必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.139.133.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.139.133.135.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:42:16 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 135.133.139.146.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.133.139.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.96.14.98 attack
Automatic report - Banned IP Access
2019-09-27 17:05:02
62.234.109.203 attackspambots
Automatic report - Banned IP Access
2019-09-27 16:52:37
144.217.84.164 attack
Sep 27 11:02:19 nextcloud sshd\[26138\]: Invalid user admin from 144.217.84.164
Sep 27 11:02:19 nextcloud sshd\[26138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.164
Sep 27 11:02:21 nextcloud sshd\[26138\]: Failed password for invalid user admin from 144.217.84.164 port 49112 ssh2
...
2019-09-27 17:09:22
5.135.182.84 attackspambots
Sep 27 10:31:46 SilenceServices sshd[5681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
Sep 27 10:31:47 SilenceServices sshd[5681]: Failed password for invalid user tobacco from 5.135.182.84 port 34986 ssh2
Sep 27 10:36:57 SilenceServices sshd[8987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
2019-09-27 16:56:36
198.199.79.17 attack
Sep 26 22:49:00 eddieflores sshd\[26506\]: Invalid user kq from 198.199.79.17
Sep 26 22:49:00 eddieflores sshd\[26506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.79.17
Sep 26 22:49:02 eddieflores sshd\[26506\]: Failed password for invalid user kq from 198.199.79.17 port 60268 ssh2
Sep 26 22:52:52 eddieflores sshd\[27389\]: Invalid user andres from 198.199.79.17
Sep 26 22:52:52 eddieflores sshd\[27389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.79.17
2019-09-27 16:58:34
106.13.62.194 attackspambots
ssh failed login
2019-09-27 16:59:43
202.143.121.156 attack
Sep 26 22:44:43 hanapaa sshd\[30528\]: Invalid user zole1234 from 202.143.121.156
Sep 26 22:44:43 hanapaa sshd\[30528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.143.121.156
Sep 26 22:44:46 hanapaa sshd\[30528\]: Failed password for invalid user zole1234 from 202.143.121.156 port 53399 ssh2
Sep 26 22:49:55 hanapaa sshd\[30988\]: Invalid user passpass from 202.143.121.156
Sep 26 22:49:55 hanapaa sshd\[30988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.143.121.156
2019-09-27 16:57:37
134.119.221.7 attackbots
\[2019-09-27 04:46:37\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T04:46:37.410-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0001146812112982",SessionID="0x7f1e1c11c748",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/60872",ACLName="no_extension_match"
\[2019-09-27 04:49:01\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T04:49:01.525-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="03046812112982",SessionID="0x7f1e1c8be8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/50509",ACLName="no_extension_match"
\[2019-09-27 04:50:56\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T04:50:56.709-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2001446812112982",SessionID="0x7f1e1c44d618",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/60118",ACLName="no_ex
2019-09-27 16:54:15
122.224.129.35 attackbots
2019-09-27T08:49:45.520441abusebot-6.cloudsearch.cf sshd\[22838\]: Invalid user temp from 122.224.129.35 port 43000
2019-09-27 16:59:25
185.234.219.105 attackbots
Sep 26 11:08:14 warning: unknown[185.234.219.105]: SASL LOGIN authentication failed: authentication failure
Sep 26 11:08:16 warning: unknown[185.234.219.105]: SASL LOGIN authentication failed: authentication failure
Sep 26 11:08:17 warning: unknown[185.234.219.105]: SASL LOGIN authentication failed: authentication failure
2019-09-27 17:00:47
139.155.1.252 attackspam
Sep 27 04:06:06 www_kotimaassa_fi sshd[18728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.1.252
Sep 27 04:06:08 www_kotimaassa_fi sshd[18728]: Failed password for invalid user server from 139.155.1.252 port 51920 ssh2
...
2019-09-27 16:49:29
145.239.82.192 attackbotsspam
Sep 27 08:22:21 ip-172-31-62-245 sshd\[10067\]: Invalid user mustafa from 145.239.82.192\
Sep 27 08:22:24 ip-172-31-62-245 sshd\[10067\]: Failed password for invalid user mustafa from 145.239.82.192 port 45424 ssh2\
Sep 27 08:26:11 ip-172-31-62-245 sshd\[10096\]: Invalid user 123 from 145.239.82.192\
Sep 27 08:26:13 ip-172-31-62-245 sshd\[10096\]: Failed password for invalid user 123 from 145.239.82.192 port 56190 ssh2\
Sep 27 08:30:02 ip-172-31-62-245 sshd\[10144\]: Invalid user free from 145.239.82.192\
2019-09-27 16:44:14
157.245.103.64 attackspambots
Sep 26 22:53:35 web9 sshd\[2825\]: Invalid user qiang from 157.245.103.64
Sep 26 22:53:35 web9 sshd\[2825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.103.64
Sep 26 22:53:36 web9 sshd\[2825\]: Failed password for invalid user qiang from 157.245.103.64 port 39922 ssh2
Sep 26 22:57:47 web9 sshd\[3608\]: Invalid user qi from 157.245.103.64
Sep 26 22:57:47 web9 sshd\[3608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.103.64
2019-09-27 17:05:16
185.176.27.102 attackbotsspam
09/27/2019-03:14:10.932105 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-27 16:58:54
189.69.242.94 attackspambots
Automatic report - Port Scan Attack
2019-09-27 16:48:29

最近上报的IP列表

242.65.209.53 83.128.136.184 95.161.81.81 94.181.151.152
77.50.38.253 154.45.45.51 156.10.211.33 30.199.220.69
30.35.162.106 157.241.7.24 106.238.117.138 240.244.234.86
8.54.180.226 36.112.111.200 189.94.150.97 233.100.88.97
141.29.4.189 85.52.203.161 181.86.167.172 61.211.52.214