必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.222.252.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.222.252.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 07:54:14 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 28.252.222.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.252.222.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.7.162.198 attackspam
Jul 23 01:22:53 webhost01 sshd[18598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.162.198
Jul 23 01:22:56 webhost01 sshd[18598]: Failed password for invalid user postgres from 114.7.162.198 port 38928 ssh2
...
2020-07-23 02:43:45
111.161.74.121 attackspambots
Jul 22 19:56:46 ajax sshd[7897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.121 
Jul 22 19:56:48 ajax sshd[7897]: Failed password for invalid user informix from 111.161.74.121 port 43851 ssh2
2020-07-23 02:57:42
129.211.130.66 attackbots
2020-07-22T19:26:04.546798ns386461 sshd\[6648\]: Invalid user nagios from 129.211.130.66 port 37644
2020-07-22T19:26:04.551156ns386461 sshd\[6648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
2020-07-22T19:26:06.951217ns386461 sshd\[6648\]: Failed password for invalid user nagios from 129.211.130.66 port 37644 ssh2
2020-07-22T19:31:14.365071ns386461 sshd\[11144\]: Invalid user administrador from 129.211.130.66 port 42094
2020-07-22T19:31:14.369498ns386461 sshd\[11144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
...
2020-07-23 02:45:02
117.50.36.137 attack
Jul 22 20:53:22 OPSO sshd\[14102\]: Invalid user crt from 117.50.36.137 port 45364
Jul 22 20:53:22 OPSO sshd\[14102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.36.137
Jul 22 20:53:24 OPSO sshd\[14102\]: Failed password for invalid user crt from 117.50.36.137 port 45364 ssh2
Jul 22 20:58:05 OPSO sshd\[15967\]: Invalid user mumbleserver from 117.50.36.137 port 39600
Jul 22 20:58:05 OPSO sshd\[15967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.36.137
2020-07-23 03:02:13
106.13.4.86 attackbots
Jul 22 18:36:20 game-panel sshd[27508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.86
Jul 22 18:36:22 game-panel sshd[27508]: Failed password for invalid user evolution from 106.13.4.86 port 52246 ssh2
Jul 22 18:37:35 game-panel sshd[27561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.86
2020-07-23 02:52:43
218.92.0.191 attackspambots
Jul 22 20:32:06 dcd-gentoo sshd[11930]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jul 22 20:32:08 dcd-gentoo sshd[11930]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jul 22 20:32:08 dcd-gentoo sshd[11930]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 48319 ssh2
...
2020-07-23 03:03:20
49.88.112.114 attackspam
2020-07-22T18:48:55.593439ks3355764 sshd[8460]: Failed password for root from 49.88.112.114 port 45895 ssh2
2020-07-22T18:48:58.012164ks3355764 sshd[8460]: Failed password for root from 49.88.112.114 port 45895 ssh2
...
2020-07-23 02:33:02
36.92.79.58 attackspambots
Port probing on unauthorized port 445
2020-07-23 02:51:45
69.94.156.13 attackspambots
Lines containing failures of 69.94.156.13


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=69.94.156.13
2020-07-23 02:51:30
114.41.170.202 attack
SMB Server BruteForce Attack
2020-07-23 02:35:22
49.233.61.51 attackbotsspam
Jul 22 10:12:46 dignus sshd[31780]: Failed password for invalid user kay from 49.233.61.51 port 43976 ssh2
Jul 22 10:15:57 dignus sshd[32168]: Invalid user oracle from 49.233.61.51 port 53222
Jul 22 10:15:57 dignus sshd[32168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.61.51
Jul 22 10:15:59 dignus sshd[32168]: Failed password for invalid user oracle from 49.233.61.51 port 53222 ssh2
Jul 22 10:19:04 dignus sshd[32561]: Invalid user test from 49.233.61.51 port 34222
...
2020-07-23 02:45:27
69.30.213.202 attackbotsspam
20 attempts against mh-misbehave-ban on sonic
2020-07-23 02:28:15
62.234.178.25 attack
Jul 22 16:48:32 vmd17057 sshd[22030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.178.25 
Jul 22 16:48:34 vmd17057 sshd[22030]: Failed password for invalid user sem from 62.234.178.25 port 49708 ssh2
...
2020-07-23 02:59:22
180.150.92.94 attack
Jul 22 19:34:56 pve1 sshd[4187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.92.94 
Jul 22 19:34:58 pve1 sshd[4187]: Failed password for invalid user toon from 180.150.92.94 port 51542 ssh2
...
2020-07-23 02:54:36
163.172.178.167 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-07-23 02:58:29

最近上报的IP列表

210.84.89.17 27.134.20.39 217.34.114.44 192.238.210.141
167.171.20.20 199.253.232.166 251.162.230.174 119.189.25.183
138.16.248.13 52.101.244.238 6.148.116.178 229.170.214.233
162.183.153.45 237.140.49.82 25.226.106.119 71.188.212.77
197.57.20.13 175.40.18.10 120.94.76.106 165.132.62.237