必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Fujisawa

省份(region): Kanagawa

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): NTT Communications Corporation

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 153.166.12.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36419
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;153.166.12.139.			IN	A

;; AUTHORITY SECTION:
.			1042	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081502 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 16 02:56:21 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
139.12.166.153.in-addr.arpa domain name pointer p3060139-ipngn20201hodogaya.kanagawa.ocn.ne.jp.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.12.166.153.in-addr.arpa	name = p3060139-ipngn20201hodogaya.kanagawa.ocn.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.98.102.107 attack
8080/tcp
[2019-07-10]1pkt
2019-07-11 02:03:05
80.82.77.139 attackbotsspam
Automatic report - Web App Attack
2019-07-11 01:45:03
104.248.53.106 attackspam
8080/tcp 8080/tcp 8080/tcp
[2019-07-10]3pkt
2019-07-11 02:05:40
1.160.198.251 attack
37215/tcp
[2019-07-10]1pkt
2019-07-11 01:29:18
182.68.227.221 attackbots
81/tcp
[2019-07-10]1pkt
2019-07-11 02:02:33
125.230.135.34 attackbotsspam
37215/tcp
[2019-07-10]1pkt
2019-07-11 01:33:24
89.161.134.81 attackspam
Autoban   89.161.134.81 REJECT
2019-07-11 01:53:19
186.224.191.126 attackbots
10.07.2019 10:43:32 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-07-11 01:47:56
203.163.232.132 attackbots
Autoban   203.163.232.132 AUTH/CONNECT
2019-07-11 02:11:18
46.101.224.184 attack
Jul 10 12:14:52 srv-4 sshd\[24671\]: Invalid user qi from 46.101.224.184
Jul 10 12:14:52 srv-4 sshd\[24671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184
Jul 10 12:14:54 srv-4 sshd\[24671\]: Failed password for invalid user qi from 46.101.224.184 port 40854 ssh2
...
2019-07-11 01:26:45
177.158.140.227 attackspambots
23/tcp
[2019-07-10]1pkt
2019-07-11 01:37:16
141.98.81.114 attackbotsspam
RDP brute forcing (d)
2019-07-11 01:45:40
216.243.31.2 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-11 01:56:17
206.189.35.65 attack
2019-07-10T17:36:17.596160abusebot-6.cloudsearch.cf sshd\[16322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cryptolend.io  user=root
2019-07-11 02:08:10
196.171.194.35 attackbotsspam
/var/log/apache/pucorp.org.log:196.171.194.35 - - [10/Jul/2019:10:29:42 +0200] "GET / HTTP/1.1" 200 141796 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows NT; DigExt; DTS Agent"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=196.171.194.35
2019-07-11 01:22:04

最近上报的IP列表

156.142.23.104 82.6.102.46 82.102.173.72 155.159.87.106
194.243.5.254 165.117.120.203 145.102.88.93 174.221.36.202
171.34.115.25 178.229.255.12 111.61.235.53 181.75.138.159
5.51.2.22 46.35.184.187 20.162.94.17 115.248.26.173
126.70.210.21 139.93.206.13 125.184.185.240 92.86.246.5