必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.51.235
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.51.235.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:43:06 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
235.51.99.139.in-addr.arpa domain name pointer ip235.ip-139-99-51.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
235.51.99.139.in-addr.arpa	name = ip235.ip-139-99-51.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.150.158 attackspambots
Aug 28 10:42:08 aat-srv002 sshd[15364]: Failed password for invalid user razor from 178.128.150.158 port 53028 ssh2
Aug 28 10:57:58 aat-srv002 sshd[15692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158
Aug 28 10:58:01 aat-srv002 sshd[15692]: Failed password for invalid user arpit from 178.128.150.158 port 34230 ssh2
Aug 28 11:01:56 aat-srv002 sshd[15789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158
...
2019-08-29 00:17:27
153.254.115.57 attackspambots
Feb  4 03:56:49 vtv3 sshd\[11816\]: Invalid user orauat from 153.254.115.57 port 16395
Feb  4 03:56:49 vtv3 sshd\[11816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.254.115.57
Feb  4 03:56:51 vtv3 sshd\[11816\]: Failed password for invalid user orauat from 153.254.115.57 port 16395 ssh2
Feb  4 04:02:00 vtv3 sshd\[13214\]: Invalid user craig from 153.254.115.57 port 16405
Feb  4 04:02:00 vtv3 sshd\[13214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.254.115.57
Feb 28 11:17:34 vtv3 sshd\[16885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.254.115.57  user=games
Feb 28 11:17:36 vtv3 sshd\[16885\]: Failed password for games from 153.254.115.57 port 16251 ssh2
Feb 28 11:20:24 vtv3 sshd\[17977\]: Invalid user si from 153.254.115.57 port 18269
Feb 28 11:20:24 vtv3 sshd\[17977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser=
2019-08-29 00:54:55
1.179.185.50 attackbots
$f2bV_matches
2019-08-29 00:27:47
210.187.87.185 attackspam
Aug 28 18:30:06 localhost sshd\[15704\]: Invalid user sabayon-admin from 210.187.87.185 port 58818
Aug 28 18:30:06 localhost sshd\[15704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.187.87.185
Aug 28 18:30:07 localhost sshd\[15704\]: Failed password for invalid user sabayon-admin from 210.187.87.185 port 58818 ssh2
2019-08-29 00:37:25
174.138.28.108 attackspambots
Aug 28 18:45:13 mail sshd\[26832\]: Failed password for root from 174.138.28.108 port 55062 ssh2
Aug 28 18:49:50 mail sshd\[27354\]: Invalid user ubuntu from 174.138.28.108 port 42638
Aug 28 18:49:50 mail sshd\[27354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.28.108
Aug 28 18:49:52 mail sshd\[27354\]: Failed password for invalid user ubuntu from 174.138.28.108 port 42638 ssh2
Aug 28 18:54:39 mail sshd\[28016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.28.108  user=root
2019-08-29 01:05:14
118.24.27.177 attackbots
Aug 28 14:41:59 MK-Soft-VM5 sshd\[19683\]: Invalid user teste from 118.24.27.177 port 49570
Aug 28 14:41:59 MK-Soft-VM5 sshd\[19683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.27.177
Aug 28 14:42:01 MK-Soft-VM5 sshd\[19683\]: Failed password for invalid user teste from 118.24.27.177 port 49570 ssh2
...
2019-08-29 00:34:35
14.198.6.164 attack
Aug 28 16:19:19 DAAP sshd[29687]: Invalid user leslie from 14.198.6.164 port 35294
Aug 28 16:19:20 DAAP sshd[29687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.198.6.164
Aug 28 16:19:19 DAAP sshd[29687]: Invalid user leslie from 14.198.6.164 port 35294
Aug 28 16:19:22 DAAP sshd[29687]: Failed password for invalid user leslie from 14.198.6.164 port 35294 ssh2
...
2019-08-29 00:43:51
46.101.10.42 attackspambots
Aug 28 06:18:05 web9 sshd\[6502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.10.42  user=root
Aug 28 06:18:07 web9 sshd\[6502\]: Failed password for root from 46.101.10.42 port 41450 ssh2
Aug 28 06:21:57 web9 sshd\[7218\]: Invalid user nick from 46.101.10.42
Aug 28 06:21:57 web9 sshd\[7218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.10.42
Aug 28 06:22:00 web9 sshd\[7218\]: Failed password for invalid user nick from 46.101.10.42 port 57188 ssh2
2019-08-29 00:36:01
128.134.187.167 attack
Aug 28 18:19:13 mail sshd\[23246\]: Invalid user sgeadmin from 128.134.187.167 port 52830
Aug 28 18:19:13 mail sshd\[23246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.167
Aug 28 18:19:14 mail sshd\[23246\]: Failed password for invalid user sgeadmin from 128.134.187.167 port 52830 ssh2
Aug 28 18:24:07 mail sshd\[23878\]: Invalid user letmein from 128.134.187.167 port 41492
Aug 28 18:24:07 mail sshd\[23878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.167
2019-08-29 00:33:51
139.59.75.241 attack
Aug 28 05:48:42 php1 sshd\[11429\]: Invalid user erich from 139.59.75.241
Aug 28 05:48:42 php1 sshd\[11429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.75.241
Aug 28 05:48:43 php1 sshd\[11429\]: Failed password for invalid user erich from 139.59.75.241 port 37424 ssh2
Aug 28 05:53:38 php1 sshd\[11847\]: Invalid user edward from 139.59.75.241
Aug 28 05:53:38 php1 sshd\[11847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.75.241
2019-08-29 00:09:55
43.248.106.32 attackspam
2019-08-27 10:36:41 H=(mail.filter-filter.xyz) [43.248.106.32]:41305 I=[10.100.18.23]:25 sender verify fail for : Unrouteable address
2019-08-27 x@x
2019-08-27 10:52:45 H=(mail.filter-filter.xyz) [43.248.106.32]:46006 I=[10.100.18.23]:25 sender verify fail for : Unrouteable address


