必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Milan

省份(region): Lombardy

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.149.64.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1938
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.149.64.139.			IN	A

;; AUTHORITY SECTION:
.			2319	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091200 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 13 00:58:08 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
139.64.149.159.in-addr.arpa domain name pointer fortini2.pascal.unimi.it.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.64.149.159.in-addr.arpa	name = fortini2.pascal.unimi.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.135.195.254 attack
445/tcp
[2019-07-07]1pkt
2019-07-07 19:23:12
200.71.121.122 attack
Unauthorized IMAP connection attempt.
2019-07-07 19:12:11
208.91.111.98 attackspambots
445/tcp
[2019-07-07]1pkt
2019-07-07 19:34:31
37.156.131.163 attackbotsspam
port scan and connect, tcp 8080 (http-proxy)
2019-07-07 19:08:01
111.255.27.164 attackbotsspam
37215/tcp
[2019-07-07]1pkt
2019-07-07 19:09:19
140.143.183.71 attackbots
2019-07-07T08:55:50.763964  sshd[23908]: Invalid user filip from 140.143.183.71 port 50708
2019-07-07T08:55:50.780755  sshd[23908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.183.71
2019-07-07T08:55:50.763964  sshd[23908]: Invalid user filip from 140.143.183.71 port 50708
2019-07-07T08:55:52.653581  sshd[23908]: Failed password for invalid user filip from 140.143.183.71 port 50708 ssh2
2019-07-07T09:00:11.672312  sshd[23966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.183.71  user=root
2019-07-07T09:00:14.042003  sshd[23966]: Failed password for root from 140.143.183.71 port 57070 ssh2
...
2019-07-07 19:38:34
118.160.14.174 attackspam
445/tcp 445/tcp 445/tcp
[2019-07-07]3pkt
2019-07-07 19:46:35
106.12.108.23 attackspambots
Jul  7 03:57:44 debian sshd\[30849\]: Invalid user ya from 106.12.108.23 port 55584
Jul  7 03:57:44 debian sshd\[30849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.23
Jul  7 03:57:46 debian sshd\[30849\]: Failed password for invalid user ya from 106.12.108.23 port 55584 ssh2
...
2019-07-07 19:04:16
186.235.35.60 attackspam
Jul  6 23:43:04 web1 postfix/smtpd[30771]: warning: 60.35.235.186.geniosite.com.br[186.235.35.60]: SASL PLAIN authentication failed: authentication failure
...
2019-07-07 19:18:16
58.87.67.142 attack
$f2bV_matches
2019-07-07 19:28:36
178.128.213.194 attackspambots
Unauthorized SSH login attempts
2019-07-07 19:48:34
51.38.38.221 attackspam
Jul  7 11:19:55 marvibiene sshd[11498]: Invalid user ts3bot from 51.38.38.221 port 46892
Jul  7 11:19:55 marvibiene sshd[11498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.221
Jul  7 11:19:55 marvibiene sshd[11498]: Invalid user ts3bot from 51.38.38.221 port 46892
Jul  7 11:19:57 marvibiene sshd[11498]: Failed password for invalid user ts3bot from 51.38.38.221 port 46892 ssh2
...
2019-07-07 19:23:35
141.98.9.2 attackbotsspam
Jul  7 13:07:52 mail postfix/smtpd\[28488\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 13:09:21 mail postfix/smtpd\[28488\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 13:10:51 mail postfix/smtpd\[28242\]: warning: unknown\[141.98.9.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-07 19:16:36
123.30.236.149 attack
Jul  7 11:10:36 MK-Soft-Root2 sshd\[27257\]: Invalid user ioana from 123.30.236.149 port 39540
Jul  7 11:10:36 MK-Soft-Root2 sshd\[27257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149
Jul  7 11:10:38 MK-Soft-Root2 sshd\[27257\]: Failed password for invalid user ioana from 123.30.236.149 port 39540 ssh2
...
2019-07-07 19:05:28
54.210.80.158 attack
Jul  7 03:43:15   TCP Attack: SRC=54.210.80.158 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=233  DF PROTO=TCP SPT=47324 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-07-07 19:13:36

最近上报的IP列表

69.11.81.75 205.123.143.223 92.43.59.48 35.105.125.181
197.12.223.34 118.5.12.227 196.183.18.215 146.57.84.211
159.191.137.24 163.226.250.43 59.166.230.29 36.7.103.114
189.135.192.86 186.251.42.50 98.186.151.61 58.52.34.64
167.132.245.204 219.46.86.186 162.177.162.70 251.249.36.87