必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.41.47.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.41.47.115.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 11:08:47 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 115.47.41.139.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 139.41.47.115.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.255.86.106 attackspam
May  3 14:09:45 inter-technics sshd[4157]: Invalid user ftp_user from 218.255.86.106 port 58431
May  3 14:09:45 inter-technics sshd[4157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.86.106
May  3 14:09:45 inter-technics sshd[4157]: Invalid user ftp_user from 218.255.86.106 port 58431
May  3 14:09:47 inter-technics sshd[4157]: Failed password for invalid user ftp_user from 218.255.86.106 port 58431 ssh2
May  3 14:13:46 inter-technics sshd[5071]: Invalid user whq from 218.255.86.106 port 35861
...
2020-05-03 22:18:20
222.186.30.57 attack
03.05.2020 14:26:56 SSH access blocked by firewall
2020-05-03 22:28:18
104.248.187.165 attack
$f2bV_matches
2020-05-03 22:10:40
164.132.47.139 attackspambots
May  3 14:14:07 haigwepa sshd[26341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139 
May  3 14:14:09 haigwepa sshd[26341]: Failed password for invalid user pharo from 164.132.47.139 port 36720 ssh2
...
2020-05-03 21:57:51
51.68.227.98 attackspambots
May  3 12:24:58 vlre-nyc-1 sshd\[20458\]: Invalid user brendan from 51.68.227.98
May  3 12:24:58 vlre-nyc-1 sshd\[20458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.227.98
May  3 12:25:00 vlre-nyc-1 sshd\[20458\]: Failed password for invalid user brendan from 51.68.227.98 port 56574 ssh2
May  3 12:28:25 vlre-nyc-1 sshd\[20520\]: Invalid user admin from 51.68.227.98
May  3 12:28:25 vlre-nyc-1 sshd\[20520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.227.98
...
2020-05-03 21:54:12
87.27.16.195 attack
fail2ban
2020-05-03 22:12:10
117.51.155.121 attackspambots
k+ssh-bruteforce
2020-05-03 22:09:59
218.92.0.211 attackbotsspam
2020-05-03T15:16:09.722471sd-86998 sshd[41911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
2020-05-03T15:16:12.018287sd-86998 sshd[41911]: Failed password for root from 218.92.0.211 port 19482 ssh2
2020-05-03T15:16:14.570613sd-86998 sshd[41911]: Failed password for root from 218.92.0.211 port 19482 ssh2
2020-05-03T15:16:09.722471sd-86998 sshd[41911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
2020-05-03T15:16:12.018287sd-86998 sshd[41911]: Failed password for root from 218.92.0.211 port 19482 ssh2
2020-05-03T15:16:14.570613sd-86998 sshd[41911]: Failed password for root from 218.92.0.211 port 19482 ssh2
2020-05-03T15:16:09.722471sd-86998 sshd[41911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
2020-05-03T15:16:12.018287sd-86998 sshd[41911]: Failed password for root from 218.92.0.211 p
...
2020-05-03 21:51:07
117.211.192.70 attackbots
May  3 12:08:49 124388 sshd[30752]: Failed password for root from 117.211.192.70 port 54304 ssh2
May  3 12:13:41 124388 sshd[30824]: Invalid user diego from 117.211.192.70 port 35770
May  3 12:13:41 124388 sshd[30824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70
May  3 12:13:41 124388 sshd[30824]: Invalid user diego from 117.211.192.70 port 35770
May  3 12:13:43 124388 sshd[30824]: Failed password for invalid user diego from 117.211.192.70 port 35770 ssh2
2020-05-03 22:19:41
45.162.246.220 attack
Automatic report - Port Scan Attack
2020-05-03 22:16:50
157.230.19.72 attackspam
2020-05-03T14:42:48.320255vps773228.ovh.net sshd[4440]: Failed password for root from 157.230.19.72 port 41416 ssh2
2020-05-03T14:46:44.977965vps773228.ovh.net sshd[4489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.19.72  user=root
2020-05-03T14:46:46.973091vps773228.ovh.net sshd[4489]: Failed password for root from 157.230.19.72 port 53190 ssh2
2020-05-03T14:50:44.387729vps773228.ovh.net sshd[4566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.19.72  user=root
2020-05-03T14:50:46.663494vps773228.ovh.net sshd[4566]: Failed password for root from 157.230.19.72 port 36732 ssh2
...
2020-05-03 22:13:53
190.64.137.173 attackbots
May  3 15:52:51 mout sshd[19564]: Invalid user mohamad from 190.64.137.173 port 37974
2020-05-03 22:22:56
51.81.253.192 attackspam
abasicmove.de:80 51.81.253.192 - - [03/May/2020:14:13:24 +0200] "POST /xmlrpc.php HTTP/1.0" 301 493 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.92 Safari/537.36"
abasicmove.de 51.81.253.192 [03/May/2020:14:13:26 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3643 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.92 Safari/537.36"
2020-05-03 22:27:00
185.103.51.85 attackbotsspam
May  3 16:01:11 electroncash sshd[19276]: Invalid user scb from 185.103.51.85 port 51466
May  3 16:01:11 electroncash sshd[19276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.103.51.85 
May  3 16:01:11 electroncash sshd[19276]: Invalid user scb from 185.103.51.85 port 51466
May  3 16:01:13 electroncash sshd[19276]: Failed password for invalid user scb from 185.103.51.85 port 51466 ssh2
May  3 16:05:02 electroncash sshd[21269]: Invalid user endangs from 185.103.51.85 port 33342
...
2020-05-03 22:19:59
64.225.114.156 attack
[Sun May 03 14:55:44 2020] - DDoS Attack From IP: 64.225.114.156 Port: 41685
2020-05-03 22:26:36

最近上报的IP列表

72.110.95.122 14.22.210.194 166.72.196.58 121.63.129.142
76.201.99.126 234.24.84.6 243.220.101.97 8.19.2.113
79.186.254.167 62.137.89.74 147.126.211.145 3.171.210.101
97.140.202.173 204.50.38.82 208.36.43.225 186.11.118.65
163.42.114.90 64.107.124.243 53.241.187.234 244.244.81.17