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=43.248.106.32
2019-08-29 00:11:34
130.61.72.90 attackspambots
Aug 28 19:34:59 pkdns2 sshd\[8140\]: Invalid user permlink from 130.61.72.90Aug 28 19:35:00 pkdns2 sshd\[8140\]: Failed password for invalid user permlink from 130.61.72.90 port 50614 ssh2Aug 28 19:39:04 pkdns2 sshd\[8371\]: Invalid user apc from 130.61.72.90Aug 28 19:39:06 pkdns2 sshd\[8371\]: Failed password for invalid user apc from 130.61.72.90 port 39006 ssh2Aug 28 19:43:05 pkdns2 sshd\[8568\]: Invalid user 123456 from 130.61.72.90Aug 28 19:43:07 pkdns2 sshd\[8568\]: Failed password for invalid user 123456 from 130.61.72.90 port 55626 ssh2
...
2019-08-29 00:53:41
45.72.23.250 attackbotsspam
NAME : NET-45-72-23-240-1 CIDR : 45.72.23.240/28 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack US - block certain countries :) IP: 45.72.23.250  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-29 00:47:38
198.199.113.209 attack
Aug 28 05:55:50 lcprod sshd\[22566\]: Invalid user dd from 198.199.113.209
Aug 28 05:55:50 lcprod sshd\[22566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.113.209
Aug 28 05:55:53 lcprod sshd\[22566\]: Failed password for invalid user dd from 198.199.113.209 port 46836 ssh2
Aug 28 06:01:41 lcprod sshd\[23045\]: Invalid user teamspeak from 198.199.113.209
Aug 28 06:01:41 lcprod sshd\[23045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.113.209
2019-08-29 00:15:12
114.38.43.30 attackspam
1 attempts last 24 Hours
2019-08-29 00:25:46

最近上报的IP列表

139.99.50.244 139.99.51.50 139.99.50.182 139.99.51.19
139.99.55.184 139.99.55.191 139.99.53.111 118.27.122.153
139.99.51.73 139.99.57.33 139.99.54.194 139.99.56.72
139.99.53.152 139.99.6.14 139.99.57.60 46.37.253.222
139.99.6.142 139.99.61.143 139.99.6.158 139.99.61.5