必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.92.48.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.92.48.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 14:00:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
126.48.92.139.in-addr.arpa domain name pointer slip139-92-48-126.lis.pt.prserv.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.48.92.139.in-addr.arpa	name = slip139-92-48-126.lis.pt.prserv.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.71.129.99 attackspam
Sep 23 01:06:44 plusreed sshd[6574]: Invalid user gael from 64.71.129.99
...
2019-09-23 13:13:53
218.92.0.132 attackspam
Sep 23 06:20:49 icinga sshd[19639]: Failed password for root from 218.92.0.132 port 50869 ssh2
Sep 23 06:20:52 icinga sshd[19639]: Failed password for root from 218.92.0.132 port 50869 ssh2
Sep 23 06:20:57 icinga sshd[19639]: Failed password for root from 218.92.0.132 port 50869 ssh2
Sep 23 06:21:02 icinga sshd[19639]: Failed password for root from 218.92.0.132 port 50869 ssh2
...
2019-09-23 13:19:16
183.82.121.34 attackbots
Sep 23 07:56:07 mail sshd\[27285\]: Invalid user xrtwk318 from 183.82.121.34 port 45547
Sep 23 07:56:07 mail sshd\[27285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
Sep 23 07:56:09 mail sshd\[27285\]: Failed password for invalid user xrtwk318 from 183.82.121.34 port 45547 ssh2
Sep 23 08:00:37 mail sshd\[28227\]: Invalid user vpopmail123 from 183.82.121.34 port 64984
Sep 23 08:00:37 mail sshd\[28227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
2019-09-23 14:06:32
114.118.91.32 attack
Sep 23 07:03:33 rpi sshd[6889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.32 
Sep 23 07:03:34 rpi sshd[6889]: Failed password for invalid user onetha from 114.118.91.32 port 39562 ssh2
2019-09-23 13:43:43
95.170.233.76 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/95.170.233.76/ 
 SK - 1H : (4)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SK 
 NAME ASN : ASN16006 
 
 IP : 95.170.233.76 
 
 CIDR : 95.170.232.0/22 
 
 PREFIX COUNT : 9 
 
 UNIQUE IP COUNT : 11264 
 
 
 WYKRYTE ATAKI Z ASN16006 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-23 13:52:27
198.108.67.42 attackspambots
09/22/2019-23:57:11.900745 198.108.67.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-23 13:20:09
115.192.253.56 attackbots
Sep 23 07:13:55 markkoudstaal sshd[23951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.192.253.56
Sep 23 07:13:57 markkoudstaal sshd[23951]: Failed password for invalid user ge from 115.192.253.56 port 49722 ssh2
Sep 23 07:18:10 markkoudstaal sshd[24356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.192.253.56
2019-09-23 14:03:44
0.0.33.115 attackspambots
Fail2Ban Ban Triggered
2019-09-23 13:14:34
222.186.175.155 attack
Sep 23 07:22:04 heissa sshd\[13917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Sep 23 07:22:06 heissa sshd\[13917\]: Failed password for root from 222.186.175.155 port 64544 ssh2
Sep 23 07:22:11 heissa sshd\[13917\]: Failed password for root from 222.186.175.155 port 64544 ssh2
Sep 23 07:22:14 heissa sshd\[13917\]: Failed password for root from 222.186.175.155 port 64544 ssh2
Sep 23 07:22:19 heissa sshd\[13917\]: Failed password for root from 222.186.175.155 port 64544 ssh2
2019-09-23 13:28:44
77.40.62.94 attackspam
failed_logins
2019-09-23 13:18:54
211.174.227.230 attackbots
Sep 23 00:30:58 ny01 sshd[672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.174.227.230
Sep 23 00:31:01 ny01 sshd[672]: Failed password for invalid user fv from 211.174.227.230 port 53570 ssh2
Sep 23 00:35:53 ny01 sshd[1635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.174.227.230
2019-09-23 13:45:47
51.38.57.78 attackspambots
Sep 23 06:53:46 SilenceServices sshd[26678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
Sep 23 06:53:48 SilenceServices sshd[26678]: Failed password for invalid user rx from 51.38.57.78 port 40922 ssh2
Sep 23 06:56:56 SilenceServices sshd[27505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
2019-09-23 13:15:58
150.242.213.189 attackspambots
Sep 23 07:12:47 taivassalofi sshd[70725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
Sep 23 07:12:49 taivassalofi sshd[70725]: Failed password for invalid user polycom from 150.242.213.189 port 46464 ssh2
...
2019-09-23 14:01:59
51.15.182.231 attackbotsspam
Sep 23 05:04:11 hcbbdb sshd\[3066\]: Invalid user silverelites from 51.15.182.231
Sep 23 05:04:11 hcbbdb sshd\[3066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.182.231
Sep 23 05:04:13 hcbbdb sshd\[3066\]: Failed password for invalid user silverelites from 51.15.182.231 port 38900 ssh2
Sep 23 05:09:05 hcbbdb sshd\[3619\]: Invalid user Sulo from 51.15.182.231
Sep 23 05:09:05 hcbbdb sshd\[3619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.182.231
2019-09-23 13:23:30
75.31.93.181 attackbotsspam
2019-09-23T11:59:20.087764enmeeting.mahidol.ac.th sshd\[2337\]: Invalid user clerk from 75.31.93.181 port 29236
2019-09-23T11:59:20.103527enmeeting.mahidol.ac.th sshd\[2337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.31.93.181
2019-09-23T11:59:22.491188enmeeting.mahidol.ac.th sshd\[2337\]: Failed password for invalid user clerk from 75.31.93.181 port 29236 ssh2
...
2019-09-23 14:02:54

最近上报的IP列表

242.240.199.179 241.103.10.120 132.246.63.235 228.23.196.168
132.214.251.92 93.78.72.210 7.161.205.124 237.2.54.135
223.114.227.22 47.254.171.206 54.250.142.76 124.26.144.254
217.174.31.159 42.183.133.171 222.195.198.227 6.8.59.47
196.228.179.32 231.70.182.143 200.249.21.129 16.107.129.237