必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.86.100.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.86.100.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:26:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.100.86.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.100.86.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
74.62.86.10 attack
RDP Bruteforce
2019-08-31 01:28:27
101.20.61.49 attackbotsspam
Brute force SMTP login attempts.
2019-08-31 01:05:35
74.92.210.138 attack
...
2019-08-31 01:54:59
182.61.105.89 attack
Aug 30 17:31:07 MK-Soft-VM3 sshd\[23159\]: Invalid user gal from 182.61.105.89 port 52012
Aug 30 17:31:07 MK-Soft-VM3 sshd\[23159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89
Aug 30 17:31:08 MK-Soft-VM3 sshd\[23159\]: Failed password for invalid user gal from 182.61.105.89 port 52012 ssh2
...
2019-08-31 01:50:36
188.165.146.202 attackbotsspam
Chat Spam
2019-08-31 01:10:12
203.128.242.166 attackspambots
Aug 30 07:03:18 web9 sshd\[5931\]: Invalid user bronic from 203.128.242.166
Aug 30 07:03:18 web9 sshd\[5931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166
Aug 30 07:03:20 web9 sshd\[5931\]: Failed password for invalid user bronic from 203.128.242.166 port 40934 ssh2
Aug 30 07:08:16 web9 sshd\[6803\]: Invalid user marconi from 203.128.242.166
Aug 30 07:08:16 web9 sshd\[6803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166
2019-08-31 01:20:53
138.68.94.173 attackspam
Aug 30 18:02:35 mail sshd\[7479\]: Failed password for invalid user don from 138.68.94.173 port 42188 ssh2
Aug 30 18:19:11 mail sshd\[7714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.173  user=root
...
2019-08-31 01:25:40
207.6.1.11 attack
Aug 30 16:29:03 *** sshd[11587]: Invalid user deployer from 207.6.1.11
2019-08-31 01:23:40
123.207.16.96 attackspam
Aug 30 18:29:04 dedicated sshd[4488]: Failed password for root from 123.207.16.96 port 53502 ssh2
Aug 30 18:29:02 dedicated sshd[4488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.16.96  user=root
Aug 30 18:29:04 dedicated sshd[4488]: Failed password for root from 123.207.16.96 port 53502 ssh2
Aug 30 18:29:04 dedicated sshd[4488]: error: Received disconnect from 123.207.16.96 port 53502:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Aug 30 18:29:06 dedicated sshd[4500]: Invalid user pi from 123.207.16.96 port 53570
2019-08-31 01:28:01
137.63.184.100 attackbotsspam
Aug 30 19:30:41 minden010 sshd[26397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100
Aug 30 19:30:42 minden010 sshd[26397]: Failed password for invalid user invitado from 137.63.184.100 port 37786 ssh2
Aug 30 19:35:41 minden010 sshd[28064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100
...
2019-08-31 01:57:36
140.237.244.14 attackbotsspam
Caught in portsentry honeypot
2019-08-31 01:25:04
41.202.0.153 attack
Aug 30 07:04:16 friendsofhawaii sshd\[23496\]: Invalid user vivian from 41.202.0.153
Aug 30 07:04:16 friendsofhawaii sshd\[23496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.0.153
Aug 30 07:04:18 friendsofhawaii sshd\[23496\]: Failed password for invalid user vivian from 41.202.0.153 port 53896 ssh2
Aug 30 07:09:18 friendsofhawaii sshd\[24032\]: Invalid user georgia from 41.202.0.153
Aug 30 07:09:18 friendsofhawaii sshd\[24032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.0.153
2019-08-31 01:18:24
51.91.36.28 attackspambots
Aug 30 19:06:22 SilenceServices sshd[21916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.36.28
Aug 30 19:06:24 SilenceServices sshd[21916]: Failed password for invalid user techuser from 51.91.36.28 port 58098 ssh2
Aug 30 19:10:27 SilenceServices sshd[25031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.36.28
2019-08-31 01:27:10
173.212.219.33 attackbotsspam
Aug 30 15:40:29 wordpress sshd[14616]: Did not receive identification string from 173.212.219.33
Aug 30 15:42:03 wordpress sshd[14638]: Received disconnect from 173.212.219.33 port 47992:11: Normal Shutdown, Thank you for playing [preauth]
Aug 30 15:42:03 wordpress sshd[14638]: Disconnected from 173.212.219.33 port 47992 [preauth]
Aug 30 15:42:32 wordpress sshd[14647]: Received disconnect from 173.212.219.33 port 41785:11: Normal Shutdown, Thank you for playing [preauth]
Aug 30 15:42:32 wordpress sshd[14647]: Disconnected from 173.212.219.33 port 41785 [preauth]
Aug 30 15:43:04 wordpress sshd[14655]: Received disconnect from 173.212.219.33 port 35638:11: Normal Shutdown, Thank you for playing [preauth]
Aug 30 15:43:04 wordpress sshd[14655]: Disconnected from 173.212.219.33 port 35638 [preauth]
Aug 30 15:43:32 wordpress sshd[14662]: Invalid user wordpress from 173.212.219.33
Aug 30 15:43:32 wordpress sshd[14662]: Received disconnect from 173.212.219.33 port 57709:11: Nor........
-------------------------------
2019-08-31 02:00:05
142.93.101.13 attackspambots
Aug 30 19:03:03 dev0-dcde-rnet sshd[27751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.13
Aug 30 19:03:05 dev0-dcde-rnet sshd[27751]: Failed password for invalid user test from 142.93.101.13 port 39958 ssh2
Aug 30 19:08:02 dev0-dcde-rnet sshd[27784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.13
2019-08-31 01:48:41

最近上报的IP列表

250.158.58.14 251.2.24.137 94.138.234.199 151.239.210.240
30.165.16.11 28.52.159.47 53.102.231.182 211.136.46.13
171.234.149.0 15.232.136.124 251.237.161.103 33.169.149.121
122.142.193.135 191.131.183.118 43.70.50.66 90.100.165.246
87.85.39.233 142.183.98.32 164.27.176.23 79.114.124.115