必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.221.246.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.221.246.120.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:32:08 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 120.246.221.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.246.221.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.93.255.108 attackspambots
2020-09-20T03:57:10.218070hostname sshd[82145]: Failed password for root from 201.93.255.108 port 57098 ssh2
...
2020-09-22 05:56:07
46.101.157.11 attackbotsspam
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2020-09-21T17:03:53Z and 2020-09-21T17:03:54Z
2020-09-22 05:33:36
189.202.204.230 attackspam
Sep 21 21:43:10 vps-51d81928 sshd[266233]: Invalid user raul from 189.202.204.230 port 58299
Sep 21 21:43:10 vps-51d81928 sshd[266233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.202.204.230 
Sep 21 21:43:10 vps-51d81928 sshd[266233]: Invalid user raul from 189.202.204.230 port 58299
Sep 21 21:43:12 vps-51d81928 sshd[266233]: Failed password for invalid user raul from 189.202.204.230 port 58299 ssh2
Sep 21 21:46:41 vps-51d81928 sshd[266348]: Invalid user monitor from 189.202.204.230 port 55434
...
2020-09-22 05:51:44
103.75.197.26 attackbots
Sep 21 18:57:43 mail.srvfarm.net postfix/smtps/smtpd[2949479]: warning: unknown[103.75.197.26]: SASL PLAIN authentication failed: 
Sep 21 18:57:44 mail.srvfarm.net postfix/smtps/smtpd[2949479]: lost connection after AUTH from unknown[103.75.197.26]
Sep 21 18:58:16 mail.srvfarm.net postfix/smtpd[2954550]: warning: unknown[103.75.197.26]: SASL PLAIN authentication failed: 
Sep 21 18:58:17 mail.srvfarm.net postfix/smtpd[2954550]: lost connection after AUTH from unknown[103.75.197.26]
Sep 21 19:03:11 mail.srvfarm.net postfix/smtps/smtpd[2951945]: warning: unknown[103.75.197.26]: SASL PLAIN authentication failed:
2020-09-22 05:23:25
51.68.11.195 attackspam
CMS (WordPress or Joomla) login attempt.
2020-09-22 05:47:54
159.65.13.233 attackspambots
2020-09-21 23:13:20 wonderland sshd[16533]: Disconnected from invalid user root 159.65.13.233 port 57486 [preauth]
2020-09-22 05:52:52
68.183.146.249 attackbotsspam
68.183.146.249 - - [21/Sep/2020:23:09:04 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - [21/Sep/2020:23:09:07 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - [21/Sep/2020:23:09:08 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-22 05:38:23
37.152.163.168 attack
Sep 21 18:53:30 mail.srvfarm.net postfix/smtpd[2952593]: warning: unknown[37.152.163.168]: SASL PLAIN authentication failed: 
Sep 21 18:53:30 mail.srvfarm.net postfix/smtpd[2952593]: lost connection after AUTH from unknown[37.152.163.168]
Sep 21 18:53:51 mail.srvfarm.net postfix/smtpd[2952345]: warning: unknown[37.152.163.168]: SASL PLAIN authentication failed: 
Sep 21 18:53:51 mail.srvfarm.net postfix/smtpd[2952345]: lost connection after AUTH from unknown[37.152.163.168]
Sep 21 19:02:42 mail.srvfarm.net postfix/smtps/smtpd[2954180]: warning: unknown[37.152.163.168]: SASL PLAIN authentication failed: 
Sep 21 19:02:42 mail.srvfarm.net postfix/smtps/smtpd[2954180]: lost connection after AUTH from unknown[37.152.163.168]
2020-09-22 05:24:57
51.178.83.124 attackspambots
2020-09-21T20:24:17.357612server.espacesoutien.com sshd[4978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.83.124  user=root
2020-09-21T20:24:19.180467server.espacesoutien.com sshd[4978]: Failed password for root from 51.178.83.124 port 34060 ssh2
2020-09-21T20:27:31.212871server.espacesoutien.com sshd[5678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.83.124  user=root
2020-09-21T20:27:33.000542server.espacesoutien.com sshd[5678]: Failed password for root from 51.178.83.124 port 43910 ssh2
...
2020-09-22 05:33:17
112.85.42.102 attackspam
Sep 21 21:56:40 vps-51d81928 sshd[266660]: Failed password for root from 112.85.42.102 port 29827 ssh2
Sep 21 21:57:53 vps-51d81928 sshd[266709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 21 21:57:55 vps-51d81928 sshd[266709]: Failed password for root from 112.85.42.102 port 41908 ssh2
Sep 21 21:59:00 vps-51d81928 sshd[266747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 21 21:59:02 vps-51d81928 sshd[266747]: Failed password for root from 112.85.42.102 port 58706 ssh2
...
2020-09-22 05:59:58
211.20.1.233 attack
Invalid user mcserver from 211.20.1.233 port 57508
2020-09-22 05:35:29
222.186.180.223 attackbots
Failed password for root from 222.186.180.223 port 51294 ssh2
Failed password for root from 222.186.180.223 port 51294 ssh2
Failed password for root from 222.186.180.223 port 51294 ssh2
Failed password for root from 222.186.180.223 port 51294 ssh2
2020-09-22 05:58:35
129.204.253.70 attack
Sep 21 21:46:14 vserver sshd\[8373\]: Invalid user webmaster from 129.204.253.70Sep 21 21:46:15 vserver sshd\[8373\]: Failed password for invalid user webmaster from 129.204.253.70 port 50694 ssh2Sep 21 21:50:05 vserver sshd\[8436\]: Failed password for root from 129.204.253.70 port 59816 ssh2Sep 21 21:54:00 vserver sshd\[8468\]: Invalid user x86_64 from 129.204.253.70
...
2020-09-22 05:48:39
51.15.243.117 attack
SSH bruteforce
2020-09-22 06:01:27
83.167.87.198 attackspam
2020-09-21T20:03:29.841266ollin.zadara.org sshd[917203]: Invalid user webadmin from 83.167.87.198 port 44101
2020-09-21T20:03:32.043051ollin.zadara.org sshd[917203]: Failed password for invalid user webadmin from 83.167.87.198 port 44101 ssh2
...
2020-09-22 05:59:42

最近上报的IP列表

197.125.111.117 20.202.38.211 179.127.186.55 89.129.175.18
185.191.137.6 244.228.156.40 61.39.22.215 233.121.30.52
84.79.205.126 193.100.12.15 77.186.115.141 149.233.40.3
137.20.168.167 80.237.70.241 206.154.137.171 75.180.253.108
56.210.140.249 48.223.178.7 172.65.252.135 42.248.8.129