必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.68.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.68.151.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:07:11 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
151.68.99.139.in-addr.arpa domain name pointer ns568854.ip-139-99-68.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
151.68.99.139.in-addr.arpa	name = ns568854.ip-139-99-68.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.200.226.226 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-30 07:58:19
47.17.58.198 attack
Jul 29 23:03:49 rush sshd[25969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.17.58.198
Jul 29 23:03:51 rush sshd[25969]: Failed password for invalid user sivamani from 47.17.58.198 port 37372 ssh2
Jul 29 23:10:29 rush sshd[26134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.17.58.198
...
2020-07-30 08:05:00
87.252.255.5 attack
Ssh brute force
2020-07-30 08:04:24
194.182.76.185 attackspam
Jul 29 02:09:15 XXX sshd[40219]: Invalid user jcj from 194.182.76.185 port 56580
2020-07-30 08:04:06
91.121.177.45 attackbots
Jul 30 01:32:07 ns381471 sshd[14740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.177.45
Jul 30 01:32:10 ns381471 sshd[14740]: Failed password for invalid user pat from 91.121.177.45 port 41704 ssh2
2020-07-30 07:49:28
106.39.21.10 attackspam
Invalid user yonghui from 106.39.21.10 port 35307
2020-07-30 07:56:12
198.199.65.103 attackbots
 TCP (SYN) 198.199.65.103:32767 -> port 8545, len 44
2020-07-30 08:17:00
49.235.83.156 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-30 08:12:50
207.46.13.43 attackspambots
Automatic report - Banned IP Access
2020-07-30 08:02:51
103.78.81.227 attack
$f2bV_matches
2020-07-30 08:17:17
191.255.11.58 attack
Invalid user fangdm from 191.255.11.58 port 33086
2020-07-30 08:07:00
46.49.93.36 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-30 08:05:32
85.209.0.251 attack
SSH Server BruteForce Attack
2020-07-30 07:51:39
185.216.25.122 attack
Invalid user murakami from 185.216.25.122 port 42646
2020-07-30 07:46:04
203.150.243.176 attackspam
2020-07-30T01:26:45.591883ks3355764 sshd[10661]: Invalid user ftpznz from 203.150.243.176 port 46486
2020-07-30T01:26:47.441478ks3355764 sshd[10661]: Failed password for invalid user ftpznz from 203.150.243.176 port 46486 ssh2
...
2020-07-30 08:17:49

最近上报的IP列表

139.99.68.204 139.99.68.86 139.99.80.246 139.99.7.178
139.99.83.161 139.99.84.44 139.99.73.17 139.99.88.154
139.99.88.253 139.99.69.48 139.99.90.63 139.99.9.116
139.99.91.160 139.99.9.225 139.99.90.181 139.99.91.20
139.99.91.211 139.99.94.240 139.99.96.189 14.0.171.117