必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.230.20.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.230.20.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:53:29 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 111.20.230.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.20.230.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.248.117.234 attack
Unauthorized connection attempt detected from IP address 104.248.117.234 to port 2220 [J]
2020-01-20 15:58:40
45.225.160.94 attackbots
Unauthorized connection attempt detected from IP address 45.225.160.94 to port 2220 [J]
2020-01-20 15:47:21
118.99.124.189 attack
SSH-bruteforce attempts
2020-01-20 15:50:03
186.4.242.37 attackspambots
Jan 20 09:14:10 vps691689 sshd[27039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37
Jan 20 09:14:12 vps691689 sshd[27039]: Failed password for invalid user suporte from 186.4.242.37 port 35046 ssh2
Jan 20 09:17:15 vps691689 sshd[27170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37
...
2020-01-20 16:17:47
52.170.222.11 attack
Invalid user pi from 52.170.222.11 port 59896
2020-01-20 16:18:36
27.72.72.48 attackbots
Unauthorised access (Jan 20) SRC=27.72.72.48 LEN=52 TTL=109 ID=25886 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-20 15:48:57
66.163.187.147 attackspambots
Sending out 419 type spam emails
from IP 66.163.187.147
(yahoo.com / oath.com) 

"Dearly Friend,

Ref: Introduction / Curious to know whether you'll be interested?

Good day to you,

With regards to your email - I got it during my private search for reliable individuals. Therefore, I sincerely hope this will not constitute any sort of embarrassment to you at all.

My name is Robert Bailey, and I am Curious to know whether you'll be interested in assisting to help me invest my late father's fund and Gold in your country."
2020-01-20 16:09:53
206.189.166.172 attack
Jan 20 08:49:14 icinga sshd[18512]: Failed password for postgres from 206.189.166.172 port 35156 ssh2
...
2020-01-20 15:58:25
185.244.39.209 attackspam
2020-01-20T07:49:08.465601hub.schaetter.us sshd\[382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.39.209  user=root
2020-01-20T07:49:10.093933hub.schaetter.us sshd\[382\]: Failed password for root from 185.244.39.209 port 33536 ssh2
2020-01-20T07:49:11.217372hub.schaetter.us sshd\[384\]: Invalid user admin from 185.244.39.209 port 35482
2020-01-20T07:49:11.225020hub.schaetter.us sshd\[384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.39.209
2020-01-20T07:49:12.597568hub.schaetter.us sshd\[384\]: Failed password for invalid user admin from 185.244.39.209 port 35482 ssh2
...
2020-01-20 16:16:09
210.18.181.118 attack
Automatic report - Banned IP Access
2020-01-20 15:49:08
90.252.3.59 attackbots
0.86-10/02 [bc00/m01] PostRequest-Spammer scoring: amsterdam
2020-01-20 16:02:54
94.225.3.124 attack
SSH Server BruteForce Attack
2020-01-20 16:12:25
141.210.55.69 attack
SSH/22 MH Probe, BF, Hack -
2020-01-20 16:05:54
87.81.169.74 attack
Invalid user carlos from 87.81.169.74 port 55132
2020-01-20 15:45:53
202.51.74.189 attackspam
2020-01-20T05:33:25.424029host3.slimhost.com.ua sshd[2466831]: Invalid user continuum from 202.51.74.189 port 56040
2020-01-20T05:33:25.429914host3.slimhost.com.ua sshd[2466831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
2020-01-20T05:33:25.424029host3.slimhost.com.ua sshd[2466831]: Invalid user continuum from 202.51.74.189 port 56040
2020-01-20T05:33:27.615307host3.slimhost.com.ua sshd[2466831]: Failed password for invalid user continuum from 202.51.74.189 port 56040 ssh2
2020-01-20T05:50:32.210281host3.slimhost.com.ua sshd[2473226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189  user=root
2020-01-20T05:50:34.386233host3.slimhost.com.ua sshd[2473226]: Failed password for root from 202.51.74.189 port 45568 ssh2
2020-01-20T05:55:17.553913host3.slimhost.com.ua sshd[2476633]: Invalid user cyril from 202.51.74.189 port 46700
2020-01-20T05:55:17.558286host3.slimhost.com.ua ssh
...
2020-01-20 15:46:21

最近上报的IP列表

187.103.142.6 248.151.15.122 132.238.66.181 251.203.182.238
206.64.102.47 188.132.46.198 100.92.129.240 7.174.9.56
78.116.37.75 7.58.232.78 51.11.150.3 88.131.201.19
53.186.190.158 198.82.83.244 191.195.96.93 243.128.93.97
222.182.239.26 40.138.56.201 242.115.232.51 55.209.166.162