必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.34.154.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.34.154.80.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 15:49:14 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 80.154.34.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.154.34.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.24.102.70 attackspam
2019-09-23T04:29:51.646218abusebot-7.cloudsearch.cf sshd\[27561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.102.70  user=bin
2019-09-23 12:47:19
115.62.43.169 attackbots
Unauthorised access (Sep 23) SRC=115.62.43.169 LEN=40 TTL=49 ID=30948 TCP DPT=8080 WINDOW=54850 SYN 
Unauthorised access (Sep 22) SRC=115.62.43.169 LEN=40 TTL=49 ID=1367 TCP DPT=8080 WINDOW=54850 SYN
2019-09-23 12:18:42
222.186.190.92 attackspam
Sep 23 00:44:25 xtremcommunity sshd\[383075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Sep 23 00:44:27 xtremcommunity sshd\[383075\]: Failed password for root from 222.186.190.92 port 59312 ssh2
Sep 23 00:44:32 xtremcommunity sshd\[383075\]: Failed password for root from 222.186.190.92 port 59312 ssh2
Sep 23 00:44:36 xtremcommunity sshd\[383075\]: Failed password for root from 222.186.190.92 port 59312 ssh2
Sep 23 00:44:40 xtremcommunity sshd\[383075\]: Failed password for root from 222.186.190.92 port 59312 ssh2
...
2019-09-23 12:46:21
222.186.15.160 attack
Sep 23 00:20:29 plusreed sshd[28295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160  user=root
Sep 23 00:20:30 plusreed sshd[28295]: Failed password for root from 222.186.15.160 port 57492 ssh2
...
2019-09-23 12:21:48
77.247.108.77 attack
09/22/2019-23:58:24.430360 77.247.108.77 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-09-23 12:27:27
222.186.175.148 attackbotsspam
Sep 23 06:41:40 tuxlinux sshd[50126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Sep 23 06:41:42 tuxlinux sshd[50126]: Failed password for root from 222.186.175.148 port 7070 ssh2
Sep 23 06:41:40 tuxlinux sshd[50126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Sep 23 06:41:42 tuxlinux sshd[50126]: Failed password for root from 222.186.175.148 port 7070 ssh2
Sep 23 06:41:40 tuxlinux sshd[50126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Sep 23 06:41:42 tuxlinux sshd[50126]: Failed password for root from 222.186.175.148 port 7070 ssh2
Sep 23 06:41:48 tuxlinux sshd[50126]: Failed password for root from 222.186.175.148 port 7070 ssh2
...
2019-09-23 12:42:22
5.189.130.32 attack
Sep 23 06:11:01 ns3110291 sshd\[7021\]: Invalid user ubnt from 5.189.130.32
Sep 23 06:11:01 ns3110291 sshd\[7021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.130.32 
Sep 23 06:11:03 ns3110291 sshd\[7021\]: Failed password for invalid user ubnt from 5.189.130.32 port 39054 ssh2
Sep 23 06:15:28 ns3110291 sshd\[7253\]: Invalid user il from 5.189.130.32
Sep 23 06:15:28 ns3110291 sshd\[7253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.130.32 
...
2019-09-23 12:50:13
178.62.118.53 attack
Sep 23 06:01:17 vps01 sshd[20214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.118.53
Sep 23 06:01:20 vps01 sshd[20214]: Failed password for invalid user faxes from 178.62.118.53 port 55541 ssh2
2019-09-23 12:19:35
86.108.109.140 attackbotsspam
Automatic report - Port Scan Attack
2019-09-23 12:41:34
163.27.162.51 attackbotsspam
Sep 23 03:58:27 abusebot-4 vsftpd\[25162\]: pam_unix\(vsftpd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ftp ruser=www-data rhost=::ffff:163.27.162.51
2019-09-23 12:22:45
185.101.231.42 attack
Sep 23 06:59:03 saschabauer sshd[27867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.101.231.42
Sep 23 06:59:05 saschabauer sshd[27867]: Failed password for invalid user mri from 185.101.231.42 port 40804 ssh2
2019-09-23 13:03:02
141.98.80.78 attackspam
2019-09-23 dovecot_plain authenticator failed for \(\[141.98.80.78\]\) \[141.98.80.78\]: 535 Incorrect authentication data \(set_id=**REMOVED**_perl@**REMOVED**.de\)
2019-09-23 dovecot_plain authenticator failed for \(\[141.98.80.78\]\) \[141.98.80.78\]: 535 Incorrect authentication data \(set_id=**REMOVED**_perl\)
2019-09-23 dovecot_plain authenticator failed for \(\[141.98.80.78\]\) \[141.98.80.78\]: 535 Incorrect authentication data \(set_id=perl@**REMOVED**.de\)
2019-09-23 12:51:54
206.189.149.116 attackspambots
Sep 23 10:58:04 lcl-usvr-02 sshd[13838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.149.116  user=root
Sep 23 10:58:06 lcl-usvr-02 sshd[13838]: Failed password for root from 206.189.149.116 port 63119 ssh2
...
2019-09-23 12:37:22
121.46.29.116 attackspambots
Sep 23 00:43:47 ny01 sshd[3053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.29.116
Sep 23 00:43:49 ny01 sshd[3053]: Failed password for invalid user wpyan from 121.46.29.116 port 46203 ssh2
Sep 23 00:48:04 ny01 sshd[3787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.29.116
2019-09-23 12:55:02
51.75.248.241 attackbotsspam
Sep 22 18:14:08 auw2 sshd\[16342\]: Invalid user admin from 51.75.248.241
Sep 22 18:14:08 auw2 sshd\[16342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=241.ip-51-75-248.eu
Sep 22 18:14:10 auw2 sshd\[16342\]: Failed password for invalid user admin from 51.75.248.241 port 38212 ssh2
Sep 22 18:18:14 auw2 sshd\[16734\]: Invalid user plugdev from 51.75.248.241
Sep 22 18:18:14 auw2 sshd\[16734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=241.ip-51-75-248.eu
2019-09-23 12:20:55

最近上报的IP列表

151.49.17.123 241.130.159.163 250.42.228.214 96.66.119.185
73.215.131.194 52.192.107.225 192.182.72.70 238.100.79.172
239.170.96.195 254.52.214.135 220.115.34.27 54.204.199.217
159.168.43.28 144.224.121.63 98.128.5.222 52.146.163.82
77.20.81.238 83.145.169.34 219.24.132.148 5.236.53.200