必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santiago

省份(region): Santiago Metropolitan

国家(country): Chile

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.46.185.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;190.46.185.139.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 28 03:54:37 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
139.185.46.190.in-addr.arpa domain name pointer pc-139-185-46-190.cm.vtr.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.185.46.190.in-addr.arpa	name = pc-139-185-46-190.cm.vtr.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.143.141.98 attackbotsspam
Apr 20 02:25:34 NPSTNNYC01T sshd[1883]: Failed password for root from 114.143.141.98 port 38710 ssh2
Apr 20 02:29:34 NPSTNNYC01T sshd[2160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.141.98
Apr 20 02:29:36 NPSTNNYC01T sshd[2160]: Failed password for invalid user ubuntu from 114.143.141.98 port 45698 ssh2
...
2020-04-20 15:43:45
217.182.74.196 attackbotsspam
Apr 20 07:32:25 ns382633 sshd\[16253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.196  user=root
Apr 20 07:32:26 ns382633 sshd\[16253\]: Failed password for root from 217.182.74.196 port 35674 ssh2
Apr 20 07:44:25 ns382633 sshd\[18903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.196  user=root
Apr 20 07:44:26 ns382633 sshd\[18903\]: Failed password for root from 217.182.74.196 port 38274 ssh2
Apr 20 07:49:49 ns382633 sshd\[19842\]: Invalid user yx from 217.182.74.196 port 57450
Apr 20 07:49:49 ns382633 sshd\[19842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.196
2020-04-20 15:34:56
186.24.43.28 attackbots
Apr 20 11:49:52 itv-usvr-01 sshd[3080]: Invalid user au from 186.24.43.28
Apr 20 11:49:52 itv-usvr-01 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.24.43.28
Apr 20 11:49:52 itv-usvr-01 sshd[3080]: Invalid user au from 186.24.43.28
Apr 20 11:49:55 itv-usvr-01 sshd[3080]: Failed password for invalid user au from 186.24.43.28 port 52375 ssh2
2020-04-20 15:28:28
75.44.16.251 attackspam
Apr 20 03:49:41 vps46666688 sshd[32624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.44.16.251
Apr 20 03:49:43 vps46666688 sshd[32624]: Failed password for invalid user ubuntu2 from 75.44.16.251 port 43382 ssh2
...
2020-04-20 15:36:42
206.227.0.99 attackspam
Apr 20 07:57:09 rotator sshd\[5126\]: Invalid user tom from 206.227.0.99Apr 20 07:57:11 rotator sshd\[5126\]: Failed password for invalid user tom from 206.227.0.99 port 50239 ssh2Apr 20 07:57:12 rotator sshd\[5128\]: Invalid user john from 206.227.0.99Apr 20 07:57:14 rotator sshd\[5128\]: Failed password for invalid user john from 206.227.0.99 port 50531 ssh2Apr 20 07:57:16 rotator sshd\[5130\]: Invalid user pi from 206.227.0.99Apr 20 07:57:18 rotator sshd\[5130\]: Failed password for invalid user pi from 206.227.0.99 port 50788 ssh2
...
2020-04-20 15:41:14
200.73.128.100 attackspam
Invalid user jp from 200.73.128.100 port 51782
2020-04-20 15:22:27
222.209.85.197 attackspam
Apr 20 07:40:39 vps647732 sshd[26826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.209.85.197
Apr 20 07:40:41 vps647732 sshd[26826]: Failed password for invalid user admin123 from 222.209.85.197 port 35456 ssh2
...
2020-04-20 15:36:22
49.235.234.94 attack
Apr 20 09:05:04 server sshd[12592]: Failed password for invalid user ap from 49.235.234.94 port 44638 ssh2
Apr 20 09:09:16 server sshd[13805]: Failed password for invalid user ubuntu from 49.235.234.94 port 34780 ssh2
Apr 20 09:13:38 server sshd[15036]: Failed password for invalid user el from 49.235.234.94 port 53162 ssh2
2020-04-20 15:19:21
45.142.195.2 attackbotsspam
Apr 20 09:12:33 srv01 postfix/smtpd\[463\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 20 09:12:59 srv01 postfix/smtpd\[447\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 20 09:13:11 srv01 postfix/smtpd\[31879\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 20 09:13:20 srv01 postfix/smtpd\[447\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 20 09:13:23 srv01 postfix/smtpd\[463\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-20 15:17:12
174.116.125.129 attackbots
Apr 20 09:22:09 taivassalofi sshd[146919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.116.125.129
Apr 20 09:22:10 taivassalofi sshd[146919]: Failed password for invalid user khadas from 174.116.125.129 port 38353 ssh2
...
2020-04-20 15:40:12
106.12.26.167 attackspambots
SSH Brute-Force Attack
2020-04-20 15:40:44
195.154.119.48 attack
Apr 20 07:08:37 vmd26974 sshd[24196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.119.48
Apr 20 07:08:39 vmd26974 sshd[24196]: Failed password for invalid user admin2 from 195.154.119.48 port 54298 ssh2
...
2020-04-20 15:25:42
222.186.180.142 attack
Apr 20 09:03:50 vmd38886 sshd\[25378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Apr 20 09:03:52 vmd38886 sshd\[25378\]: Failed password for root from 222.186.180.142 port 61957 ssh2
Apr 20 09:03:55 vmd38886 sshd\[25378\]: Failed password for root from 222.186.180.142 port 61957 ssh2
2020-04-20 15:10:07
112.65.52.60 attackspambots
postfix
2020-04-20 15:27:29
111.61.177.158 attackbots
[portscan] Port scan
2020-04-20 15:29:50

最近上报的IP列表

221.127.9.100 204.250.60.27 96.68.106.170 137.14.76.100
1.89.118.97 88.118.92.168 222.175.227.31 3.220.119.111
80.3.73.164 49.224.227.192 220.179.90.67 75.64.150.205
60.14.105.201 74.233.126.252 109.121.237.41 217.165.23.250
178.129.147.29 213.241.204.149 180.137.109.188 186.205.219.39