必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SURFnet bv

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.124.159.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39305
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.124.159.139.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 14 03:04:19 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
139.159.124.145.in-addr.arpa domain name pointer 145.124.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.159.124.145.in-addr.arpa	name = 145.124.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.216.140.27 attack
09/08/2019-12:30:32.813394 185.216.140.27 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-09 03:15:59
123.108.47.83 attackbotsspam
Sep  8 20:50:24 saschabauer sshd[21466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.47.83
Sep  8 20:50:25 saschabauer sshd[21466]: Failed password for invalid user ansible from 123.108.47.83 port 47420 ssh2
2019-09-09 03:13:36
125.252.8.33 attackspambots
81/tcp
[2019-09-08]1pkt
2019-09-09 03:07:37
217.112.128.53 attackspambots
Postfix RBL failed
2019-09-09 03:01:29
1.169.114.45 attack
445/tcp
[2019-09-08]1pkt
2019-09-09 03:25:50
218.92.0.143 attackbots
Sep  8 19:52:41 vps647732 sshd[26394]: Failed password for root from 218.92.0.143 port 63530 ssh2
Sep  8 19:52:55 vps647732 sshd[26394]: error: maximum authentication attempts exceeded for root from 218.92.0.143 port 63530 ssh2 [preauth]
...
2019-09-09 02:38:38
112.85.188.246 attack
22/tcp
[2019-09-08]1pkt
2019-09-09 02:53:06
176.31.43.255 attackspambots
Sep  8 04:52:19 aat-srv002 sshd[8275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.43.255
Sep  8 04:52:21 aat-srv002 sshd[8275]: Failed password for invalid user ubuntu from 176.31.43.255 port 50344 ssh2
Sep  8 04:56:35 aat-srv002 sshd[8378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.43.255
Sep  8 04:56:37 aat-srv002 sshd[8378]: Failed password for invalid user tester from 176.31.43.255 port 39072 ssh2
...
2019-09-09 02:43:26
175.175.18.247 attackbots
23/tcp
[2019-09-08]1pkt
2019-09-09 02:39:29
176.214.81.217 attack
2019-09-08T11:24:00.243688hub.schaetter.us sshd\[19762\]: Invalid user www from 176.214.81.217
2019-09-08T11:24:00.280952hub.schaetter.us sshd\[19762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.81.217
2019-09-08T11:24:02.251589hub.schaetter.us sshd\[19762\]: Failed password for invalid user www from 176.214.81.217 port 55003 ssh2
2019-09-08T11:27:51.023828hub.schaetter.us sshd\[19785\]: Invalid user usuario1 from 176.214.81.217
2019-09-08T11:27:51.057930hub.schaetter.us sshd\[19785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.81.217
...
2019-09-09 03:20:19
177.67.8.39 attackspam
8080/tcp
[2019-09-08]1pkt
2019-09-09 03:21:18
220.171.195.30 attackbotsspam
Sep  8 11:03:48 km20725 sshd\[17621\]: Failed password for root from 220.171.195.30 port 36641 ssh2Sep  8 11:03:50 km20725 sshd\[17621\]: Failed password for root from 220.171.195.30 port 36641 ssh2Sep  8 11:03:52 km20725 sshd\[17621\]: Failed password for root from 220.171.195.30 port 36641 ssh2Sep  8 11:03:54 km20725 sshd\[17621\]: Failed password for root from 220.171.195.30 port 36641 ssh2
...
2019-09-09 03:09:10
125.227.130.5 attackspam
Sep  8 08:00:04 ny01 sshd[1664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.5
Sep  8 08:00:06 ny01 sshd[1664]: Failed password for invalid user test from 125.227.130.5 port 47210 ssh2
Sep  8 08:04:55 ny01 sshd[2583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.5
2019-09-09 03:13:06
217.236.130.25 attackbotsspam
8000/tcp
[2019-09-08]1pkt
2019-09-09 02:52:13
149.56.96.78 attackbots
2019-09-08T14:04:30.479907abusebot-7.cloudsearch.cf sshd\[25024\]: Invalid user 209 from 149.56.96.78 port 14686
2019-09-09 02:47:31

最近上报的IP列表

155.192.69.191 168.194.163.146 222.151.237.99 117.12.24.240
99.9.255.255 90.35.209.50 95.214.56.22 219.213.138.196
126.216.144.105 109.157.225.172 80.120.172.51 218.102.231.5
114.17.84.160 35.241.89.79 4.238.253.44 64.251.135.164
85.60.189.11 185.158.178.4 196.219.240.183 122.14.38.212