必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.39.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.39.252.			IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:39:56 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 252.39.5.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.39.5.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
76.186.81.229 attackspam
Nov 22 07:21:12 herz-der-gamer sshd[2063]: Invalid user squid from 76.186.81.229 port 33787
Nov 22 07:21:12 herz-der-gamer sshd[2063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.81.229
Nov 22 07:21:12 herz-der-gamer sshd[2063]: Invalid user squid from 76.186.81.229 port 33787
Nov 22 07:21:14 herz-der-gamer sshd[2063]: Failed password for invalid user squid from 76.186.81.229 port 33787 ssh2
...
2019-11-22 20:08:42
62.234.154.56 attackspam
Invalid user YD159357 from 62.234.154.56 port 38705
2019-11-22 19:35:53
219.141.211.74 attackspambots
Nov 22 13:21:17 lcl-usvr-01 sshd[27771]: refused connect from 219.141.211.74 (219.141.211.74)
2019-11-22 20:04:52
122.52.48.92 attack
SSH Brute Force, server-1 sshd[25765]: Failed password for root from 122.52.48.92 port 45966 ssh2
2019-11-22 19:46:24
150.223.2.39 attackspam
Nov 22 01:27:41 php1 sshd\[5415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.2.39  user=root
Nov 22 01:27:44 php1 sshd\[5415\]: Failed password for root from 150.223.2.39 port 60903 ssh2
Nov 22 01:32:12 php1 sshd\[6212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.2.39  user=root
Nov 22 01:32:13 php1 sshd\[6212\]: Failed password for root from 150.223.2.39 port 47189 ssh2
Nov 22 01:36:58 php1 sshd\[6729\]: Invalid user 321 from 150.223.2.39
2019-11-22 19:55:02
125.124.38.96 attackbots
Invalid user 123 from 125.124.38.96 port 54994
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.38.96
Failed password for invalid user 123 from 125.124.38.96 port 54994 ssh2
Invalid user sr1234 from 125.124.38.96 port 33236
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.38.96
2019-11-22 20:10:21
164.132.100.28 attack
Nov 22 09:32:21 SilenceServices sshd[32386]: Failed password for root from 164.132.100.28 port 59134 ssh2
Nov 22 09:35:59 SilenceServices sshd[964]: Failed password for bin from 164.132.100.28 port 38800 ssh2
2019-11-22 19:37:58
90.92.243.46 attackbotsspam
Nov 22 06:21:12 gitlab-ci sshd\[29614\]: Invalid user pi from 90.92.243.46Nov 22 06:21:12 gitlab-ci sshd\[29616\]: Invalid user pi from 90.92.243.46
...
2019-11-22 20:09:32
51.68.192.106 attack
Nov 22 09:48:24 SilenceServices sshd[4839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106
Nov 22 09:48:27 SilenceServices sshd[4839]: Failed password for invalid user qqwwee123456789 from 51.68.192.106 port 46746 ssh2
Nov 22 09:51:29 SilenceServices sshd[5819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106
2019-11-22 19:48:57
91.207.40.45 attackbots
2019-11-22T09:40:33.958502abusebot-4.cloudsearch.cf sshd\[3499\]: Invalid user hemelryck from 91.207.40.45 port 51900
2019-11-22 19:38:13
112.213.89.102 attack
Automatic report - SQL Injection Attempts
2019-11-22 19:33:17
37.144.158.0 attackbotsspam
Nov 22 07:22:00 mail sshd\[10576\]: Invalid user admin from 37.144.158.0
Nov 22 07:22:00 mail sshd\[10576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.144.158.0
Nov 22 07:22:01 mail sshd\[10576\]: Failed password for invalid user admin from 37.144.158.0 port 39072 ssh2
...
2019-11-22 19:40:39
61.183.35.44 attackspambots
2019-11-22T11:20:55.645801abusebot-5.cloudsearch.cf sshd\[30995\]: Invalid user robert from 61.183.35.44 port 44522
2019-11-22 19:36:16
140.249.196.49 attackspam
F2B jail: sshd. Time: 2019-11-22 11:19:29, Reported by: VKReport
2019-11-22 19:56:38
62.234.91.237 attackbotsspam
Nov 22 09:30:44 icinga sshd[25680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.237
Nov 22 09:30:45 icinga sshd[25680]: Failed password for invalid user zookeeper from 62.234.91.237 port 36834 ssh2
...
2019-11-22 20:07:15

最近上报的IP列表

139.59.0.231 139.59.0.33 139.5.73.114 139.59.16.179
139.59.160.189 139.59.153.125 139.59.16.122 139.59.160.244
139.59.166.16 139.59.16.89 139.59.151.172 139.59.153.33
139.59.161.225 139.59.165.171 139.59.155.217 139.59.175.126
139.59.166.66 139.59.17.139 106.159.219.74 139.59.176.128