必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.102.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.102.159.			IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:08:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
159.102.99.139.in-addr.arpa domain name pointer 159.ip-139-99-102.eu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.102.99.139.in-addr.arpa	name = 159.ip-139-99-102.eu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
102.38.56.118 attack
Jul 28 00:30:10 george sshd[26728]: Failed password for invalid user saul from 102.38.56.118 port 15834 ssh2
Jul 28 00:34:46 george sshd[26761]: Invalid user abhra from 102.38.56.118 port 5372
Jul 28 00:34:46 george sshd[26761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.38.56.118 
Jul 28 00:34:48 george sshd[26761]: Failed password for invalid user abhra from 102.38.56.118 port 5372 ssh2
Jul 28 00:39:36 george sshd[26895]: Invalid user biguiqi from 102.38.56.118 port 15079
...
2020-07-28 13:09:27
97.84.225.94 attackspambots
Invalid user teamspeak from 97.84.225.94 port 35578
2020-07-28 13:01:20
49.234.70.67 attackspam
fail2ban detected bruce force on ssh iptables
2020-07-28 13:25:56
103.229.122.79 attackbotsspam
Jul 28 05:56:27 blackhole sshd\[10151\]: Invalid user admin1 from 103.229.122.79 port 6042
Jul 28 05:56:27 blackhole sshd\[10151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.229.122.79
Jul 28 05:56:28 blackhole sshd\[10151\]: Failed password for invalid user admin1 from 103.229.122.79 port 6042 ssh2
...
2020-07-28 13:27:27
198.204.229.156 attackbots
Jul 28 04:12:06 XXX sshd[62533]: Invalid user zhaoyi from 198.204.229.156 port 42694
2020-07-28 13:29:24
182.240.254.254 attackspambots
Port probing on unauthorized port 1433
2020-07-28 13:02:45
66.249.66.212 attackbotsspam
Automatic report - Banned IP Access
2020-07-28 13:14:03
139.59.174.107 attack
Automatic report - Banned IP Access
2020-07-28 12:58:00
218.92.0.175 attackspambots
Jul 28 07:09:43 pve1 sshd[18083]: Failed password for root from 218.92.0.175 port 10062 ssh2
Jul 28 07:09:47 pve1 sshd[18083]: Failed password for root from 218.92.0.175 port 10062 ssh2
...
2020-07-28 13:12:19
79.52.90.192 attackspam
Portscan detected
2020-07-28 13:16:04
68.192.168.147 attack
frenzy
2020-07-28 13:26:19
101.89.192.64 attackspam
Jul 28 00:28:35 NPSTNNYC01T sshd[16567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.192.64
Jul 28 00:28:37 NPSTNNYC01T sshd[16567]: Failed password for invalid user wangxw from 101.89.192.64 port 49038 ssh2
Jul 28 00:32:41 NPSTNNYC01T sshd[16940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.192.64
...
2020-07-28 12:51:35
103.55.36.153 attackbots
Jul 27 20:56:35 mockhub sshd[22940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.55.36.153
Jul 27 20:56:37 mockhub sshd[22940]: Failed password for invalid user fang from 103.55.36.153 port 46134 ssh2
...
2020-07-28 13:23:17
207.229.172.7 attackbotsspam
Automatic report - Port Scan Attack
2020-07-28 13:14:30
96.11.160.178 attackbots
Invalid user student09 from 96.11.160.178 port 17423
2020-07-28 13:05:49

最近上报的IP列表

139.95.4.50 139.99.103.57 139.59.9.173 139.59.92.38
139.99.116.44 139.99.118.70 139.99.114.128 139.64.239.220
139.9.212.127 139.59.99.20 139.99.122.117 139.99.124.230
139.99.122.95 139.99.131.109 139.99.120.13 139.99.138.39
139.99.131.143 139.99.125.16 139.99.148.224 139.99.144.147