必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.221.246.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.221.246.120.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:32:08 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 120.246.221.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.246.221.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.73.123.118 attackbotsspam
Sep  6 15:54:12 wbs sshd\[5283\]: Invalid user steam from 182.73.123.118
Sep  6 15:54:12 wbs sshd\[5283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
Sep  6 15:54:15 wbs sshd\[5283\]: Failed password for invalid user steam from 182.73.123.118 port 17233 ssh2
Sep  6 15:58:55 wbs sshd\[5660\]: Invalid user vncuser from 182.73.123.118
Sep  6 15:58:55 wbs sshd\[5660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
2019-09-07 10:16:27
142.93.122.185 attackbotsspam
Sep  6 21:28:53 vps200512 sshd\[11879\]: Invalid user jenkins from 142.93.122.185
Sep  6 21:28:53 vps200512 sshd\[11879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.122.185
Sep  6 21:28:55 vps200512 sshd\[11879\]: Failed password for invalid user jenkins from 142.93.122.185 port 36102 ssh2
Sep  6 21:33:01 vps200512 sshd\[11960\]: Invalid user git from 142.93.122.185
Sep  6 21:33:01 vps200512 sshd\[11960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.122.185
2019-09-07 09:42:50
98.213.58.68 attackspambots
Sep  6 15:43:08 hcbb sshd\[27003\]: Invalid user git from 98.213.58.68
Sep  6 15:43:08 hcbb sshd\[27003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-213-58-68.hsd1.il.comcast.net
Sep  6 15:43:10 hcbb sshd\[27003\]: Failed password for invalid user git from 98.213.58.68 port 48396 ssh2
Sep  6 15:47:39 hcbb sshd\[27369\]: Invalid user testuser from 98.213.58.68
Sep  6 15:47:39 hcbb sshd\[27369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-213-58-68.hsd1.il.comcast.net
2019-09-07 09:56:07
128.199.61.80 attack
WordPress wp-login brute force :: 128.199.61.80 0.148 BYPASS [07/Sep/2019:10:44:26  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 4039 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-07 10:09:20
41.138.88.3 attackspambots
Sep  7 04:39:00 yabzik sshd[32314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.88.3
Sep  7 04:39:03 yabzik sshd[32314]: Failed password for invalid user radio from 41.138.88.3 port 36942 ssh2
Sep  7 04:44:01 yabzik sshd[1830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.88.3
2019-09-07 09:47:53
222.120.192.102 attack
Sep  7 02:50:14 [host] sshd[28479]: Invalid user police from 222.120.192.102
Sep  7 02:50:14 [host] sshd[28479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.120.192.102
Sep  7 02:50:16 [host] sshd[28479]: Failed password for invalid user police from 222.120.192.102 port 46396 ssh2
2019-09-07 10:15:43
186.42.103.181 attack
Sep  7 04:05:15 vps01 sshd[32684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.42.103.181
Sep  7 04:05:18 vps01 sshd[32684]: Failed password for invalid user frappe from 186.42.103.181 port 59178 ssh2
2019-09-07 10:31:30
138.197.172.198 attackbots
diesunddas.net 138.197.172.198 \[07/Sep/2019:02:44:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 8413 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
diesunddas.net 138.197.172.198 \[07/Sep/2019:02:44:02 +0200\] "POST /wp-login.php HTTP/1.1" 200 8413 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-07 10:23:46
182.61.133.172 attack
2019-09-07T01:47:39.074107abusebot-5.cloudsearch.cf sshd\[11417\]: Invalid user debian from 182.61.133.172 port 35768
2019-09-07 09:53:09
77.204.76.91 attack
Sep  7 04:23:29 site2 sshd\[4672\]: Invalid user admin from 77.204.76.91Sep  7 04:23:30 site2 sshd\[4672\]: Failed password for invalid user admin from 77.204.76.91 port 41173 ssh2Sep  7 04:27:22 site2 sshd\[4849\]: Invalid user user from 77.204.76.91Sep  7 04:27:24 site2 sshd\[4849\]: Failed password for invalid user user from 77.204.76.91 port 34628 ssh2Sep  7 04:31:12 site2 sshd\[5058\]: Invalid user ftpuser from 77.204.76.91
...
2019-09-07 09:45:51
220.181.108.120 attackspam
Automatic report - Banned IP Access
2019-09-07 09:58:13
35.232.92.131 attackspambots
Sep  6 15:31:06 lcprod sshd\[21357\]: Invalid user cactiuser from 35.232.92.131
Sep  6 15:31:06 lcprod sshd\[21357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.92.232.35.bc.googleusercontent.com
Sep  6 15:31:08 lcprod sshd\[21357\]: Failed password for invalid user cactiuser from 35.232.92.131 port 42250 ssh2
Sep  6 15:35:28 lcprod sshd\[21823\]: Invalid user ts from 35.232.92.131
Sep  6 15:35:28 lcprod sshd\[21823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.92.232.35.bc.googleusercontent.com
2019-09-07 09:48:21
104.248.56.37 attackbots
Sep  7 05:08:25 www2 sshd\[62623\]: Invalid user test from 104.248.56.37Sep  7 05:08:28 www2 sshd\[62623\]: Failed password for invalid user test from 104.248.56.37 port 44094 ssh2Sep  7 05:12:11 www2 sshd\[63140\]: Invalid user debian from 104.248.56.37
...
2019-09-07 10:29:19
218.98.40.141 attackspambots
Sep  7 03:55:58 tux-35-217 sshd\[13225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.141  user=root
Sep  7 03:56:00 tux-35-217 sshd\[13225\]: Failed password for root from 218.98.40.141 port 44100 ssh2
Sep  7 03:56:02 tux-35-217 sshd\[13225\]: Failed password for root from 218.98.40.141 port 44100 ssh2
Sep  7 03:56:05 tux-35-217 sshd\[13225\]: Failed password for root from 218.98.40.141 port 44100 ssh2
...
2019-09-07 10:09:00
66.23.193.76 attack
Sep  7 03:42:26 dedicated sshd[4285]: Invalid user test1 from 66.23.193.76 port 34226
2019-09-07 09:46:56

最近上报的IP列表

197.125.111.117 20.202.38.211 179.127.186.55 89.129.175.18
185.191.137.6 244.228.156.40 61.39.22.215 233.121.30.52
84.79.205.126 193.100.12.15 77.186.115.141 149.233.40.3
137.20.168.167 80.237.70.241 206.154.137.171 75.180.253.108
56.210.140.249 48.223.178.7 172.65.252.135 42.248.8.129