必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.80.85.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.80.85.150.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122801 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 29 02:51:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
150.85.80.139.in-addr.arpa domain name pointer webserv11-w.otago.ac.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.85.80.139.in-addr.arpa	name = webserv11-w.otago.ac.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.107.133.139 attackspam
SIPVicious Scanner Detection
2019-09-01 14:14:09
148.70.61.60 attack
Aug 31 19:50:34 plusreed sshd[28223]: Invalid user jb from 148.70.61.60
...
2019-09-01 13:48:52
23.247.81.43 attackspambots
Automatic report generated by Wazuh
2019-09-01 13:26:16
189.45.192.4 attackspambots
Aug 31 15:42:23 mail postfix/postscreen[56851]: PREGREET 41 after 0.88 from [189.45.192.4]:35799: EHLO dynamic-179-127-181-236.tpa.net.br

...
2019-09-01 14:15:33
60.29.188.134 attack
31.08.2019 23:42:28 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-09-01 14:26:39
37.122.119.8 attackspam
Telnetd brute force attack detected by fail2ban
2019-09-01 14:07:43
196.43.196.108 attackbotsspam
Invalid user rosa from 196.43.196.108 port 37308
2019-09-01 14:08:08
103.228.55.79 attackspam
Invalid user ana from 103.228.55.79 port 54938
2019-09-01 13:52:46
2.139.215.255 attackspam
2019-09-01T05:24:35.144Z CLOSE host=2.139.215.255 port=45677 fd=6 time=970.337 bytes=1770
...
2019-09-01 13:26:40
68.183.224.118 attack
Sep  1 06:22:25 XXX sshd[22826]: Invalid user gz from 68.183.224.118 port 50018
2019-09-01 14:29:23
182.61.130.121 attack
Invalid user lanto from 182.61.130.121 port 19237
2019-09-01 13:51:22
89.41.173.191 attackbots
Sep  1 07:21:37 rotator sshd\[32247\]: Failed password for root from 89.41.173.191 port 36516 ssh2Sep  1 07:21:39 rotator sshd\[32247\]: Failed password for root from 89.41.173.191 port 36516 ssh2Sep  1 07:21:41 rotator sshd\[32247\]: Failed password for root from 89.41.173.191 port 36516 ssh2Sep  1 07:21:44 rotator sshd\[32247\]: Failed password for root from 89.41.173.191 port 36516 ssh2Sep  1 07:21:47 rotator sshd\[32247\]: Failed password for root from 89.41.173.191 port 36516 ssh2Sep  1 07:21:50 rotator sshd\[32247\]: Failed password for root from 89.41.173.191 port 36516 ssh2
...
2019-09-01 14:07:01
178.32.165.35 attack
SSH-BruteForce
2019-09-01 14:21:24
68.183.234.68 attackspambots
Invalid user Minecraft from 68.183.234.68 port 59172
2019-09-01 14:24:48
185.77.50.173 attackspam
Aug 31 23:38:48 tux-35-217 sshd\[11507\]: Invalid user administrador from 185.77.50.173 port 59884
Aug 31 23:38:48 tux-35-217 sshd\[11507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.77.50.173
Aug 31 23:38:49 tux-35-217 sshd\[11507\]: Failed password for invalid user administrador from 185.77.50.173 port 59884 ssh2
Aug 31 23:43:15 tux-35-217 sshd\[11509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.77.50.173  user=uucp
...
2019-09-01 13:50:48

最近上报的IP列表

184.19.27.138 111.231.165.158 87.76.69.11 239.248.52.113
245.85.96.209 217.134.10.48 134.34.178.141 112.217.202.247
111.87.209.125 111.73.147.132 111.248.32.185 111.243.0.124
111.226.66.44 111.211.3.211 111.186.221.186 111.132.202.52
110.234.249.12 110.138.76.61 11.88.149.235 11.55.244.32