必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.83.146.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.83.146.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:47:54 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 222.146.83.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.146.83.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.169 attackspambots
Oct 20 23:47:57 minden010 sshd[32233]: Failed password for root from 222.186.175.169 port 10780 ssh2
Oct 20 23:48:01 minden010 sshd[32233]: Failed password for root from 222.186.175.169 port 10780 ssh2
Oct 20 23:48:05 minden010 sshd[32233]: Failed password for root from 222.186.175.169 port 10780 ssh2
Oct 20 23:48:15 minden010 sshd[32233]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 10780 ssh2 [preauth]
...
2019-10-21 05:56:11
171.25.193.234 attackbotsspam
Automatic report - Port Scan
2019-10-21 06:21:15
185.156.73.17 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 33439 proto: TCP cat: Misc Attack
2019-10-21 06:11:07
217.182.196.164 attackbotsspam
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2019-10-21 06:09:06
106.13.168.150 attackbots
2019-10-20T21:29:04.202264abusebot-2.cloudsearch.cf sshd\[31135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.168.150  user=root
2019-10-21 05:42:14
200.194.28.116 attackspambots
Oct 20 23:54:17 MK-Soft-VM5 sshd[19698]: Failed password for root from 200.194.28.116 port 39946 ssh2
Oct 20 23:54:19 MK-Soft-VM5 sshd[19698]: Failed password for root from 200.194.28.116 port 39946 ssh2
...
2019-10-21 05:56:33
72.221.232.135 attack
www.lust-auf-land.com 72.221.232.135 \[20/Oct/2019:22:25:36 +0200\] "POST /wp-login.php HTTP/1.1" 200 7764 "http://www.lust-auf-land.com/wp-login.php" "Mozilla/5.0 \(Windows NT 6.1\; rv:60.0\) Gecko/20100101 Firefox/60.0"
www.lust-auf-land.com 72.221.232.135 \[20/Oct/2019:22:25:39 +0200\] "POST /wp-login.php HTTP/1.1" 200 5100 "http://www.lust-auf-land.com/wp-login.php" "Mozilla/5.0 \(Windows NT 6.1\; rv:60.0\) Gecko/20100101 Firefox/60.0"
2019-10-21 06:17:47
159.65.133.212 attackspam
Oct 20 23:26:36 nextcloud sshd\[18694\]: Invalid user guava from 159.65.133.212
Oct 20 23:26:36 nextcloud sshd\[18694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.212
Oct 20 23:26:38 nextcloud sshd\[18694\]: Failed password for invalid user guava from 159.65.133.212 port 52790 ssh2
...
2019-10-21 06:15:14
2a02:a31d:8441:4a80:b59a:4c3:aed9:4b7f attackbots
Sniffing for wp-login
2019-10-21 05:56:52
77.247.110.248 attackspam
10/20/2019-22:26:07.995375 77.247.110.248 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-10-21 06:00:34
105.247.109.72 attackbots
2019-10-20T20:19:43.107210shield sshd\[24101\]: Invalid user ts from 105.247.109.72 port 52046
2019-10-20T20:19:43.112199shield sshd\[24101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.247.109.72
2019-10-20T20:19:45.131456shield sshd\[24101\]: Failed password for invalid user ts from 105.247.109.72 port 52046 ssh2
2019-10-20T20:25:34.629581shield sshd\[25339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.247.109.72  user=root
2019-10-20T20:25:37.166099shield sshd\[25339\]: Failed password for root from 105.247.109.72 port 43022 ssh2
2019-10-21 06:18:55
113.62.191.132 attack
Oct 20 22:25:34 host postfix/smtpd[40364]: warning: unknown[113.62.191.132]: SASL LOGIN authentication failed: authentication failure
Oct 20 22:25:37 host postfix/smtpd[40364]: warning: unknown[113.62.191.132]: SASL LOGIN authentication failed: authentication failure
...
2019-10-21 06:18:40
118.91.255.14 attackbots
Invalid user 123 from 118.91.255.14 port 49988
2019-10-21 05:57:23
49.235.36.51 attack
Oct 20 11:02:24 kapalua sshd\[5455\]: Invalid user ts3 from 49.235.36.51
Oct 20 11:02:24 kapalua sshd\[5455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.36.51
Oct 20 11:02:27 kapalua sshd\[5455\]: Failed password for invalid user ts3 from 49.235.36.51 port 54564 ssh2
Oct 20 11:06:58 kapalua sshd\[5843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.36.51  user=root
Oct 20 11:07:00 kapalua sshd\[5843\]: Failed password for root from 49.235.36.51 port 60720 ssh2
2019-10-21 05:45:34
206.189.84.1 attack
Oct 20 12:09:20 web9 sshd\[26619\]: Invalid user swiss from 206.189.84.1
Oct 20 12:09:20 web9 sshd\[26619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.84.1
Oct 20 12:09:22 web9 sshd\[26619\]: Failed password for invalid user swiss from 206.189.84.1 port 50002 ssh2
Oct 20 12:13:54 web9 sshd\[27247\]: Invalid user password from 206.189.84.1
Oct 20 12:13:54 web9 sshd\[27247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.84.1
2019-10-21 06:20:56

最近上报的IP列表

121.218.126.49 208.82.213.71 28.225.193.24 71.102.154.132
43.0.51.129 174.225.215.46 184.67.126.112 173.54.69.102
90.77.214.20 56.48.85.55 187.105.117.91 43.158.219.162
80.104.200.133 135.68.55.8 65.192.214.8 179.11.103.88
181.116.76.52 80.228.145.169 89.238.83.35 17.100.100.232