必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.3.168.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.3.168.123.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:41:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 123.168.3.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.168.3.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.61.58.115 attack
Sep 24 06:26:05 areeb-Workstation sshd[13881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.115
Sep 24 06:26:07 areeb-Workstation sshd[13881]: Failed password for invalid user den from 182.61.58.115 port 35864 ssh2
...
2019-09-24 09:12:59
43.249.193.116 attackspambots
09/23/2019-20:25:46.342421 43.249.193.116 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2019-09-24 08:56:08
202.179.24.104 attackbots
445/tcp
[2019-09-23]1pkt
2019-09-24 08:48:34
220.76.181.164 attack
Sep 23 21:13:38 ny01 sshd[18039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.181.164
Sep 23 21:13:40 ny01 sshd[18039]: Failed password for invalid user old from 220.76.181.164 port 62765 ssh2
Sep 23 21:18:31 ny01 sshd[18989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.181.164
2019-09-24 09:28:24
51.91.212.80 attackspam
Sep 24 00:10:11 h2177944 kernel: \[2152928.387293\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=51.91.212.80 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=37457 DPT=1025 WINDOW=65535 RES=0x00 SYN URGP=0 
Sep 24 00:22:35 h2177944 kernel: \[2153672.784807\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=51.91.212.80 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=50326 DPT=1025 WINDOW=65535 RES=0x00 SYN URGP=0 
Sep 24 00:35:05 h2177944 kernel: \[2154422.356196\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=51.91.212.80 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=37989 DPT=1025 WINDOW=65535 RES=0x00 SYN URGP=0 
Sep 24 00:47:42 h2177944 kernel: \[2155178.846417\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=51.91.212.80 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=45521 DPT=1025 WINDOW=65535 RES=0x00 SYN URGP=0 
Sep 24 01:00:15 h2177944 kernel: \[2155932.015884\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=51.91.212.80 DST=85.214.117.9
2019-09-24 08:47:48
183.249.242.103 attack
Sep 24 02:25:44 vps01 sshd[11311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.249.242.103
Sep 24 02:25:46 vps01 sshd[11311]: Failed password for invalid user el from 183.249.242.103 port 59062 ssh2
2019-09-24 08:52:37
177.185.219.7 attack
[Aegis] @ 2019-09-24 02:07:26  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-09-24 09:09:48
138.197.188.101 attack
Reported by AbuseIPDB proxy server.
2019-09-24 09:11:41
190.104.212.211 attackspam
Honeypot attack, port: 445, PTR: static.211.212.104.190.cps.com.ar.
2019-09-24 09:06:35
78.131.56.62 attack
2019-09-23T20:26:28.3532581495-001 sshd\[31887\]: Invalid user zhuan from 78.131.56.62 port 55917
2019-09-23T20:26:28.3565431495-001 sshd\[31887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78-131-56-62.static.hdsnet.hu
2019-09-23T20:26:30.1691901495-001 sshd\[31887\]: Failed password for invalid user zhuan from 78.131.56.62 port 55917 ssh2
2019-09-23T20:42:21.4531371495-001 sshd\[33070\]: Invalid user dian from 78.131.56.62 port 48842
2019-09-23T20:42:21.4608181495-001 sshd\[33070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78-131-56-62.static.hdsnet.hu
2019-09-23T20:42:22.9676661495-001 sshd\[33070\]: Failed password for invalid user dian from 78.131.56.62 port 48842 ssh2
...
2019-09-24 08:55:16
2.228.163.157 attackspambots
2019-09-23T21:38:20.201048abusebot-5.cloudsearch.cf sshd\[2343\]: Invalid user theodore from 2.228.163.157 port 51956
2019-09-24 09:14:19
151.75.106.114 attackspambots
23/tcp
[2019-09-23]1pkt
2019-09-24 09:01:38
181.198.211.62 attack
Honeypot attack, port: 23, PTR: host-181-198-211-62.netlife.ec.
2019-09-24 09:19:20
49.234.86.229 attackspambots
Sep 23 13:13:25 php1 sshd\[13639\]: Invalid user no from 49.234.86.229
Sep 23 13:13:25 php1 sshd\[13639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.86.229
Sep 23 13:13:27 php1 sshd\[13639\]: Failed password for invalid user no from 49.234.86.229 port 34138 ssh2
Sep 23 13:17:24 php1 sshd\[14515\]: Invalid user polycom from 49.234.86.229
Sep 23 13:17:24 php1 sshd\[14515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.86.229
2019-09-24 08:57:21
164.132.56.243 attackspambots
Sep 24 03:43:13 taivassalofi sshd[96776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.243
Sep 24 03:43:16 taivassalofi sshd[96776]: Failed password for invalid user wendel from 164.132.56.243 port 51449 ssh2
...
2019-09-24 09:01:16

最近上报的IP列表

193.83.32.28 175.188.67.1 228.210.80.80 109.225.152.139
152.46.111.182 40.135.4.167 175.200.98.39 9.29.30.196
118.194.185.232 119.76.253.167 176.217.173.145 54.134.68.117
75.236.15.201 130.173.163.5 195.219.46.107 117.189.120.227
88.217.32.162 239.42.186.32 32.70.190.219 134.110.67.104