必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Rio de Janeiro

省份(region): Rio de Janeiro

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.21.101.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.21.101.39.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100301 1800 900 604800 86400

;; Query time: 553 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 04 02:34:43 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
39.101.21.189.in-addr.arpa domain name pointer 189-21-101-39.ded.intelignet.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.101.21.189.in-addr.arpa	name = 189-21-101-39.ded.intelignet.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.74.72.249 attack
Unauthorized connection attempt from IP address 103.74.72.249 on Port 445(SMB)
2020-09-23 17:54:01
217.25.227.66 attack
Unauthorized connection attempt from IP address 217.25.227.66 on Port 445(SMB)
2020-09-23 18:02:20
189.45.198.22 attackspambots
20 attempts against mh-ssh on star
2020-09-23 17:37:53
147.78.66.202 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-23 18:13:35
92.204.55.7 attackbots
Attempt to upload PHP script;
2020-09-23 17:59:52
189.137.90.111 attackbots
20/9/22@13:01:40: FAIL: Alarm-Network address from=189.137.90.111
...
2020-09-23 17:49:36
2.187.37.43 attackbots
Port probing on unauthorized port 445
2020-09-23 17:43:12
134.175.178.118 attackspam
Sep 22 19:32:42 hpm sshd\[495\]: Invalid user system from 134.175.178.118
Sep 22 19:32:42 hpm sshd\[495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.178.118
Sep 22 19:32:45 hpm sshd\[495\]: Failed password for invalid user system from 134.175.178.118 port 35710 ssh2
Sep 22 19:38:42 hpm sshd\[882\]: Invalid user michael from 134.175.178.118
Sep 22 19:38:42 hpm sshd\[882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.178.118
2020-09-23 17:56:32
196.219.85.212 attack
Unauthorized connection attempt from IP address 196.219.85.212 on Port 445(SMB)
2020-09-23 17:59:12
116.74.135.168 attackspambots
DATE:2020-09-22 18:59:48, IP:116.74.135.168, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-23 17:42:17
41.66.194.141 attackbotsspam
 TCP (SYN) 41.66.194.141:49560 -> port 1433, len 40
2020-09-23 17:55:18
81.16.122.128 attackbotsspam
Automatic report BANNED IP
2020-09-23 18:16:42
10.18.40.64 attackbotsspam
port scan and connect, tcp 22 (ssh)
2020-09-23 17:46:21
199.195.251.227 attackbotsspam
199.195.251.227 (US/United States/-), 3 distributed sshd attacks on account [postgres] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 23 02:49:43 internal2 sshd[24108]: Invalid user postgres from 140.143.56.61 port 42078
Sep 23 03:17:27 internal2 sshd[19349]: Invalid user postgres from 199.195.251.227 port 38434
Sep 23 03:09:15 internal2 sshd[7324]: Invalid user postgres from 194.15.36.54 port 50182

IP Addresses Blocked:

140.143.56.61 (CN/China/-)
2020-09-23 18:03:04
112.85.42.229 attack
Sep 23 11:25:10 abendstille sshd\[19959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
Sep 23 11:25:12 abendstille sshd\[19959\]: Failed password for root from 112.85.42.229 port 19167 ssh2
Sep 23 11:25:14 abendstille sshd\[20063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
Sep 23 11:25:14 abendstille sshd\[19959\]: Failed password for root from 112.85.42.229 port 19167 ssh2
Sep 23 11:25:15 abendstille sshd\[20063\]: Failed password for root from 112.85.42.229 port 64513 ssh2
...
2020-09-23 17:45:59

最近上报的IP列表

190.179.50.169 164.217.83.128 52.14.102.253 56.66.52.103
119.48.229.212 12.8.180.200 126.204.54.148 89.0.233.28
137.147.77.7 54.214.77.116 62.94.33.162 5.246.218.242
101.226.98.13 189.136.74.73 217.33.15.178 223.72.198.30
97.20.233.77 213.23.17.250 212.5.211.235 35.75.70.243