必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.82.10.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.82.10.99.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 23:00:40 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 99.10.82.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.10.82.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.34.27.128 attackspambots
Automatic report - XMLRPC Attack
2020-06-23 20:16:07
142.112.81.183 attackbotsspam
3389BruteforceStormFW21
2020-06-23 19:49:15
106.54.182.239 attackspambots
2020-06-23T14:08:09.203558galaxy.wi.uni-potsdam.de sshd[29459]: Invalid user bot from 106.54.182.239 port 37080
2020-06-23T14:08:09.208852galaxy.wi.uni-potsdam.de sshd[29459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.182.239
2020-06-23T14:08:09.203558galaxy.wi.uni-potsdam.de sshd[29459]: Invalid user bot from 106.54.182.239 port 37080
2020-06-23T14:08:11.366748galaxy.wi.uni-potsdam.de sshd[29459]: Failed password for invalid user bot from 106.54.182.239 port 37080 ssh2
2020-06-23T14:09:41.809193galaxy.wi.uni-potsdam.de sshd[29629]: Invalid user shelly from 106.54.182.239 port 52984
2020-06-23T14:09:41.813856galaxy.wi.uni-potsdam.de sshd[29629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.182.239
2020-06-23T14:09:41.809193galaxy.wi.uni-potsdam.de sshd[29629]: Invalid user shelly from 106.54.182.239 port 52984
2020-06-23T14:09:43.268902galaxy.wi.uni-potsdam.de sshd[29629]: Failed pass
...
2020-06-23 20:18:00
185.220.101.175 attackspam
CMS (WordPress or Joomla) login attempt.
2020-06-23 20:08:30
112.21.188.250 attack
2020-06-23T06:44:39.812840devel sshd[5401]: Invalid user testuser from 112.21.188.250 port 37620
2020-06-23T06:44:41.859341devel sshd[5401]: Failed password for invalid user testuser from 112.21.188.250 port 37620 ssh2
2020-06-23T06:47:58.044027devel sshd[5698]: Invalid user wangjie from 112.21.188.250 port 51079
2020-06-23 20:07:28
138.197.69.184 attack
Jun 23 12:40:38 gestao sshd[29055]: Failed password for root from 138.197.69.184 port 43448 ssh2
Jun 23 12:44:11 gestao sshd[29153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.69.184 
Jun 23 12:44:13 gestao sshd[29153]: Failed password for invalid user drive from 138.197.69.184 port 45436 ssh2
...
2020-06-23 19:50:46
168.138.196.255 attackbots
Jun 23 07:55:10 our-server-hostname sshd[17835]: Invalid user dkp from 168.138.196.255
Jun 23 07:55:10 our-server-hostname sshd[17835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.196.255 
Jun 23 07:55:12 our-server-hostname sshd[17835]: Failed password for invalid user dkp from 168.138.196.255 port 59350 ssh2
Jun 23 08:12:19 our-server-hostname sshd[21068]: Invalid user emu from 168.138.196.255
Jun 23 08:12:19 our-server-hostname sshd[21068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.196.255 
Jun 23 08:12:20 our-server-hostname sshd[21068]: Failed password for invalid user emu from 168.138.196.255 port 48486 ssh2
Jun 23 08:18:51 our-server-hostname sshd[22152]: Invalid user admin1 from 168.138.196.255
Jun 23 08:18:51 our-server-hostname sshd[22152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.196.255 
Jun 23 08:18........
-------------------------------
2020-06-23 20:30:58
37.187.7.95 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-06-23 20:17:35
185.143.72.25 attackspam
2020-06-21 07:08:43 dovecot_login authenticator failed for \(User\) \[185.143.72.25\]: 535 Incorrect authentication data \(set_id=see@no-server.de\)
2020-06-21 07:09:01 dovecot_login authenticator failed for \(User\) \[185.143.72.25\]: 535 Incorrect authentication data \(set_id=see@no-server.de\)
2020-06-21 07:09:03 dovecot_login authenticator failed for \(User\) \[185.143.72.25\]: 535 Incorrect authentication data \(set_id=see@no-server.de\)
2020-06-21 07:09:20 dovecot_login authenticator failed for \(User\) \[185.143.72.25\]: 535 Incorrect authentication data \(set_id=api.test@no-server.de\)
2020-06-21 07:09:36 dovecot_login authenticator failed for \(User\) \[185.143.72.25\]: 535 Incorrect authentication data \(set_id=api.test@no-server.de\)
...
2020-06-23 19:58:59
103.237.56.83 attack
Brute force attempt
2020-06-23 19:55:28
112.85.42.174 attack
Jun 23 12:32:53 vpn01 sshd[28864]: Failed password for root from 112.85.42.174 port 13815 ssh2
Jun 23 12:32:57 vpn01 sshd[28864]: Failed password for root from 112.85.42.174 port 13815 ssh2
...
2020-06-23 19:59:37
117.69.191.150 attackspambots
Jun 23 06:09:49 srv01 postfix/smtpd\[31606\]: warning: unknown\[117.69.191.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:14:27 srv01 postfix/smtpd\[9999\]: warning: unknown\[117.69.191.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:14:38 srv01 postfix/smtpd\[9999\]: warning: unknown\[117.69.191.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:14:54 srv01 postfix/smtpd\[9999\]: warning: unknown\[117.69.191.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 23 06:15:13 srv01 postfix/smtpd\[9999\]: warning: unknown\[117.69.191.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-23 20:01:09
186.209.72.166 attackspambots
Jun 23 13:51:26 vpn01 sshd[30075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.72.166
Jun 23 13:51:28 vpn01 sshd[30075]: Failed password for invalid user guest1 from 186.209.72.166 port 38940 ssh2
...
2020-06-23 19:58:09
128.199.128.215 attackspambots
Jun 23 06:49:51 ns381471 sshd[28000]: Failed password for root from 128.199.128.215 port 57090 ssh2
2020-06-23 20:00:49
104.248.235.55 attackbots
web-1 [ssh_2] SSH Attack
2020-06-23 19:53:28

最近上报的IP列表

242.58.151.91 227.103.215.223 207.98.18.155 81.234.40.142
88.43.252.171 243.194.63.175 40.152.23.141 73.20.115.157
155.57.141.98 252.196.189.171 132.49.88.120 47.25.131.197
79.164.38.84 5.226.122.147 251.56.234.207 145.153.168.192
210.176.244.215 219.17.76.35 161.69.250.68 153.83.125.42