必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Guam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.136.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.136.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:12:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 137.136.5.139.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 139.5.136.137.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.168.66.223 attackbotsspam
Jul 16 14:14:41 srv-4 sshd\[2893\]: Invalid user admin from 14.168.66.223
Jul 16 14:14:41 srv-4 sshd\[2893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.168.66.223
Jul 16 14:14:42 srv-4 sshd\[2893\]: Failed password for invalid user admin from 14.168.66.223 port 38279 ssh2
...
2019-07-16 20:21:55
49.88.112.71 attack
Jul 15 06:01:52 ntop sshd[2419]: Did not receive identification string from 49.88.112.71 port 10304
Jul 15 06:03:09 ntop sshd[2513]: User r.r from 49.88.112.71 not allowed because not listed in AllowUsers
Jul 15 06:03:10 ntop sshd[2513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=r.r
Jul 15 06:03:11 ntop sshd[2513]: Failed password for invalid user r.r from 49.88.112.71 port 47388 ssh2
Jul 15 06:03:15 ntop sshd[2513]: Failed password for invalid user r.r from 49.88.112.71 port 47388 ssh2
Jul 15 06:03:45 ntop sshd[2513]: Connection reset by 49.88.112.71 port 47388 [preauth]
Jul 15 06:03:45 ntop sshd[2513]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=r.r
Jul 15 06:04:31 ntop sshd[2584]: User r.r from 49.88.112.71 not allowed because not listed in AllowUsers
Jul 15 06:04:34 ntop sshd[2584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........
-------------------------------
2019-07-16 20:47:16
46.6.2.18 attack
Jul 15 06:15:00 srv1 sshd[15867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.6.2.18  user=r.r
Jul 15 06:15:02 srv1 sshd[15867]: Failed password for r.r from 46.6.2.18 port 47654 ssh2
Jul 15 06:15:04 srv1 sshd[15867]: Failed password for r.r from 46.6.2.18 port 47654 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.6.2.18
2019-07-16 20:52:49
203.151.26.133 attackbots
Jul 16 15:52:41 server sshd\[1996\]: Failed password for invalid user jakob from 203.151.26.133 port 37921 ssh2
Jul 16 15:52:44 server sshd\[2112\]: Invalid user diana from 203.151.26.133 port 38255
Jul 16 15:52:44 server sshd\[2112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.26.133
Jul 16 15:52:46 server sshd\[2112\]: Failed password for invalid user diana from 203.151.26.133 port 38255 ssh2
Jul 16 15:52:49 server sshd\[2199\]: Invalid user denisse from 203.151.26.133 port 38602
Jul 16 15:52:49 server sshd\[2199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.26.133
2019-07-16 20:55:38
124.178.233.118 attack
Invalid user vdi from 124.178.233.118 port 39673
2019-07-16 21:07:26
197.51.198.220 attackspambots
Jul 16 14:14:45 srv-4 sshd\[2900\]: Invalid user admin from 197.51.198.220
Jul 16 14:14:45 srv-4 sshd\[2900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.198.220
Jul 16 14:14:47 srv-4 sshd\[2900\]: Failed password for invalid user admin from 197.51.198.220 port 46785 ssh2
...
2019-07-16 20:18:02
132.232.32.228 attackbotsspam
Repeated brute force against a port
2019-07-16 20:30:15
211.195.245.73 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-07-16 20:33:28
36.91.162.10 attackspambots
Jul 16 13:13:43 bouncer sshd\[9093\]: Invalid user admin from 36.91.162.10 port 65303
Jul 16 13:13:43 bouncer sshd\[9093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.162.10 
Jul 16 13:13:45 bouncer sshd\[9093\]: Failed password for invalid user admin from 36.91.162.10 port 65303 ssh2
...
2019-07-16 21:08:02
212.129.55.152 attackspam
Jul 16 13:55:12 herz-der-gamer sshd[24533]: Failed password for root from 212.129.55.152 port 28884 ssh2
...
2019-07-16 21:08:54
45.117.83.118 attackbotsspam
2019-07-16T11:48:04.966141abusebot-7.cloudsearch.cf sshd\[10491\]: Invalid user cib from 45.117.83.118 port 33484
2019-07-16 20:14:53
103.231.139.130 attack
SMTP blocked logins 10335. Dates: 15-7-2019 / 16-7-2019
2019-07-16 20:44:38
104.196.16.112 attack
Invalid user flopy from 104.196.16.112 port 41490
2019-07-16 20:54:10
5.62.41.147 attack
\[2019-07-16 07:59:18\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '5.62.41.147:8214' - Wrong password
\[2019-07-16 07:59:18\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-16T07:59:18.033-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="618",SessionID="0x7f06f80c2bc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.147/59903",Challenge="3d785999",ReceivedChallenge="3d785999",ReceivedHash="bc6709082809a19625fcc6ce6a33efb2"
\[2019-07-16 08:00:37\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '5.62.41.147:8362' - Wrong password
\[2019-07-16 08:00:37\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-16T08:00:37.929-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="619",SessionID="0x7f06f806ae98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.147/61762
2019-07-16 20:13:11
216.243.31.2 attackspambots
Jul 16 11:14:46   DDOS Attack: SRC=216.243.31.2 DST=[Masked] LEN=40 TOS=0x08 PREC=0x60 TTL=46  DF PROTO=TCP SPT=35838 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-07-16 20:19:16

最近上报的IP列表

51.243.154.240 176.66.126.116 50.4.106.200 53.40.222.133
166.215.19.50 56.242.214.94 228.177.215.132 185.41.174.2
74.136.23.65 39.213.111.238 219.48.109.60 189.95.125.125
245.23.245.185 103.21.146.37 202.156.11.111 190.167.14.206
84.192.88.198 121.10.63.224 248.75.150.181 229.58.241.191