必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Barnet

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.199.107.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;146.199.107.135.		IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040200 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 22:45:17 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
135.107.199.146.in-addr.arpa domain name pointer 135.107.199.146.dyn.plus.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.107.199.146.in-addr.arpa	name = 135.107.199.146.dyn.plus.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.73.231.120 attack
445/tcp 445/tcp
[2019-06-23]2pkt
2019-06-24 03:54:27
61.64.110.182 attackbotsspam
445/tcp
[2019-06-23]1pkt
2019-06-24 03:45:14
129.122.16.156 attackbots
Automatic report - Web App Attack
2019-06-24 03:51:17
188.187.0.171 attackbotsspam
Jun 23 11:36:41 mxgate1 postfix/postscreen[17094]: CONNECT from [188.187.0.171]:50650 to [176.31.12.44]:25
Jun 23 11:36:41 mxgate1 postfix/dnsblog[17097]: addr 188.187.0.171 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 23 11:36:41 mxgate1 postfix/dnsblog[17097]: addr 188.187.0.171 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 23 11:36:41 mxgate1 postfix/dnsblog[17096]: addr 188.187.0.171 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 23 11:36:41 mxgate1 postfix/dnsblog[17098]: addr 188.187.0.171 listed by domain bl.spamcop.net as 127.0.0.2
Jun 23 11:36:41 mxgate1 postfix/dnsblog[17095]: addr 188.187.0.171 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 23 11:36:41 mxgate1 postfix/dnsblog[17099]: addr 188.187.0.171 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 23 11:36:47 mxgate1 postfix/postscreen[17094]: DNSBL rank 6 for [188.187.0.171]:50650
Jun x@x
Jun 23 11:36:48 mxgate1 postfix/postscreen[17094]: HANGUP after 0.29 from [188.187.0.171........
-------------------------------
2019-06-24 03:54:03
36.78.206.17 attack
2323/tcp
[2019-06-23]1pkt
2019-06-24 04:00:32
116.208.218.38 attack
37215/tcp
[2019-06-23]1pkt
2019-06-24 04:10:35
104.248.130.222 attackspambots
Sun 23 10:38:44 6443/tcp
2019-06-24 03:57:12
67.220.184.146 attack
proto=tcp  .  spt=39818  .  dpt=25  .     (listed on Blocklist de  Jun 23)     (959)
2019-06-24 03:44:10
139.59.29.153 attackbotsspam
Jun 17 21:08:40 pl3server sshd[3012141]: Invalid user kirkman from 139.59.29.153
Jun 17 21:08:40 pl3server sshd[3012141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.29.153
Jun 17 21:08:43 pl3server sshd[3012141]: Failed password for invalid user kirkman from 139.59.29.153 port 36706 ssh2
Jun 17 21:08:43 pl3server sshd[3012141]: Received disconnect from 139.59.29.153: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.59.29.153
2019-06-24 03:30:44
218.241.156.10 attackspam
failed_logins
2019-06-24 04:06:58
45.32.238.223 attackbots
45.32.238.223 - - \[23/Jun/2019:11:41:21 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.32.238.223 - - \[23/Jun/2019:11:41:21 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.32.238.223 - - \[23/Jun/2019:11:41:22 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.32.238.223 - - \[23/Jun/2019:11:41:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.32.238.223 - - \[23/Jun/2019:11:41:22 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.32.238.223 - - \[23/Jun/2019:11:41:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-24 03:53:20
46.149.190.243 attackbots
Mail sent to address hacked/leaked from Destructoid
2019-06-24 03:33:36
41.169.18.58 attackbotsspam
Sent Mail to target address hacked/leaked from Planet3DNow.de
2019-06-24 03:53:42
119.145.27.16 attackbots
20 attempts against mh-ssh on flow.magehost.pro
2019-06-24 03:59:20
46.178.110.9 attack
Lines containing failures of 46.178.110.9
Jun 23 11:37:43 mailserver sshd[8189]: Invalid user ts3 from 46.178.110.9 port 47236
Jun 23 11:37:43 mailserver sshd[8189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.178.110.9
Jun 23 11:37:45 mailserver sshd[8189]: Failed password for invalid user ts3 from 46.178.110.9 port 47236 ssh2
Jun 23 11:37:45 mailserver sshd[8189]: Received disconnect from 46.178.110.9 port 47236:11: Bye Bye [preauth]
Jun 23 11:37:45 mailserver sshd[8189]: Disconnected from invalid user ts3 46.178.110.9 port 47236 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.178.110.9
2019-06-24 04:00:15

最近上报的IP列表

97.100.97.10 103.38.189.20 217.224.215.116 63.253.206.240
104.92.129.6 211.61.203.64 129.245.99.122 68.53.15.228
11.250.86.142 216.230.93.145 1.55.23.3 223.222.219.31
51.193.171.89 143.42.190.248 177.13.156.191 71.167.63.154
131.5.26.163 206.72.2.128 213.24.52.155 87.120.232.13