必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.224.133.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.224.133.84.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:24:25 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 84.133.224.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 84.133.224.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.197.56 attackspambots
May 25 23:42:47 localhost sshd\[31383\]: Invalid user papachriston from 140.143.197.56
May 25 23:42:47 localhost sshd\[31383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.197.56
May 25 23:42:49 localhost sshd\[31383\]: Failed password for invalid user papachriston from 140.143.197.56 port 17876 ssh2
May 25 23:48:05 localhost sshd\[31664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.197.56  user=root
May 25 23:48:07 localhost sshd\[31664\]: Failed password for root from 140.143.197.56 port 16865 ssh2
...
2020-05-26 06:16:13
114.67.70.94 attackbotsspam
May 25 23:18:33 localhost sshd\[29688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94  user=root
May 25 23:18:35 localhost sshd\[29688\]: Failed password for root from 114.67.70.94 port 60454 ssh2
May 25 23:21:32 localhost sshd\[29923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94  user=root
May 25 23:21:34 localhost sshd\[29923\]: Failed password for root from 114.67.70.94 port 54800 ssh2
May 25 23:24:38 localhost sshd\[29965\]: Invalid user mccoys from 114.67.70.94
May 25 23:24:38 localhost sshd\[29965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94
...
2020-05-26 05:46:42
112.85.42.176 attackspambots
May 26 00:05:06 h1745522 sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
May 26 00:05:08 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:17 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:06 h1745522 sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
May 26 00:05:08 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:17 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:06 h1745522 sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
May 26 00:05:08 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:17 h1745522 sshd[14692]: Failed password for
...
2020-05-26 06:10:53
162.13.143.36 attack
25.05.2020 22:19:12 - Wordpress fail 
Detected by ELinOX-ALM
2020-05-26 05:56:26
82.62.232.235 attackbots
Automatic report - Banned IP Access
2020-05-26 05:44:02
178.128.83.1 attackspam
Automatic report - XMLRPC Attack
2020-05-26 06:15:59
119.97.164.246 attackspam
" "
2020-05-26 05:54:55
185.234.218.84 attack
May 25 21:00:19 mail postfix/smtpd\[5961\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 25 21:38:20 mail postfix/smtpd\[7284\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 25 21:58:41 mail postfix/smtpd\[7711\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 25 22:19:16 mail postfix/smtpd\[8457\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-05-26 06:03:00
138.68.81.162 attack
SSH Invalid Login
2020-05-26 05:48:14
51.77.220.183 attackspambots
May 25 17:41:22 NPSTNNYC01T sshd[17151]: Failed password for root from 51.77.220.183 port 53360 ssh2
May 25 17:43:47 NPSTNNYC01T sshd[17298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.183
May 25 17:43:49 NPSTNNYC01T sshd[17298]: Failed password for invalid user camera from 51.77.220.183 port 52756 ssh2
...
2020-05-26 05:49:55
51.143.90.15 attack
Invalid user princess from 51.143.90.15 port 47394
2020-05-26 06:20:08
78.128.191.41 attackspam
Fraudulent payments with stolen card details.
2020-05-26 06:20:38
182.48.234.227 attackspam
IMAP Brute Force
2020-05-26 05:51:30
87.251.74.29 attackbots
May 25 22:34:26 debian-2gb-nbg1-2 kernel: \[12697668.459523\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.29 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=49342 PROTO=TCP SPT=58332 DPT=7255 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-26 05:47:19
194.242.11.254 attack
May2522:14:21server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[user123]May2522:14:46server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:15:09server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:15:38server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:16:09server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:16:53server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:16:59server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:17:27server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:18:46server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]May2522:18:51server4pure-ftpd:\(\?@194.242.11.254\)[WARNING]Authenticationfailedforuser[test]
2020-05-26 06:12:51

最近上报的IP列表

139.224.134.155 139.224.133.61 139.224.134.237 139.224.134.251
139.224.134.76 139.224.134.45 139.224.134.6 118.250.114.197
139.224.135.138 139.224.135.128 139.224.135.71 139.224.136.14
139.224.135.230 139.224.135.94 139.224.136.147 139.224.135.235
139.224.135.87 139.224.135.86 139.224.136.163 118.250.121.155