必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.28.120.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.28.120.53.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 00:58:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 53.120.28.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.120.28.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.34.184.214 attack
Invalid user kf from 190.34.184.214 port 33690
2020-04-11 04:06:46
222.186.30.57 attack
SSH bruteforce
2020-04-11 03:59:28
106.12.197.67 attackspambots
Apr 10 21:38:10 meumeu sshd[1027]: Failed password for root from 106.12.197.67 port 57832 ssh2
Apr 10 21:42:25 meumeu sshd[1892]: Failed password for root from 106.12.197.67 port 53744 ssh2
...
2020-04-11 03:53:13
176.113.115.232 attackspambots
RDP brute forcing (d)
2020-04-11 03:56:35
87.229.193.106 attack
20/4/10@08:03:59: FAIL: Alarm-Network address from=87.229.193.106
...
2020-04-11 03:58:54
141.98.81.81 attackspam
2020-04-10T20:06:52.322634abusebot.cloudsearch.cf sshd[18726]: Invalid user 1234 from 141.98.81.81 port 35652
2020-04-10T20:06:52.331645abusebot.cloudsearch.cf sshd[18726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.81
2020-04-10T20:06:52.322634abusebot.cloudsearch.cf sshd[18726]: Invalid user 1234 from 141.98.81.81 port 35652
2020-04-10T20:06:54.401177abusebot.cloudsearch.cf sshd[18726]: Failed password for invalid user 1234 from 141.98.81.81 port 35652 ssh2
2020-04-10T20:07:25.489622abusebot.cloudsearch.cf sshd[18818]: Invalid user user from 141.98.81.81 port 49966
2020-04-10T20:07:25.498477abusebot.cloudsearch.cf sshd[18818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.81
2020-04-10T20:07:25.489622abusebot.cloudsearch.cf sshd[18818]: Invalid user user from 141.98.81.81 port 49966
2020-04-10T20:07:27.432321abusebot.cloudsearch.cf sshd[18818]: Failed password for invalid user u
...
2020-04-11 04:21:45
45.224.105.209 attackbots
(eximsyntax) Exim syntax errors from 45.224.105.209 (AR/Argentina/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-10 16:33:56 SMTP call from [45.224.105.209] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-04-11 03:55:35
212.72.138.66 attackspam
Unauthorized connection attempt from IP address 212.72.138.66 on Port 445(SMB)
2020-04-11 04:24:56
51.75.252.255 attack
2020-04-10T18:51:50.676807shield sshd\[5137\]: Invalid user ron from 51.75.252.255 port 41008
2020-04-10T18:51:50.680705shield sshd\[5137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-51-75-252.eu
2020-04-10T18:51:52.045026shield sshd\[5137\]: Failed password for invalid user ron from 51.75.252.255 port 41008 ssh2
2020-04-10T18:58:55.877891shield sshd\[6452\]: Invalid user dbuser from 51.75.252.255 port 51808
2020-04-10T18:58:55.881788shield sshd\[6452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-51-75-252.eu
2020-04-11 03:51:14
37.187.60.182 attackbots
Apr 10 21:01:56 host5 sshd[30757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-60.eu  user=root
Apr 10 21:01:58 host5 sshd[30757]: Failed password for root from 37.187.60.182 port 34532 ssh2
...
2020-04-11 04:02:57
119.57.103.38 attack
2020-04-10T20:12:01.088017shield sshd\[20887\]: Invalid user asdfghjkl from 119.57.103.38 port 53596
2020-04-10T20:12:01.092428shield sshd\[20887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.103.38
2020-04-10T20:12:03.583174shield sshd\[20887\]: Failed password for invalid user asdfghjkl from 119.57.103.38 port 53596 ssh2
2020-04-10T20:12:49.378648shield sshd\[20991\]: Invalid user halsey from 119.57.103.38 port 57221
2020-04-10T20:12:49.382845shield sshd\[20991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.103.38
2020-04-11 04:15:38
125.215.207.40 attackbots
Apr 10 15:27:08 vps647732 sshd[32608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.215.207.40
Apr 10 15:27:10 vps647732 sshd[32608]: Failed password for invalid user test2 from 125.215.207.40 port 58984 ssh2
...
2020-04-11 04:25:40
162.243.128.127 attackspam
Automatic report - Port Scan Attack
2020-04-11 04:11:46
116.196.79.253 attackspambots
2020-04-10T17:54:17.022092librenms sshd[23840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.79.253
2020-04-10T17:54:17.019037librenms sshd[23840]: Invalid user test from 116.196.79.253 port 37496
2020-04-10T17:54:19.239081librenms sshd[23840]: Failed password for invalid user test from 116.196.79.253 port 37496 ssh2
...
2020-04-11 03:50:46
111.229.110.107 attackbots
Apr 10 19:28:59 srv-ubuntu-dev3 sshd[35448]: Invalid user deploy from 111.229.110.107
Apr 10 19:28:59 srv-ubuntu-dev3 sshd[35448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107
Apr 10 19:28:59 srv-ubuntu-dev3 sshd[35448]: Invalid user deploy from 111.229.110.107
Apr 10 19:29:01 srv-ubuntu-dev3 sshd[35448]: Failed password for invalid user deploy from 111.229.110.107 port 47236 ssh2
Apr 10 19:33:59 srv-ubuntu-dev3 sshd[36268]: Invalid user admin from 111.229.110.107
Apr 10 19:33:59 srv-ubuntu-dev3 sshd[36268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107
Apr 10 19:33:59 srv-ubuntu-dev3 sshd[36268]: Invalid user admin from 111.229.110.107
Apr 10 19:34:01 srv-ubuntu-dev3 sshd[36268]: Failed password for invalid user admin from 111.229.110.107 port 46814 ssh2
...
2020-04-11 03:54:15

最近上报的IP列表

184.252.210.155 226.163.195.212 249.94.151.79 18.248.26.203
238.80.39.188 21.176.130.31 131.8.227.59 76.51.9.221
213.186.90.135 9.19.65.121 92.7.95.189 9.220.141.237
76.106.28.34 153.195.29.13 167.97.114.206 81.69.230.244
249.227.204.60 127.133.255.22 218.231.75.248 83.24.218.116