必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.139.105.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;167.139.105.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:24:45 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 23.105.139.167.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 23.105.139.167.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.242.126.154 attackbots
email spam
2019-12-26 21:01:33
222.186.175.181 attack
Dec 26 14:06:57 MK-Soft-Root2 sshd[24680]: Failed password for root from 222.186.175.181 port 45928 ssh2
Dec 26 14:07:04 MK-Soft-Root2 sshd[24680]: Failed password for root from 222.186.175.181 port 45928 ssh2
...
2019-12-26 21:22:11
51.38.80.104 attackbotsspam
Invalid user test from 51.38.80.104 port 50978
2019-12-26 21:36:08
202.96.99.84 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-12-26 21:11:11
177.21.110.22 attack
firewall-block, port(s): 8080/tcp
2019-12-26 21:02:38
82.211.182.214 attackspam
Dec 24 15:47:19 pl3server sshd[19855]: Invalid user admin from 82.211.182.214
Dec 24 15:47:19 pl3server sshd[19855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.211.182.214
Dec 24 15:47:21 pl3server sshd[19855]: Failed password for invalid user admin from 82.211.182.214 port 59407 ssh2
Dec 24 15:47:21 pl3server sshd[19855]: Connection closed by 82.211.182.214 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.211.182.214
2019-12-26 21:03:35
89.16.103.241 attack
Autoban   89.16.103.241 AUTH/CONNECT
2019-12-26 21:09:49
31.211.65.102 attack
Invalid user q1 from 31.211.65.102 port 38172
2019-12-26 21:25:24
171.221.236.226 attackbotsspam
Port 1433 Scan
2019-12-26 21:08:05
92.118.37.61 attackspam
Dec 26 14:02:53 mc1 kernel: \[1524170.561557\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.61 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=32266 PROTO=TCP SPT=46078 DPT=3696 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 26 14:06:00 mc1 kernel: \[1524357.075991\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.61 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=37879 PROTO=TCP SPT=46078 DPT=3489 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 26 14:08:26 mc1 kernel: \[1524503.495575\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.61 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=33246 PROTO=TCP SPT=46078 DPT=3530 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-26 21:14:07
193.70.39.175 attackspam
Dec 26 09:22:25 vps46666688 sshd[18083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.39.175
Dec 26 09:22:27 vps46666688 sshd[18083]: Failed password for invalid user ching-me from 193.70.39.175 port 33410 ssh2
...
2019-12-26 21:22:24
103.21.149.102 attackbots
12/26/2019-07:20:55.814345 103.21.149.102 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-26 21:07:37
106.12.28.36 attackspam
Dec 26 13:42:57 v22018086721571380 sshd[19920]: Failed password for invalid user informix1 from 106.12.28.36 port 58300 ssh2
2019-12-26 21:07:18
209.17.96.186 attackspambots
port scan and connect, tcp 80 (http)
2019-12-26 21:13:43
59.91.225.251 attackbots
Unauthorized connection attempt detected from IP address 59.91.225.251 to port 445
2019-12-26 21:04:27

最近上报的IP列表

180.223.22.30 7.32.83.73 177.99.15.109 168.215.99.160
130.168.100.141 221.156.42.51 147.41.200.20 161.252.140.217
47.189.144.217 91.128.211.132 25.65.125.29 72.233.100.239
7.180.158.185 50.28.1.239 197.15.52.105 145.33.171.52
67.227.132.169 32.110.143.244 201.228.59.140 57.98.183.137