:07.211822snf-827550 sshd[3089]: Invalid user sfc from 68.183.19.26 port 34454
2020-07-10T02:17:09.082335snf-827550 sshd[3089]: Failed password for invalid user sfc from 68.183.19.26 port 34454 ssh2
2020-07-10T02:21:37.566334snf-827550 sshd[3140]: Invalid user sharaine from 68.183.19.26 port 58422
...
2020-07-10 08:03:14
41.221.86.21 attackspambots
Jul  9 23:36:05 odroid64 sshd\[16490\]: Invalid user minecraft from 41.221.86.21
Jul  9 23:36:05 odroid64 sshd\[16490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.86.21
...
2020-07-10 08:03:00
185.97.116.165 attackspambots
Jul  9 20:54:37 dignus sshd[3876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165  user=mail
Jul  9 20:54:39 dignus sshd[3876]: Failed password for mail from 185.97.116.165 port 48232 ssh2
Jul  9 20:57:56 dignus sshd[4213]: Invalid user test from 185.97.116.165 port 43998
Jul  9 20:57:56 dignus sshd[4213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165
Jul  9 20:57:58 dignus sshd[4213]: Failed password for invalid user test from 185.97.116.165 port 43998 ssh2
...
2020-07-10 12:06:08
167.99.73.254 attack
Jul 10 02:01:20 lnxded64 sshd[8957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.73.254
Jul 10 02:01:20 lnxded64 sshd[8957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.73.254
2020-07-10 08:10:43
123.207.185.54 attackspam
Jul  9 22:18:10 * sshd[18023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.185.54
Jul  9 22:18:11 * sshd[18023]: Failed password for invalid user carlo from 123.207.185.54 port 60312 ssh2
2020-07-10 07:58:58
179.106.32.109 attack
$f2bV_matches
2020-07-10 08:00:23
222.186.175.23 attackspambots
Jul  9 17:04:08 dignus sshd[16077]: Failed password for root from 222.186.175.23 port 55843 ssh2
Jul  9 17:04:10 dignus sshd[16098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Jul  9 17:04:12 dignus sshd[16098]: Failed password for root from 222.186.175.23 port 30569 ssh2
Jul  9 17:04:18 dignus sshd[16109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Jul  9 17:04:20 dignus sshd[16109]: Failed password for root from 222.186.175.23 port 50122 ssh2
...
2020-07-10 08:08:48
203.160.165.2 attackspambots
20/7/9@16:18:01: FAIL: Alarm-Network address from=203.160.165.2
...
2020-07-10 08:08:59
180.76.156.150 attack
Jul 10 02:58:30 journals sshd\[113384\]: Invalid user sviluppo from 180.76.156.150
Jul 10 02:58:30 journals sshd\[113384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.156.150
Jul 10 02:58:33 journals sshd\[113384\]: Failed password for invalid user sviluppo from 180.76.156.150 port 59574 ssh2
Jul 10 03:02:03 journals sshd\[113789\]: Invalid user students from 180.76.156.150
Jul 10 03:02:03 journals sshd\[113789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.156.150
...
2020-07-10 08:06:16
185.175.93.34 botsattack
Im new to all this but what i do know is that this ip address is my router source at different times of the day. Why is that?
2020-07-10 10:00:13
64.111.121.238 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-10 07:51:46
193.228.109.190 attack
Jul 10 05:41:16 server sshd[19989]: Failed password for invalid user zcx from 193.228.109.190 port 50010 ssh2
Jul 10 05:52:46 server sshd[28929]: Failed password for invalid user harry from 193.228.109.190 port 58030 ssh2
Jul 10 05:58:03 server sshd[32748]: Failed password for invalid user regina from 193.228.109.190 port 55144 ssh2
2020-07-10 12:00:53
78.42.135.89 attackspambots
$f2bV_matches
2020-07-10 07:58:09
244.234.254.108 attackspambots
CMS Bruteforce / WebApp Attack attempt
2020-07-10 08:16:22

最近上报的IP列表

190.0.0.249 43.69.242.247 127.155.0.56 241.212.111.253
65.50.37.5 211.194.219.78 218.154.231.85 182.218.218.147
224.115.192.214 239.33.243.117 3.5.134.123 45.11.96.6
246.220.242.37 236.62.85.49 80.232.233.230 77.117.97.249
241.116.38.200 249.233.48.250 246.168.13.230 165.81.250.5