必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.230.202.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.230.202.166.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:32:54 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 166.202.230.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.202.230.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.232.29.93 attack
Oct 18 13:26:47 keyhelp sshd[32347]: Invalid user admin from 14.232.29.93
Oct 18 13:26:47 keyhelp sshd[32347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.29.93
Oct 18 13:26:49 keyhelp sshd[32347]: Failed password for invalid user admin from 14.232.29.93 port 34518 ssh2
Oct 18 13:26:50 keyhelp sshd[32347]: Connection closed by 14.232.29.93 port 34518 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.232.29.93
2019-10-19 01:42:49
195.154.189.69 attackbotsspam
\[2019-10-18 12:20:42\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.154.189.69:59766' - Wrong password
\[2019-10-18 12:20:42\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-18T12:20:42.618-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2015",SessionID="0x7fc3ac04bd78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.189.69/59766",Challenge="52619c2f",ReceivedChallenge="52619c2f",ReceivedHash="d2001ea65f0ffe3cdd279ff89268303d"
\[2019-10-18 12:25:08\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.154.189.69:65387' - Wrong password
\[2019-10-18 12:25:08\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-18T12:25:08.448-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2016",SessionID="0x7fc3ac4de928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.15
2019-10-19 01:34:18
211.112.64.16 attackbotsspam
Telnet Server BruteForce Attack
2019-10-19 01:38:59
94.177.250.221 attack
Oct 18 01:31:55 friendsofhawaii sshd\[3472\]: Invalid user free from 94.177.250.221
Oct 18 01:31:55 friendsofhawaii sshd\[3472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.250.221
Oct 18 01:31:57 friendsofhawaii sshd\[3472\]: Failed password for invalid user free from 94.177.250.221 port 52190 ssh2
Oct 18 01:35:57 friendsofhawaii sshd\[3789\]: Invalid user bot from 94.177.250.221
Oct 18 01:35:57 friendsofhawaii sshd\[3789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.250.221
2019-10-19 01:21:46
95.127.91.177 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/95.127.91.177/ 
 ES - 1H : (47)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN3352 
 
 IP : 95.127.91.177 
 
 CIDR : 95.127.0.0/16 
 
 PREFIX COUNT : 662 
 
 UNIQUE IP COUNT : 10540800 
 
 
 WYKRYTE ATAKI Z ASN3352 :  
  1H - 1 
  3H - 2 
  6H - 4 
 12H - 9 
 24H - 18 
 
 DateTime : 2019-10-18 13:36:16 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 01:12:30
99.108.141.4 attackbotsspam
Oct 18 19:04:15 server sshd\[15967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net  user=root
Oct 18 19:04:17 server sshd\[15967\]: Failed password for root from 99.108.141.4 port 35338 ssh2
Oct 18 19:16:07 server sshd\[19244\]: Invalid user admin from 99.108.141.4
Oct 18 19:16:07 server sshd\[19244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net 
Oct 18 19:16:09 server sshd\[19244\]: Failed password for invalid user admin from 99.108.141.4 port 58208 ssh2
...
2019-10-19 01:11:10
206.189.81.101 attack
Oct 18 17:45:15 dev0-dcde-rnet sshd[22224]: Failed password for root from 206.189.81.101 port 42448 ssh2
Oct 18 17:55:22 dev0-dcde-rnet sshd[22241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.81.101
Oct 18 17:55:24 dev0-dcde-rnet sshd[22241]: Failed password for invalid user training from 206.189.81.101 port 54568 ssh2
2019-10-19 01:17:58
68.183.236.92 attackbots
Oct 18 07:28:54 tdfoods sshd\[17486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92  user=root
Oct 18 07:28:56 tdfoods sshd\[17486\]: Failed password for root from 68.183.236.92 port 54466 ssh2
Oct 18 07:33:17 tdfoods sshd\[17844\]: Invalid user admin from 68.183.236.92
Oct 18 07:33:17 tdfoods sshd\[17844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92
Oct 18 07:33:19 tdfoods sshd\[17844\]: Failed password for invalid user admin from 68.183.236.92 port 38012 ssh2
2019-10-19 01:37:24
200.125.188.82 attack
DNS server being used for DNS Reflection DDoS attack.
2019-10-19 01:15:08
159.203.81.28 attackspambots
Oct 18 15:03:43 vps691689 sshd[4858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.81.28
Oct 18 15:03:46 vps691689 sshd[4858]: Failed password for invalid user simong from 159.203.81.28 port 55711 ssh2
...
2019-10-19 01:03:52
171.67.70.128 attack
Oct 18 15:54:07 *** sshd[1805304]: refused connect from 171.67.70.128 (=
171.67.70.128)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.67.70.128
2019-10-19 01:32:23
84.254.28.47 attackspam
Oct 13 15:42:10 heissa sshd\[15678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=root
Oct 13 15:42:12 heissa sshd\[15678\]: Failed password for root from 84.254.28.47 port 43544 ssh2
Oct 13 15:46:58 heissa sshd\[16399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=root
Oct 13 15:47:01 heissa sshd\[16399\]: Failed password for root from 84.254.28.47 port 35055 ssh2
Oct 13 15:51:55 heissa sshd\[17116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=root
2019-10-19 01:42:25
31.27.167.218 attack
Server penetration trying other domain names than server publicly serves (ex https://localhost)
2019-10-19 01:16:34
103.65.182.29 attackbots
2019-10-18T17:30:01.342166abusebot-5.cloudsearch.cf sshd\[22987\]: Invalid user manager from 103.65.182.29 port 41911
2019-10-19 01:35:58
103.240.140.10 attackspambots
Oct 18 13:35:24 h2177944 kernel: \[4274456.502218\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.240.140.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=27232 PROTO=TCP SPT=622 DPT=369 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 18 13:35:24 h2177944 kernel: \[4274456.502223\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.240.140.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=27228 PROTO=TCP SPT=2424 DPT=367 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 18 13:35:24 h2177944 kernel: \[4274456.502301\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.240.140.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=27230 PROTO=TCP SPT=1322 DPT=370 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 18 13:35:24 h2177944 kernel: \[4274456.503530\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.240.140.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=27231 PROTO=TCP SPT=2311 DPT=368 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 18 13:35:24 h2177944 kernel: \[4274456.503573\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=103.240.140.10 DST=85.214.117.9 LEN
2019-10-19 01:42:08

最近上报的IP列表

30.116.123.101 239.173.141.127 226.65.143.189 199.16.136.63
41.220.120.186 136.23.137.133 120.153.119.142 213.101.94.37
160.119.195.73 69.123.84.121 177.217.187.99 64.185.94.215
222.6.3.218 149.32.20.105 155.154.15.98 120.249.191.204
52.142.136.207 48.1.173.12 22.223.52.114 122.107.245.153