必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Herndon

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.139.191.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14340
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;19.139.191.145.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090200 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 02 23:07:48 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 145.191.139.19.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 145.191.139.19.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.156.185.149 attackspam
Sep 29 13:08:43 web8 sshd\[5354\]: Invalid user de from 124.156.185.149
Sep 29 13:08:43 web8 sshd\[5354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.185.149
Sep 29 13:08:45 web8 sshd\[5354\]: Failed password for invalid user de from 124.156.185.149 port 14388 ssh2
Sep 29 13:12:46 web8 sshd\[7282\]: Invalid user raspberry from 124.156.185.149
Sep 29 13:12:46 web8 sshd\[7282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.185.149
2019-09-29 21:23:45
45.145.56.202 attack
B: Magento admin pass test (wrong country)
2019-09-29 21:52:01
115.159.220.190 attackbotsspam
Sep 29 15:11:50 MK-Soft-VM7 sshd[27877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.220.190 
Sep 29 15:11:53 MK-Soft-VM7 sshd[27877]: Failed password for invalid user po from 115.159.220.190 port 50324 ssh2
...
2019-09-29 21:41:10
92.53.65.189 attack
5251/tcp 5233/tcp 5260/tcp...
[2019-07-29/09-29]317pkt,242pt.(tcp)
2019-09-29 21:54:27
62.234.206.12 attackspambots
2019-09-29T09:26:43.9720491495-001 sshd\[10637\]: Invalid user admin from 62.234.206.12 port 50324
2019-09-29T09:26:43.9750041495-001 sshd\[10637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12
2019-09-29T09:26:45.9439901495-001 sshd\[10637\]: Failed password for invalid user admin from 62.234.206.12 port 50324 ssh2
2019-09-29T09:31:54.0783881495-001 sshd\[11052\]: Invalid user mr from 62.234.206.12 port 59184
2019-09-29T09:31:54.0852221495-001 sshd\[11052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12
2019-09-29T09:31:56.7515561495-001 sshd\[11052\]: Failed password for invalid user mr from 62.234.206.12 port 59184 ssh2
...
2019-09-29 21:44:06
14.123.253.91 attack
Port scan detected on ports: 40382[TCP], 40382[TCP], 40382[TCP]
2019-09-29 21:34:29
216.239.90.19 attackbots
Sep 29 14:08:16 rotator sshd\[20799\]: Failed password for root from 216.239.90.19 port 38873 ssh2Sep 29 14:08:20 rotator sshd\[20799\]: Failed password for root from 216.239.90.19 port 38873 ssh2Sep 29 14:08:22 rotator sshd\[20799\]: Failed password for root from 216.239.90.19 port 38873 ssh2Sep 29 14:08:25 rotator sshd\[20799\]: Failed password for root from 216.239.90.19 port 38873 ssh2Sep 29 14:08:28 rotator sshd\[20799\]: Failed password for root from 216.239.90.19 port 38873 ssh2Sep 29 14:08:32 rotator sshd\[20799\]: Failed password for root from 216.239.90.19 port 38873 ssh2
...
2019-09-29 21:40:09
153.36.236.35 attack
Sep 29 15:34:38 dcd-gentoo sshd[21880]: User root from 153.36.236.35 not allowed because none of user's groups are listed in AllowGroups
Sep 29 15:34:40 dcd-gentoo sshd[21880]: error: PAM: Authentication failure for illegal user root from 153.36.236.35
Sep 29 15:34:38 dcd-gentoo sshd[21880]: User root from 153.36.236.35 not allowed because none of user's groups are listed in AllowGroups
Sep 29 15:34:40 dcd-gentoo sshd[21880]: error: PAM: Authentication failure for illegal user root from 153.36.236.35
Sep 29 15:34:38 dcd-gentoo sshd[21880]: User root from 153.36.236.35 not allowed because none of user's groups are listed in AllowGroups
Sep 29 15:34:40 dcd-gentoo sshd[21880]: error: PAM: Authentication failure for illegal user root from 153.36.236.35
Sep 29 15:34:40 dcd-gentoo sshd[21880]: Failed keyboard-interactive/pam for invalid user root from 153.36.236.35 port 46945 ssh2
...
2019-09-29 21:36:33
159.203.17.176 attack
Automatic report - Banned IP Access
2019-09-29 21:50:43
185.53.91.70 attackspambots
09/29/2019-14:43:31.070998 185.53.91.70 Protocol: 17 ET SCAN Sipvicious Scan
2019-09-29 21:13:30
185.94.80.118 attack
Automatic report - Port Scan Attack
2019-09-29 21:22:11
51.77.140.111 attackbotsspam
Sep 29 15:27:49 [snip] sshd[16513]: Invalid user jupyter1 from 51.77.140.111 port 56874
Sep 29 15:27:49 [snip] sshd[16513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Sep 29 15:27:51 [snip] sshd[16513]: Failed password for invalid user jupyter1 from 51.77.140.111 port 56874 ssh2[...]
2019-09-29 21:48:05
66.70.194.195 attackspam
2019-09-29T12:29:16.282177abusebot-8.cloudsearch.cf sshd\[21520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip195.ip-66-70-194.net  user=root
2019-09-29 21:35:16
149.202.250.179 attack
Spam (brainsuperpro.xyz, Sep 29 14:11)
2019-09-29 21:19:08
188.148.179.184 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/188.148.179.184/ 
 KZ - 1H : (35)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KZ 
 NAME ASN : ASN202116 
 
 IP : 188.148.179.184 
 
 CIDR : 188.148.128.0/17 
 
 PREFIX COUNT : 99 
 
 UNIQUE IP COUNT : 1217024 
 
 
 WYKRYTE ATAKI Z ASN202116 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 5 
 24H - 9 
 
 INFO : Port SERVER 80 Scan Detected and Blocked by ADMIN  - data recovery
2019-09-29 21:31:03

最近上报的IP列表

120.131.7.216 114.35.158.166 82.155.118.253 81.144.241.84
79.103.133.30 74.214.223.182 107.10.131.222 46.44.199.220
74.208.147.31 110.126.53.10 72.45.241.10 170.168.234.9
155.130.193.231 74.208.82.86 153.117.169.130 72.73.102.35
68.35.247.145 66.116.85.144 24.39.189.70 220.135.74.91