必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.247.230.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.247.230.139.		IN	A

;; AUTHORITY SECTION:
.			7	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:29:05 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.230.247.146.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.230.247.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.24.106.222 attack
ssh failed login
2019-10-24 21:04:48
149.56.109.57 attackbotsspam
Oct 24 09:09:26 xtremcommunity sshd\[57621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.109.57  user=root
Oct 24 09:09:28 xtremcommunity sshd\[57621\]: Failed password for root from 149.56.109.57 port 44128 ssh2
Oct 24 09:13:52 xtremcommunity sshd\[57722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.109.57  user=root
Oct 24 09:13:54 xtremcommunity sshd\[57722\]: Failed password for root from 149.56.109.57 port 44094 ssh2
Oct 24 09:18:16 xtremcommunity sshd\[57810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.109.57  user=root
...
2019-10-24 21:19:35
94.41.165.68 attack
2019-09-16 17:53:02 1i9tJF-0004sv-F7 SMTP connection from \(94.41.165.68.dynamic.orsk.ufanet.ru\) \[94.41.165.68\]:28739 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 17:53:50 1i9tK0-0004u1-25 SMTP connection from \(94.41.165.68.dynamic.orsk.ufanet.ru\) \[94.41.165.68\]:28944 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-16 17:54:33 1i9tKf-0004vR-F6 SMTP connection from \(94.41.165.68.dynamic.orsk.ufanet.ru\) \[94.41.165.68\]:29121 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 21:03:36
194.181.140.218 attackspam
Invalid user ia from 194.181.140.218 port 41737
2019-10-24 21:10:37
122.192.68.239 attackbots
Invalid user botsinus from 122.192.68.239 port 51506
2019-10-24 21:23:51
49.234.43.173 attack
Invalid user farrell from 49.234.43.173 port 34194
2019-10-24 21:33:40
162.241.178.219 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-10-24 21:17:46
94.40.74.200 attackspam
2018-12-02 14:05:10 1gTRQs-00044h-9w SMTP connection from 94-40-74-200.tktelekom.pl \[94.40.74.200\]:26794 I=\[193.107.88.166\]:25 closed by DROP in ACL
2018-12-02 14:05:54 1gTRRZ-00045x-P3 SMTP connection from 94-40-74-200.tktelekom.pl \[94.40.74.200\]:27124 I=\[193.107.88.166\]:25 closed by DROP in ACL
2018-12-02 14:06:12 1gTRRs-00046K-Cq SMTP connection from 94-40-74-200.tktelekom.pl \[94.40.74.200\]:27298 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 21:03:53
218.2.105.133 attack
Invalid user usuario from 218.2.105.133 port 37207
2019-10-24 21:08:37
94.61.100.138 attackbotsspam
2019-01-25 11:24:01 H=138.100.61.94.rev.vodafone.pt \[94.61.100.138\]:49760 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-01-25 11:24:20 H=138.100.61.94.rev.vodafone.pt \[94.61.100.138\]:58319 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-01-25 11:24:30 H=138.100.61.94.rev.vodafone.pt \[94.61.100.138\]:10144 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2019-10-24 20:51:14
118.92.93.233 attackspambots
Invalid user vega from 118.92.93.233 port 50480
2019-10-24 21:25:11
94.63.2.144 attackbots
2019-01-19 00:03:43 1gkdAp-0007Sf-Ai SMTP connection from 144.2.63.94.rev.vodafone.pt \[94.63.2.144\]:34321 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-19 00:04:24 1gkdBU-0007Tj-8G SMTP connection from 144.2.63.94.rev.vodafone.pt \[94.63.2.144\]:43782 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-19 00:04:46 1gkdBr-0007UW-9T SMTP connection from 144.2.63.94.rev.vodafone.pt \[94.63.2.144\]:43888 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 20:47:58
187.32.178.33 attackbotsspam
Invalid user lin from 187.32.178.33 port 55534
2019-10-24 21:12:36
72.139.119.82 attack
Oct 24 14:51:47 vps647732 sshd[857]: Failed password for root from 72.139.119.82 port 50088 ssh2
...
2019-10-24 20:56:01
91.182.105.57 attackspam
Invalid user freeze from 91.182.105.57 port 44316
2019-10-24 21:31:27

最近上报的IP列表

146.218.204.1 146.255.100.145 146.255.102.238 146.255.103.128
146.247.97.135 146.255.62.82 146.255.58.63 146.255.171.118
146.255.96.192 146.255.97.241 146.255.97.90 146.255.98.94
146.255.99.196 146.4.41.158 146.59.130.171 146.59.145.249
146.59.15.200 146.59.152.64 146.59.136.188 146.59.150.43