必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amsterdam

省份(region): Noord Holland

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.150.196.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.150.196.139.		IN	A

;; AUTHORITY SECTION:
.			452	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023090300 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 03 22:46:01 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
139.196.150.169.in-addr.arpa domain name pointer unn-169-150-196-139.datapacket.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.196.150.169.in-addr.arpa	name = unn-169-150-196-139.datapacket.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.53.248.88 attackspambots
Unauthorized connection attempt from IP address 191.53.248.88 on Port 587(SMTP-MSA)
2019-07-31 22:24:50
104.248.144.166 attackspambots
Apr 15 02:09:10 ubuntu sshd[4915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.144.166
Apr 15 02:09:12 ubuntu sshd[4915]: Failed password for invalid user demo from 104.248.144.166 port 58740 ssh2
Apr 15 02:12:00 ubuntu sshd[5573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.144.166
Apr 15 02:12:02 ubuntu sshd[5573]: Failed password for invalid user user from 104.248.144.166 port 57062 ssh2
2019-07-31 21:33:33
122.195.200.148 attackspambots
Jul 31 19:21:01 areeb-Workstation sshd\[30176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
Jul 31 19:21:04 areeb-Workstation sshd\[30176\]: Failed password for root from 122.195.200.148 port 23999 ssh2
Jul 31 19:21:12 areeb-Workstation sshd\[30209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
...
2019-07-31 21:57:21
91.78.108.198 attack
Unauthorized connection attempt from IP address 91.78.108.198 on Port 445(SMB)
2019-07-31 22:04:55
104.248.140.212 attackspam
Apr 24 09:21:03 ubuntu sshd[18352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.140.212
Apr 24 09:21:05 ubuntu sshd[18352]: Failed password for invalid user tuan from 104.248.140.212 port 49694 ssh2
Apr 24 09:23:50 ubuntu sshd[18715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.140.212
Apr 24 09:23:53 ubuntu sshd[18715]: Failed password for invalid user julio from 104.248.140.212 port 47066 ssh2
2019-07-31 21:44:31
14.163.32.199 attackbots
Unauthorized connection attempt from IP address 14.163.32.199 on Port 445(SMB)
2019-07-31 21:27:25
80.24.191.81 attackbotsspam
Admin access (accessed by IP not domain): 
80.24.191.81 - - [31/Jul/2019:11:15:37 +0100] "GET /manager/html HTTP/1.1" 404 330 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0)"
2019-07-31 21:25:22
27.73.183.203 attackspambots
Honeypot attack, port: 445, PTR: localhost.
2019-07-31 22:19:10
103.39.133.110 attack
Jul 31 12:06:25 v22018076622670303 sshd\[17906\]: Invalid user abhinav from 103.39.133.110 port 39372
Jul 31 12:06:25 v22018076622670303 sshd\[17906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.133.110
Jul 31 12:06:27 v22018076622670303 sshd\[17906\]: Failed password for invalid user abhinav from 103.39.133.110 port 39372 ssh2
...
2019-07-31 21:48:03
45.55.151.41 attackspambots
45.55.151.41 - - [31/Jul/2019:15:11:37 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-07-31 21:28:01
177.66.234.118 attack
failed_logins
2019-07-31 21:23:11
185.177.200.78 attack
Unauthorized connection attempt from IP address 185.177.200.78 on Port 445(SMB)
2019-07-31 22:05:33
222.158.240.248 attackspam
Unauthorized connection attempt from IP address 222.158.240.248 on Port 445(SMB)
2019-07-31 21:56:36
98.230.168.182 attackspam
Honeypot attack, port: 23, PTR: c-98-230-168-182.hsd1.ga.comcast.net.
2019-07-31 21:43:01
185.2.5.32 attackbots
www.goldgier.de 185.2.5.32 \[31/Jul/2019:10:05:13 +0200\] "POST /wp-login.php HTTP/1.1" 200 8723 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.goldgier.de 185.2.5.32 \[31/Jul/2019:10:05:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 8723 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-31 21:42:07

最近上报的IP列表

128.199.240.200 126.92.179.111 70.22.220.214 120.221.80.116
150.107.241.179 110.136.219.4 192.131.104.90 97.210.67.25
221.238.113.207 95.59.99.51 49.49.222.37 93.131.64.145
51.15.233.253 196.189.242.34 56.48.123.146 196.189.242.166
196.189.242.27 96.1.253.237 45.128.232.121 95.214.27.197