必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.250.253.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.250.253.143.		IN	A

;; AUTHORITY SECTION:
.			412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:17:10 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 143.253.250.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.253.250.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.4 attackspambots
Oct  7 15:08:13 ncomp sshd[1577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Oct  7 15:08:15 ncomp sshd[1577]: Failed password for root from 222.186.42.4 port 59908 ssh2
Oct  7 15:08:28 ncomp sshd[1577]: Failed password for root from 222.186.42.4 port 59908 ssh2
Oct  7 15:08:13 ncomp sshd[1577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Oct  7 15:08:15 ncomp sshd[1577]: Failed password for root from 222.186.42.4 port 59908 ssh2
Oct  7 15:08:28 ncomp sshd[1577]: Failed password for root from 222.186.42.4 port 59908 ssh2
2019-10-07 21:09:18
222.186.175.182 attack
Oct  7 14:38:54 heissa sshd\[18957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Oct  7 14:38:56 heissa sshd\[18957\]: Failed password for root from 222.186.175.182 port 41298 ssh2
Oct  7 14:39:00 heissa sshd\[18957\]: Failed password for root from 222.186.175.182 port 41298 ssh2
Oct  7 14:39:05 heissa sshd\[18957\]: Failed password for root from 222.186.175.182 port 41298 ssh2
Oct  7 14:39:09 heissa sshd\[18957\]: Failed password for root from 222.186.175.182 port 41298 ssh2
2019-10-07 20:41:47
1.179.185.50 attackspambots
Oct  7 14:44:13 dedicated sshd[24157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50  user=root
Oct  7 14:44:16 dedicated sshd[24157]: Failed password for root from 1.179.185.50 port 35732 ssh2
2019-10-07 20:50:14
45.141.84.24 attackspambots
10/07/2019-08:46:49.028268 45.141.84.24 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-07 20:54:05
107.13.186.21 attackspam
*Port Scan* detected from 107.13.186.21 (US/United States/mta-107-13-186-21.nc.rr.com). 4 hits in the last 30 seconds
2019-10-07 20:59:25
109.242.38.138 attackspam
Automatic report - Port Scan Attack
2019-10-07 21:18:04
118.48.211.197 attackbots
Automatic report - Banned IP Access
2019-10-07 21:14:27
185.81.193.40 attack
Oct  7 13:44:22 host sshd\[32365\]: Failed password for root from 185.81.193.40 port 55165 ssh2
Oct  7 13:47:43 host sshd\[34096\]: Failed password for root from 185.81.193.40 port 62169 ssh2
...
2019-10-07 20:45:40
163.172.180.179 attackspambots
Automatic report - Banned IP Access
2019-10-07 21:04:35
185.175.93.18 attackbots
10/07/2019-14:18:14.577163 185.175.93.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-07 21:15:00
183.32.225.120 attack
Oct  7 07:28:46 esmtp postfix/smtpd[8213]: lost connection after AUTH from unknown[183.32.225.120]
Oct  7 07:28:48 esmtp postfix/smtpd[8213]: lost connection after AUTH from unknown[183.32.225.120]
Oct  7 07:28:49 esmtp postfix/smtpd[8213]: lost connection after AUTH from unknown[183.32.225.120]
Oct  7 07:28:51 esmtp postfix/smtpd[8213]: lost connection after AUTH from unknown[183.32.225.120]
Oct  7 07:28:53 esmtp postfix/smtpd[8213]: lost connection after AUTH from unknown[183.32.225.120]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.32.225.120
2019-10-07 21:07:05
42.118.148.60 attackspam
Unauthorised access (Oct  7) SRC=42.118.148.60 LEN=40 TTL=47 ID=28859 TCP DPT=8080 WINDOW=26118 SYN 
Unauthorised access (Oct  7) SRC=42.118.148.60 LEN=40 TTL=47 ID=25855 TCP DPT=8080 WINDOW=4097 SYN 
Unauthorised access (Oct  7) SRC=42.118.148.60 LEN=40 TTL=47 ID=3573 TCP DPT=8080 WINDOW=26118 SYN
2019-10-07 21:02:07
42.85.7.210 attackspambots
Unauthorised access (Oct  7) SRC=42.85.7.210 LEN=40 TTL=49 ID=31434 TCP DPT=8080 WINDOW=47621 SYN
2019-10-07 21:02:38
162.243.10.64 attackspambots
Oct  7 14:51:33 h2177944 sshd\[9325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=root
Oct  7 14:51:36 h2177944 sshd\[9325\]: Failed password for root from 162.243.10.64 port 50306 ssh2
Oct  7 14:55:48 h2177944 sshd\[9880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=root
Oct  7 14:55:51 h2177944 sshd\[9880\]: Failed password for root from 162.243.10.64 port 33590 ssh2
...
2019-10-07 21:00:12
222.186.169.194 attackbots
SSH Brute Force, server-1 sshd[31159]: Failed password for root from 222.186.169.194 port 30902 ssh2
2019-10-07 20:57:03

最近上报的IP列表

225.196.167.81 143.222.5.25 11.119.58.167 156.150.20.119
216.238.32.218 145.121.7.229 112.151.210.64 129.226.82.102
96.34.58.171 239.138.113.166 166.227.111.99 133.254.23.78
146.129.80.54 178.177.190.200 200.138.223.156 17.148.111.127
132.14.30.49 137.66.97.138 179.103.250.58 137.93.208.215