必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.34.63.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.34.63.192.			IN	A

;; AUTHORITY SECTION:
.			105	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122800 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 29 00:46:54 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 192.63.34.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.63.34.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
132.232.2.100 attackspam
Sep 14 11:10:35 powerpi2 sshd[3590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.2.100
Sep 14 11:10:35 powerpi2 sshd[3590]: Invalid user vincefranco from 132.232.2.100 port 40526
Sep 14 11:10:37 powerpi2 sshd[3590]: Failed password for invalid user vincefranco from 132.232.2.100 port 40526 ssh2
...
2020-09-14 22:47:55
123.31.32.150 attack
Sep 14 14:55:55 nextcloud sshd\[15946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150  user=root
Sep 14 14:55:57 nextcloud sshd\[15946\]: Failed password for root from 123.31.32.150 port 57458 ssh2
Sep 14 14:58:50 nextcloud sshd\[20006\]: Invalid user admin from 123.31.32.150
Sep 14 14:58:50 nextcloud sshd\[20006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
2020-09-14 23:19:47
51.210.44.157 attackspam
$f2bV_matches
2020-09-14 23:04:45
201.47.158.130 attackbots
Sep 14 14:51:13 rancher-0 sshd[41438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130  user=root
Sep 14 14:51:15 rancher-0 sshd[41438]: Failed password for root from 201.47.158.130 port 52014 ssh2
...
2020-09-14 22:42:48
112.85.42.185 attackbotsspam
2020-09-14T18:01:32.297198lavrinenko.info sshd[29180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
2020-09-14T18:01:34.136473lavrinenko.info sshd[29180]: Failed password for root from 112.85.42.185 port 43257 ssh2
2020-09-14T18:01:32.297198lavrinenko.info sshd[29180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
2020-09-14T18:01:34.136473lavrinenko.info sshd[29180]: Failed password for root from 112.85.42.185 port 43257 ssh2
2020-09-14T18:01:36.721257lavrinenko.info sshd[29180]: Failed password for root from 112.85.42.185 port 43257 ssh2
...
2020-09-14 23:15:12
62.234.146.45 attack
(sshd) Failed SSH login from 62.234.146.45 (CN/China/-): 5 in the last 3600 secs
2020-09-14 22:37:37
82.81.170.27 attack
Automatic report - Port Scan Attack
2020-09-14 22:41:59
180.166.228.228 attack
Sep 14 08:03:02 gospond sshd[20648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.228.228 
Sep 14 08:03:02 gospond sshd[20648]: Invalid user usbmux from 180.166.228.228 port 50216
Sep 14 08:03:04 gospond sshd[20648]: Failed password for invalid user usbmux from 180.166.228.228 port 50216 ssh2
...
2020-09-14 23:17:56
65.75.71.112 attackspambots
Automatic report - Port Scan Attack
2020-09-14 23:12:35
222.186.190.2 attackspam
$f2bV_matches
2020-09-14 22:59:24
119.204.112.229 attack
[f2b] sshd bruteforce, retries: 1
2020-09-14 22:51:57
176.122.172.102 attack
2020-09-14T13:45:33+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-14 22:42:19
94.180.247.20 attackspambots
s2.hscode.pl - SSH Attack
2020-09-14 22:54:24
167.71.53.164 attackbots
Sep 14 16:58:06 host2 sshd[1536948]: Failed password for root from 167.71.53.164 port 32200 ssh2
Sep 14 17:02:06 host2 sshd[1537170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.53.164  user=root
Sep 14 17:02:08 host2 sshd[1537170]: Failed password for root from 167.71.53.164 port 37835 ssh2
Sep 14 17:06:12 host2 sshd[1537594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.53.164  user=root
Sep 14 17:06:14 host2 sshd[1537594]: Failed password for root from 167.71.53.164 port 43432 ssh2
...
2020-09-14 23:06:43
163.172.44.194 attack
(sshd) Failed SSH login from 163.172.44.194 (FR/France/163-172-44-194.rev.poneytelecom.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 05:21:55 server sshd[32212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.44.194  user=root
Sep 14 05:21:57 server sshd[32212]: Failed password for root from 163.172.44.194 port 42818 ssh2
Sep 14 05:35:09 server sshd[5630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.44.194  user=root
Sep 14 05:35:11 server sshd[5630]: Failed password for root from 163.172.44.194 port 57238 ssh2
Sep 14 05:45:55 server sshd[8401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.44.194  user=root
2020-09-14 22:51:18

最近上报的IP列表

139.232.56.23 114.119.28.250 141.129.80.140 155.179.226.246
140.154.98.227 139.139.77.12 138.47.87.197 138.23.103.251
138.235.174.154 138.17.95.71 137.114.172.189 136.56.110.90
136.41.142.198 136.203.153.129 136.127.99.223 135.64.164.27
135.132.154.224 135.231.255.133 139.28.76.242 133.88.129.114