必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.139.201.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.139.201.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:19:17 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
82.201.139.148.in-addr.arpa domain name pointer vip-148-139-201-82.cust.service-now.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.201.139.148.in-addr.arpa	name = vip-148-139-201-82.cust.service-now.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.246.2.153 attackbots
Invalid user xwj from 80.246.2.153 port 58542
2020-08-30 19:10:54
185.100.87.207 attackspambots
Aug 30 08:10:42 ws12vmsma01 sshd[50455]: Failed password for root from 185.100.87.207 port 39363 ssh2
Aug 30 08:10:55 ws12vmsma01 sshd[50455]: error: maximum authentication attempts exceeded for root from 185.100.87.207 port 39363 ssh2 [preauth]
Aug 30 08:10:55 ws12vmsma01 sshd[50455]: Disconnecting: Too many authentication failures for root [preauth]
...
2020-08-30 19:42:07
62.102.148.68 attack
2020-08-30T12:26:01.910022vps773228.ovh.net sshd[18067]: Failed password for root from 62.102.148.68 port 52876 ssh2
2020-08-30T12:26:04.076516vps773228.ovh.net sshd[18067]: Failed password for root from 62.102.148.68 port 52876 ssh2
2020-08-30T12:26:06.275166vps773228.ovh.net sshd[18067]: Failed password for root from 62.102.148.68 port 52876 ssh2
2020-08-30T12:26:08.313078vps773228.ovh.net sshd[18067]: Failed password for root from 62.102.148.68 port 52876 ssh2
2020-08-30T12:26:09.741817vps773228.ovh.net sshd[18067]: Failed password for root from 62.102.148.68 port 52876 ssh2
...
2020-08-30 18:43:54
128.199.92.187 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-30 19:13:40
61.143.61.71 attackbotsspam
RDP brute forcing (r)
2020-08-30 19:38:02
143.202.209.47 attackspambots
Aug 30 05:40:31 ws22vmsma01 sshd[207010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.202.209.47
Aug 30 05:40:33 ws22vmsma01 sshd[207010]: Failed password for invalid user zhong from 143.202.209.47 port 51199 ssh2
...
2020-08-30 18:51:04
193.56.28.221 attackbotsspam
Aug 30 11:16:28 ns308116 postfix/smtpd[23815]: warning: unknown[193.56.28.221]: SASL LOGIN authentication failed: authentication failure
Aug 30 11:16:28 ns308116 postfix/smtpd[23815]: warning: unknown[193.56.28.221]: SASL LOGIN authentication failed: authentication failure
Aug 30 11:16:28 ns308116 postfix/smtpd[23815]: warning: unknown[193.56.28.221]: SASL LOGIN authentication failed: authentication failure
Aug 30 11:16:28 ns308116 postfix/smtpd[23815]: warning: unknown[193.56.28.221]: SASL LOGIN authentication failed: authentication failure
Aug 30 11:16:29 ns308116 postfix/smtpd[23815]: warning: unknown[193.56.28.221]: SASL LOGIN authentication failed: authentication failure
Aug 30 11:16:29 ns308116 postfix/smtpd[23815]: warning: unknown[193.56.28.221]: SASL LOGIN authentication failed: authentication failure
...
2020-08-30 18:48:03
197.61.62.184 attackbots
Portscan detected
2020-08-30 19:35:20
222.186.175.148 attack
2020-08-30T12:57:24.485519vps773228.ovh.net sshd[18345]: Failed password for root from 222.186.175.148 port 29002 ssh2
2020-08-30T12:57:28.538467vps773228.ovh.net sshd[18345]: Failed password for root from 222.186.175.148 port 29002 ssh2
2020-08-30T12:57:32.140982vps773228.ovh.net sshd[18345]: Failed password for root from 222.186.175.148 port 29002 ssh2
2020-08-30T12:57:36.668988vps773228.ovh.net sshd[18345]: Failed password for root from 222.186.175.148 port 29002 ssh2
2020-08-30T12:57:40.364422vps773228.ovh.net sshd[18345]: Failed password for root from 222.186.175.148 port 29002 ssh2
...
2020-08-30 19:04:15
177.69.67.243 attack
Aug 30 04:42:51 vps46666688 sshd[23371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.67.243
Aug 30 04:42:53 vps46666688 sshd[23371]: Failed password for invalid user priya from 177.69.67.243 port 54229 ssh2
...
2020-08-30 19:06:29
49.88.112.112 attackbots
Aug 30 13:11:32 [Censored Hostname] sshd[22832]: Failed password for root from 49.88.112.112 port 62162 ssh2
Aug 30 13:11:36 [Censored Hostname] sshd[22832]: Failed password for root from 49.88.112.112 port 62162 ssh2
Aug 30 13:11:39 [Censored Hostname] sshd[22832]: Failed password for root from 49.88.112.112 port 62162 ssh2[...]
2020-08-30 19:11:44
222.69.138.109 attack
Brute forcing RDP port 3389
2020-08-30 19:02:15
61.142.247.210 attackspam
Aug 30 12:31:14 lnxmail61 postfix/smtpd[12942]: lost connection after CONNECT from unknown[61.142.247.210]
2020-08-30 18:47:33
89.144.47.28 attackspambots
Aug 30 08:54:06 ns382633 sshd\[19124\]: Invalid user solarus from 89.144.47.28 port 52030
Aug 30 08:54:06 ns382633 sshd\[19124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.144.47.28
Aug 30 08:54:09 ns382633 sshd\[19124\]: Failed password for invalid user solarus from 89.144.47.28 port 52030 ssh2
Aug 30 08:54:13 ns382633 sshd\[19128\]: Invalid user admin from 89.144.47.28 port 47221
Aug 30 08:54:13 ns382633 sshd\[19128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.144.47.28
2020-08-30 18:47:06
198.245.53.163 attack
Aug 30 04:45:18 Host-KEWR-E sshd[13818]: Invalid user hadoop from 198.245.53.163 port 57864
...
2020-08-30 19:42:39

最近上报的IP列表

81.253.251.154 163.141.111.33 246.54.208.24 205.167.111.72
146.6.180.29 92.158.223.78 192.255.59.20 107.234.177.55
156.194.25.138 42.57.187.77 160.3.135.245 45.143.228.110
123.169.93.94 196.237.82.253 195.214.158.245 224.132.7.236
206.0.71.171 218.94.114.56 152.136.252.253 188.235.205.40