必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.80.31.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.80.31.162.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:13:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
162.31.80.139.in-addr.arpa domain name pointer htruoffice-old.otago.ac.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
162.31.80.139.in-addr.arpa	name = htruoffice-old.otago.ac.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.176.120.22 attackspam
Unauthorized connection attempt from IP address 14.176.120.22 on Port 445(SMB)
2019-09-20 12:29:35
51.15.190.180 attackspambots
Invalid user fc from 51.15.190.180 port 59062
2019-09-20 13:00:16
200.228.25.70 attackspam
Unauthorized connection attempt from IP address 200.228.25.70 on Port 445(SMB)
2019-09-20 12:59:53
101.89.216.223 attack
Brute force SMTP login attempts.
2019-09-20 12:40:38
206.189.41.34 attack
Sep 20 00:30:10 ny01 sshd[30093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.41.34
Sep 20 00:30:11 ny01 sshd[30093]: Failed password for invalid user bamboo from 206.189.41.34 port 62931 ssh2
Sep 20 00:34:48 ny01 sshd[30929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.41.34
2019-09-20 12:40:18
49.51.46.69 attackbots
Sep 20 06:33:47 dedicated sshd[14341]: Invalid user dh from 49.51.46.69 port 38962
2019-09-20 12:44:08
140.143.58.46 attackbotsspam
Sep 19 15:15:32 sachi sshd\[32138\]: Invalid user test from 140.143.58.46
Sep 19 15:15:32 sachi sshd\[32138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.58.46
Sep 19 15:15:34 sachi sshd\[32138\]: Failed password for invalid user test from 140.143.58.46 port 52664 ssh2
Sep 19 15:19:42 sachi sshd\[32548\]: Invalid user oracle from 140.143.58.46
Sep 19 15:19:42 sachi sshd\[32548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.58.46
2019-09-20 12:58:38
168.196.183.18 attack
Unauthorized connection attempt from IP address 168.196.183.18 on Port 445(SMB)
2019-09-20 12:56:07
218.150.220.210 attackbotsspam
Sep 20 03:44:38 core sshd[3789]: Invalid user ben from 218.150.220.210 port 33480
Sep 20 03:44:40 core sshd[3789]: Failed password for invalid user ben from 218.150.220.210 port 33480 ssh2
...
2019-09-20 12:27:22
144.217.93.130 attackspambots
2019-09-20T00:10:59.8487141495-001 sshd\[28075\]: Failed password for invalid user qwerty from 144.217.93.130 port 41762 ssh2
2019-09-20T00:28:47.4033661495-001 sshd\[29342\]: Invalid user january from 144.217.93.130 port 33810
2019-09-20T00:28:47.4121461495-001 sshd\[29342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.ip-144-217-93.net
2019-09-20T00:28:49.2253751495-001 sshd\[29342\]: Failed password for invalid user january from 144.217.93.130 port 33810 ssh2
2019-09-20T00:33:14.4618981495-001 sshd\[29810\]: Invalid user 123 from 144.217.93.130 port 45940
2019-09-20T00:33:14.4701411495-001 sshd\[29810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.ip-144-217-93.net
...
2019-09-20 12:54:49
191.34.60.106 attackbotsspam
Unauthorized connection attempt from IP address 191.34.60.106 on Port 445(SMB)
2019-09-20 12:53:59
200.68.137.236 attackspambots
Unauthorized connection attempt from IP address 200.68.137.236 on Port 445(SMB)
2019-09-20 12:31:27
112.217.150.113 attack
Sep 20 05:28:29 fr01 sshd[10221]: Invalid user ltelles from 112.217.150.113
Sep 20 05:28:29 fr01 sshd[10221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.150.113
Sep 20 05:28:29 fr01 sshd[10221]: Invalid user ltelles from 112.217.150.113
Sep 20 05:28:31 fr01 sshd[10221]: Failed password for invalid user ltelles from 112.217.150.113 port 53352 ssh2
...
2019-09-20 12:39:03
104.140.188.18 attack
firewall-block, port(s): 3389/tcp
2019-09-20 12:45:20
162.247.74.213 attack
joshuajohannes.de:80 162.247.74.213 - - \[20/Sep/2019:03:03:43 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 501 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_12_6\) AppleWebKit/605.1.15 \(KHTML, like Gecko\) Version/11.1.2 Safari/605.1.15"
joshuajohannes.de 162.247.74.213 \[20/Sep/2019:03:03:46 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3777 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_12_6\) AppleWebKit/605.1.15 \(KHTML, like Gecko\) Version/11.1.2 Safari/605.1.15"
2019-09-20 12:40:52

最近上报的IP列表

40.158.146.208 45.214.56.241 24.130.143.160 189.78.253.54
134.149.195.9 73.174.29.192 130.5.173.229 140.68.41.97
233.82.119.67 194.108.82.45 16.37.135.184 175.114.27.96
55.102.111.242 73.35.201.97 143.78.110.120 155.131.38.230
8.238.248.76 100.30.133.35 58.30.155.206 124.137.99.161