必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.86.199.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.86.199.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:32:00 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.199.86.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.199.86.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.129.253.78 attackspambots
Nov 29 16:39:04 meumeu sshd[8111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.253.78 
Nov 29 16:39:06 meumeu sshd[8111]: Failed password for invalid user troels from 203.129.253.78 port 34898 ssh2
Nov 29 16:44:24 meumeu sshd[8804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.253.78 
...
2019-11-29 23:55:16
37.49.231.133 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-30 00:00:47
116.239.253.145 attack
Nov 29 10:05:29 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:29 eola postfix/smtpd[18002]: lost connection after AUTH from unknown[116.239.253.145]
Nov 29 10:05:29 eola postfix/smtpd[18002]: disconnect from unknown[116.239.253.145] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:05:30 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:33 eola postfix/smtpd[18002]: lost connection after AUTH from unknown[116.239.253.145]
Nov 29 10:05:33 eola postfix/smtpd[18002]: disconnect from unknown[116.239.253.145] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:05:34 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:37 eola postfix/smtpd[18002]: lost connection after AUTH from unknown[116.239.253.145]
Nov 29 10:05:37 eola postfix/smtpd[18002]: disconnect from unknown[116.239.253.145] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:05:38 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:39 eola ........
-------------------------------
2019-11-29 23:46:34
106.13.57.239 attackspambots
Nov 29 17:49:13 server sshd\[25958\]: Invalid user hihath from 106.13.57.239 port 44980
Nov 29 17:49:13 server sshd\[25958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.57.239
Nov 29 17:49:15 server sshd\[25958\]: Failed password for invalid user hihath from 106.13.57.239 port 44980 ssh2
Nov 29 17:52:59 server sshd\[27158\]: Invalid user mesavage from 106.13.57.239 port 43146
Nov 29 17:52:59 server sshd\[27158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.57.239
2019-11-29 23:59:44
113.125.23.185 attackspam
Nov 29 05:08:21 sachi sshd\[13255\]: Invalid user rparks from 113.125.23.185
Nov 29 05:08:21 sachi sshd\[13255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.23.185
Nov 29 05:08:23 sachi sshd\[13255\]: Failed password for invalid user rparks from 113.125.23.185 port 57074 ssh2
Nov 29 05:14:06 sachi sshd\[13785\]: Invalid user html from 113.125.23.185
Nov 29 05:14:06 sachi sshd\[13785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.23.185
2019-11-29 23:28:19
119.28.239.239 attackbots
port scan/probe/communication attempt
2019-11-29 23:38:17
188.213.212.52 attackspam
Nov 29 16:13:30  exim[3446]: [1\55] 1iahxW-0000ta-Io H=ink.yarkaci.com (ink.hanhlee.com) [188.213.212.52] F= rejected after DATA: This message scored 103.3 spam points.
2019-11-29 23:32:18
201.235.19.122 attackbotsspam
Nov 29 16:14:11 host sshd[23419]: Invalid user jeannes from 201.235.19.122 port 55093
...
2019-11-29 23:25:58
185.175.93.19 attackbotsspam
Nov 29 16:10:07 h2177944 kernel: \[7915482.682660\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=39469 PROTO=TCP SPT=51897 DPT=3842 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:11:12 h2177944 kernel: \[7915546.948808\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=56060 PROTO=TCP SPT=51897 DPT=3940 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:11:17 h2177944 kernel: \[7915552.224744\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20194 PROTO=TCP SPT=51897 DPT=3760 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:11:40 h2177944 kernel: \[7915575.047094\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=35982 PROTO=TCP SPT=51897 DPT=4001 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:14:14 h2177944 kernel: \[7915729.216835\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9
2019-11-29 23:24:40
31.8.76.225 attackbots
Nov 29 16:05:37 olgosrv01 sshd[906]: Failed password for r.r from 31.8.76.225 port 48262 ssh2
Nov 29 16:05:40 olgosrv01 sshd[906]: Failed password for r.r from 31.8.76.225 port 48262 ssh2
Nov 29 16:05:41 olgosrv01 sshd[906]: Failed password for r.r from 31.8.76.225 port 48262 ssh2
Nov 29 16:05:43 olgosrv01 sshd[906]: Failed password for r.r from 31.8.76.225 port 48262 ssh2
Nov 29 16:05:46 olgosrv01 sshd[906]: Failed password for r.r from 31.8.76.225 port 48262 ssh2
Nov 29 16:05:48 olgosrv01 sshd[906]: Failed password for r.r from 31.8.76.225 port 48262 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.8.76.225
2019-11-29 23:32:43
193.201.105.62 attackbots
Port scan on 4 port(s): 12345 23456 55555 56789
2019-11-29 23:52:47
200.109.141.252 attackspambots
Automatic report - Port Scan Attack
2019-11-29 23:52:32
157.230.129.73 attackbotsspam
Nov 29 17:58:20 server sshd\[30127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73  user=mysql
Nov 29 17:58:22 server sshd\[30127\]: Failed password for mysql from 157.230.129.73 port 45076 ssh2
Nov 29 18:07:56 server sshd\[32565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73  user=root
Nov 29 18:07:58 server sshd\[32565\]: Failed password for root from 157.230.129.73 port 54901 ssh2
Nov 29 18:13:29 server sshd\[1472\]: Invalid user umountsys from 157.230.129.73
Nov 29 18:13:29 server sshd\[1472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73 
...
2019-11-30 00:00:15
5.172.19.21 attackspambots
Nov 25 16:47:57 Aberdeen-m4-Access auth.info sshd[24833]: Invalid user hobby from 5.172.19.21 port 51038
Nov 25 16:47:57 Aberdeen-m4-Access auth.info sshd[24833]: Failed password for invalid user hobby from 5.172.19.21 port 51038 ssh2
Nov 25 16:47:58 Aberdeen-m4-Access auth.info sshd[24833]: Received disconnect from 5.172.19.21 port 51038:11: Bye Bye [preauth]
Nov 25 16:47:58 Aberdeen-m4-Access auth.info sshd[24833]: Disconnected from 5.172.19.21 port 51038 [preauth]
Nov 25 16:47:58 Aberdeen-m4-Access auth.notice sshguard[12566]: Attack from "5.172.19.21" on service 100 whostnameh danger 10.
Nov 25 16:47:58 Aberdeen-m4-Access auth.notice sshguard[12566]: Attack from "5.172.19.21" on service 100 whostnameh danger 10.
Nov 25 16:47:58 Aberdeen-m4-Access auth.notice sshguard[12566]: Attack from "5.172.19.21" on service 100 whostnameh danger 10.
Nov 25 16:47:58 Aberdeen-m4-Access auth.warn sshguard[12566]: Blocking "5.172.19.21/32" for 240 secs (3 attacks in 0 secs, after 2 a........
------------------------------
2019-11-29 23:40:17
60.169.99.71 attackspam
2019-11-29 09:13:31 H=(ylmf-pc) [60.169.99.71]:54727 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2019-11-29 09:13:35 H=(ylmf-pc) [60.169.99.71]:55213 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2019-11-29 09:13:40 H=(ylmf-pc) [60.169.99.71]:55505 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
...
2019-11-29 23:51:12

最近上报的IP列表

255.91.155.17 124.224.177.244 253.2.60.162 242.148.175.35
63.178.206.38 204.28.179.16 132.27.185.69 4.17.200.169
71.214.242.230 138.225.81.180 85.27.161.224 96.47.153.56
177.91.209.58 130.19.195.97 22.67.232.202 201.59.13.10
28.51.44.11 25.193.154.153 248.12.168.179 18.141.191.219