必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.224.129.0 attackspam
Unauthorized connection attempt detected from IP address 139.224.129.0 to port 5903 [T]
2020-08-16 02:46:26
139.224.129.0 attackspambots
Unauthorized connection attempt detected from IP address 139.224.129.0 to port 5902
2020-06-24 01:04:12
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.224.129.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.224.129.9.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:24:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 9.129.224.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.129.224.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.190.1 attackbots
Apr  8 19:39:27 v22018086721571380 sshd[23508]: Failed password for invalid user vbox from 157.230.190.1 port 41598 ssh2
2020-04-09 02:54:25
177.190.176.19 attackspam
Automatic report - Banned IP Access
2020-04-09 02:43:39
51.77.215.227 attack
Apr  8 10:35:53 mail sshd\[8084\]: Invalid user admin from 51.77.215.227
Apr  8 10:35:53 mail sshd\[8084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.227
...
2020-04-09 02:25:03
89.248.168.112 attackspambots
scan z
2020-04-09 03:07:03
58.55.25.88 attack
$f2bV_matches
2020-04-09 02:30:39
88.198.226.176 attack
2020-04-08T12:45:16.850097shield sshd\[5563\]: Invalid user mario from 88.198.226.176 port 49666
2020-04-08T12:45:16.855144shield sshd\[5563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.88-198-226-176.clients.your-server.de
2020-04-08T12:45:19.728436shield sshd\[5563\]: Failed password for invalid user mario from 88.198.226.176 port 49666 ssh2
2020-04-08T12:51:38.303091shield sshd\[6954\]: Invalid user info from 88.198.226.176 port 60856
2020-04-08T12:51:38.306927shield sshd\[6954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.88-198-226-176.clients.your-server.de
2020-04-09 02:34:16
113.21.125.226 attack
(imapd) Failed IMAP login from 113.21.125.226 (NC/New Caledonia/host-113-21-125-226.canl.nc): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  8 20:57:04 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 7 secs): user=, method=PLAIN, rip=113.21.125.226, lip=5.63.12.44, session=
2020-04-09 02:47:09
144.217.7.75 attackspambots
Apr  8 20:25:48 nextcloud sshd\[30301\]: Invalid user cleo from 144.217.7.75
Apr  8 20:25:48 nextcloud sshd\[30301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.7.75
Apr  8 20:25:50 nextcloud sshd\[30301\]: Failed password for invalid user cleo from 144.217.7.75 port 48120 ssh2
2020-04-09 02:51:32
218.92.0.201 attackbots
Apr  8 20:51:02 santamaria sshd\[24101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Apr  8 20:51:04 santamaria sshd\[24101\]: Failed password for root from 218.92.0.201 port 42355 ssh2
Apr  8 20:52:19 santamaria sshd\[24104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
...
2020-04-09 03:00:27
5.188.206.18 attackspam
20/4/8@14:35:24: FAIL: Alarm-Webmin address from=5.188.206.18
...
2020-04-09 02:49:34
189.202.204.237 attack
$f2bV_matches
2020-04-09 02:42:12
176.111.39.151 attackspambots
slow and persistent scanner
2020-04-09 03:01:49
163.61.67.73 attackbotsspam
report
2020-04-09 02:42:38
118.163.54.176 attack
trying to access non-authorized port
2020-04-09 02:24:16
49.235.245.12 attackspam
Apr  8 15:27:56 firewall sshd[28237]: Invalid user deploy from 49.235.245.12
Apr  8 15:27:58 firewall sshd[28237]: Failed password for invalid user deploy from 49.235.245.12 port 48874 ssh2
Apr  8 15:33:34 firewall sshd[28396]: Invalid user test from 49.235.245.12
...
2020-04-09 02:57:43

最近上报的IP列表

139.224.13.219 139.224.13.180 139.224.13.2 139.224.13.27
139.224.130.180 139.224.130.146 139.224.13.82 118.25.90.130
139.224.131.201 139.224.13.221 139.224.131.100 139.224.130.227
139.224.131.225 139.224.130.225 139.224.130.86 118.250.106.103
139.224.131.22 139.224.131.233 139.224.132.155 139.224.132.123