必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.1.89.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.1.89.139.			IN	A

;; AUTHORITY SECTION:
.			153	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:16:59 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 139.89.1.144.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.89.1.144.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.39.38.214 attackbots
Automatic report - Banned IP Access
2019-07-31 14:51:07
179.190.48.44 attackbots
Bank fraud
2019-07-31 15:05:19
134.209.146.214 attackbotsspam
Login Attempt
2019-07-31 15:00:39
189.5.74.236 attack
Jul 30 03:18:55 datentool sshd[24836]: Invalid user natasha from 189.5.74.236
Jul 30 03:18:55 datentool sshd[24836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.74.236 
Jul 30 03:18:57 datentool sshd[24836]: Failed password for invalid user natasha from 189.5.74.236 port 49102 ssh2
Jul 30 03:33:21 datentool sshd[24906]: Invalid user gerencia from 189.5.74.236
Jul 30 03:33:21 datentool sshd[24906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.74.236 
Jul 30 03:33:24 datentool sshd[24906]: Failed password for invalid user gerencia from 189.5.74.236 port 50688 ssh2
Jul 30 03:39:47 datentool sshd[24932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.74.236  user=r.r
Jul 30 03:39:50 datentool sshd[24932]: Failed password for r.r from 189.5.74.236 port 47004 ssh2
Jul 30 03:46:16 datentool sshd[24984]: Invalid user netadmin from 189........
-------------------------------
2019-07-31 14:49:26
84.201.165.126 attackspam
Jul 31 01:37:45 s64-1 sshd[30715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.165.126
Jul 31 01:37:47 s64-1 sshd[30715]: Failed password for invalid user herman from 84.201.165.126 port 54660 ssh2
Jul 31 01:42:16 s64-1 sshd[30786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.165.126
...
2019-07-31 15:12:28
129.146.201.116 attackbots
Jul 31 02:18:08 localhost sshd\[100537\]: Invalid user user from 129.146.201.116 port 57828
Jul 31 02:18:08 localhost sshd\[100537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.201.116
Jul 31 02:18:09 localhost sshd\[100539\]: Invalid user user from 129.146.201.116 port 60650
Jul 31 02:18:09 localhost sshd\[100539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.201.116
Jul 31 02:18:11 localhost sshd\[100537\]: Failed password for invalid user user from 129.146.201.116 port 57828 ssh2
...
2019-07-31 15:19:59
145.239.82.192 attackbots
Jul 31 01:24:31 [munged] sshd[11749]: Invalid user africa from 145.239.82.192 port 48080
Jul 31 01:24:31 [munged] sshd[11749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.192
2019-07-31 14:52:02
178.128.217.135 attack
31.07.2019 03:28:06 SSH access blocked by firewall
2019-07-31 15:18:16
111.230.209.21 attackbotsspam
Jul 31 02:41:29 yabzik sshd[1600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.209.21
Jul 31 02:41:31 yabzik sshd[1600]: Failed password for invalid user system from 111.230.209.21 port 57262 ssh2
Jul 31 02:43:11 yabzik sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.209.21
2019-07-31 15:11:25
185.28.22.49 attackbotsspam
Jul 31 08:41:47 dev0-dcde-rnet sshd[28544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.28.22.49
Jul 31 08:41:49 dev0-dcde-rnet sshd[28544]: Failed password for invalid user kpalma from 185.28.22.49 port 36762 ssh2
Jul 31 08:48:31 dev0-dcde-rnet sshd[28599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.28.22.49
2019-07-31 14:55:19
79.35.142.128 attackspam
Automatic report - Port Scan Attack
2019-07-31 15:37:58
188.131.153.253 attackbotsspam
Automatic report - Banned IP Access
2019-07-31 14:55:56
162.213.248.69 attack
[munged]::443 162.213.248.69 - - [31/Jul/2019:01:52:38 +0200] "POST /[munged]: HTTP/1.1" 401 8485 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.213.248.69 - - [31/Jul/2019:01:52:40 +0200] "POST /[munged]: HTTP/1.1" 401 8485 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.213.248.69 - - [31/Jul/2019:01:52:42 +0200] "POST /[munged]: HTTP/1.1" 401 8485 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.213.248.69 - - [31/Jul/2019:01:52:44 +0200] "POST /[munged]: HTTP/1.1" 401 8485 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.213.248.69 - - [31/Jul/2019:01:52:46 +0200] "POST /[munged]: HTTP/1.1" 401 8485 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.213.248.69 - - [31/Jul/2019:01:52:49 +0200] "POST /[munged]: HTTP/1.1" 401 8487 "-" "Mozilla/5.0 (X11
2019-07-31 15:14:50
62.81.229.203 attackbotsspam
Jul 31 08:03:51 icinga sshd[2817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.81.229.203
Jul 31 08:03:53 icinga sshd[2817]: Failed password for invalid user support from 62.81.229.203 port 48962 ssh2
...
2019-07-31 15:01:18
185.53.88.11 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-31 15:09:23

最近上报的IP列表

180.204.47.128 176.132.247.171 29.15.15.187 229.228.56.15
119.175.144.197 158.160.83.32 110.123.113.107 145.250.172.66
190.43.167.233 173.227.233.101 169.194.253.94 170.140.194.57
241.84.50.201 84.22.137.180 159.180.108.21 197.225.213.249
11.59.121.21 196.19.136.70 190.44.167.43 218.153.199.240