必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mumbai

省份(region): Maharashtra

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.214.232.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.214.232.139.		IN	A

;; AUTHORITY SECTION:
.			301	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071502 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 16 07:20:00 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.232.214.181.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.232.214.181.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.92.60.43 attackbots
Automatic report - Port Scan Attack
2020-02-11 17:33:53
94.191.33.86 attackspam
Feb 11 06:12:03 ourumov-web sshd\[21930\]: Invalid user l from 94.191.33.86 port 43350
Feb 11 06:12:03 ourumov-web sshd\[21930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.33.86
Feb 11 06:12:06 ourumov-web sshd\[21930\]: Failed password for invalid user l from 94.191.33.86 port 43350 ssh2
...
2020-02-11 18:12:17
208.113.184.218 attackbots
Wordpress Admin Login attack
2020-02-11 17:57:00
222.186.31.166 attackspambots
Feb 11 10:50:04 MK-Soft-VM3 sshd[30406]: Failed password for root from 222.186.31.166 port 27633 ssh2
Feb 11 10:50:08 MK-Soft-VM3 sshd[30406]: Failed password for root from 222.186.31.166 port 27633 ssh2
...
2020-02-11 17:51:41
187.44.106.12 attackbotsspam
1581400835 - 02/11/2020 07:00:35 Host: 187.44.106.12/187.44.106.12 Port: 22 TCP Blocked
2020-02-11 17:57:16
141.98.10.130 attackspambots
Rude login attack (5 tries in 1d)
2020-02-11 18:02:32
45.134.179.57 attack
Feb 11 10:20:56 debian-2gb-nbg1-2 kernel: \[3672089.832233\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=22076 PROTO=TCP SPT=53727 DPT=46300 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-11 17:34:13
208.48.167.215 attack
Failed password for invalid user bdn from 208.48.167.215 port 55366 ssh2
Invalid user mme from 208.48.167.215 port 54948
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.48.167.215
Failed password for invalid user mme from 208.48.167.215 port 54948 ssh2
Invalid user qkq from 208.48.167.215 port 54632
2020-02-11 17:46:32
78.186.150.217 attack
2020-02-11T07:27:37.993412vps773228.ovh.net sshd[6441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.186.150.217
2020-02-11T07:27:37.975187vps773228.ovh.net sshd[6441]: Invalid user phq from 78.186.150.217 port 34777
2020-02-11T07:27:39.576231vps773228.ovh.net sshd[6441]: Failed password for invalid user phq from 78.186.150.217 port 34777 ssh2
2020-02-11T08:31:07.140751vps773228.ovh.net sshd[6606]: Invalid user byd from 78.186.150.217 port 45255
2020-02-11T08:31:07.162622vps773228.ovh.net sshd[6606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.186.150.217
2020-02-11T08:31:07.140751vps773228.ovh.net sshd[6606]: Invalid user byd from 78.186.150.217 port 45255
2020-02-11T08:31:08.788805vps773228.ovh.net sshd[6606]: Failed password for invalid user byd from 78.186.150.217 port 45255 ssh2
2020-02-11T08:46:58.607855vps773228.ovh.net sshd[6652]: Invalid user frf from 78.186.150.217 port 53800
2020-02-
...
2020-02-11 18:11:51
222.186.15.91 attackspam
Feb 11 11:06:04 vmd17057 sshd\[30752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Feb 11 11:06:06 vmd17057 sshd\[30752\]: Failed password for root from 222.186.15.91 port 13365 ssh2
Feb 11 11:06:08 vmd17057 sshd\[30752\]: Failed password for root from 222.186.15.91 port 13365 ssh2
...
2020-02-11 18:06:52
144.217.181.112 attackbotsspam
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:49:25 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:49:41 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:49:57 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:50:13 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:50:28 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:50:45 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:51:01 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:51:17 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:51:33 +0100] "POST /[munged]: HTTP/1.1" 200 6088 "-" "-"
[munged]::443 144.217.181.112 - - [11/Feb/2020:05:51:49 +0100
2020-02-11 18:07:50
138.197.129.38 attack
invalid login attempt (ros)
2020-02-11 17:53:09
119.207.126.21 attackspam
2020-02-11T02:01:30.5797611495-001 sshd[29886]: Invalid user jqs from 119.207.126.21 port 52476
2020-02-11T02:01:30.5834641495-001 sshd[29886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21
2020-02-11T02:01:30.5797611495-001 sshd[29886]: Invalid user jqs from 119.207.126.21 port 52476
2020-02-11T02:01:32.2580801495-001 sshd[29886]: Failed password for invalid user jqs from 119.207.126.21 port 52476 ssh2
2020-02-11T02:02:53.1568661495-001 sshd[29946]: Invalid user jtt from 119.207.126.21 port 35278
2020-02-11T02:02:53.1638351495-001 sshd[29946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21
2020-02-11T02:02:53.1568661495-001 sshd[29946]: Invalid user jtt from 119.207.126.21 port 35278
2020-02-11T02:02:54.9007301495-001 sshd[29946]: Failed password for invalid user jtt from 119.207.126.21 port 35278 ssh2
2020-02-11T02:04:14.4862201495-001 sshd[30019]: Invalid user uug from 11
...
2020-02-11 17:43:45
170.246.115.106 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-11 17:45:49
45.148.10.143 attackspambots
Feb 11 04:16:33 lanister sshd[20956]: Failed password for root from 45.148.10.143 port 59706 ssh2
Feb 11 04:16:45 lanister sshd[20959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.143  user=root
Feb 11 04:16:47 lanister sshd[20959]: Failed password for root from 45.148.10.143 port 58976 ssh2
Feb 11 04:16:58 lanister sshd[20961]: Invalid user admin from 45.148.10.143
...
2020-02-11 17:58:41

最近上报的IP列表

201.102.67.206 212.111.127.99 49.213.200.236 192.248.19.134
60.167.134.171 139.198.21.206 192.177.171.94 210.18.154.178
192.9.175.87 144.168.148.196 188.166.166.202 1.54.247.93
124.195.190.173 95.68.114.225 24.222.209.226 24.4.78.167
24.187.207.122 89.204.80.190 191.96.85.31 45.124.94.182