必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.38.41.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.38.41.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 22:17:29 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 199.41.38.139.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 139.38.41.199.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.65.184.83 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 18:12:03
82.244.121.159 attack
(sshd) Failed SSH login from 82.244.121.159 (FR/France/tro83-2-82-244-121-159.fbx.proxad.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 20 05:51:26 ubnt-55d23 sshd[23616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.244.121.159  user=www-data
Feb 20 05:51:27 ubnt-55d23 sshd[23616]: Failed password for www-data from 82.244.121.159 port 48584 ssh2
2020-02-20 18:23:48
185.143.223.166 attack
Feb 20 11:06:10 grey postfix/smtpd\[18712\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.166\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.166\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.166\]\; from=\<0b4vkpmw1ug8gwox@aminetwork.ru\> to=\ proto=ESMTP helo=\<\[185.143.223.163\]\>
...
2020-02-20 18:13:09
186.251.177.123 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-20 18:31:43
218.92.0.158 attack
Feb 20 11:01:34 dedicated sshd[8222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Feb 20 11:01:36 dedicated sshd[8222]: Failed password for root from 218.92.0.158 port 9603 ssh2
2020-02-20 18:18:06
14.98.156.147 attack
Honeypot attack, port: 445, PTR: static-147.156.98.14-tataidc.co.in.
2020-02-20 18:05:08
139.9.138.93 attack
Port scan on 2 port(s): 2375 2376
2020-02-20 18:16:05
223.30.92.130 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 18:00:45
177.11.92.222 attackbots
Invalid user testing from 177.11.92.222 port 44920
2020-02-20 18:29:20
115.159.66.109 attackbots
SSH Brute-Force attacks
2020-02-20 18:13:22
129.211.99.128 attackspam
Invalid user bunny from 129.211.99.128 port 52570
2020-02-20 18:25:45
107.174.243.86 attackbots
Feb 18 11:49:32 srv01 sshd[13337]: Invalid user musikbot from 107.174.243.86 port 48991
Feb 18 11:49:32 srv01 sshd[13337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.243.86
Feb 18 11:49:32 srv01 sshd[13337]: Invalid user musikbot from 107.174.243.86 port 48991
Feb 18 11:49:34 srv01 sshd[13337]: Failed password for invalid user musikbot from 107.174.243.86 port 48991 ssh2
Feb 18 11:58:19 srv01 sshd[13772]: Invalid user www from 107.174.243.86 port 34424


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.174.243.86
2020-02-20 18:32:28
192.144.134.18 attackbots
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-02-20 18:28:45
71.226.234.204 attackspam
Honeypot attack, port: 5555, PTR: c-71-226-234-204.hsd1.nj.comcast.net.
2020-02-20 18:28:08
158.69.158.101 attack
fail2ban - Attack against WordPress
2020-02-20 18:29:49

最近上报的IP列表

88.114.148.143 27.43.112.24 40.215.3.21 6.16.225.59
15.18.15.216 14.140.87.157 100.8.208.147 180.189.9.182
224.154.31.109 116.157.39.80 174.161.4.13 253.115.172.236
216.77.122.226 157.219.135.122 35.120.104.8 97.97.250.64
140.110.153.94 248.89.212.161 151.38.74.230 206.13.128.204