必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.143.34.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.143.34.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 10:22:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
39.34.143.192.in-addr.arpa domain name pointer 192-143-34-39.ip.airmobile.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.34.143.192.in-addr.arpa	name = 192-143-34-39.ip.airmobile.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.111.154.245 attackbotsspam
1590178743 - 05/22/2020 22:19:03 Host: 187.111.154.245/187.111.154.245 Port: 445 TCP Blocked
2020-05-23 04:59:53
106.53.5.85 attackspam
leo_www
2020-05-23 04:34:44
222.186.175.169 attackbotsspam
2020-05-22T23:34:45.316538afi-git.jinr.ru sshd[22741]: Failed password for root from 222.186.175.169 port 18242 ssh2
2020-05-22T23:34:48.482862afi-git.jinr.ru sshd[22741]: Failed password for root from 222.186.175.169 port 18242 ssh2
2020-05-22T23:34:51.393915afi-git.jinr.ru sshd[22741]: Failed password for root from 222.186.175.169 port 18242 ssh2
2020-05-22T23:34:51.394060afi-git.jinr.ru sshd[22741]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 18242 ssh2 [preauth]
2020-05-22T23:34:51.394074afi-git.jinr.ru sshd[22741]: Disconnecting: Too many authentication failures [preauth]
...
2020-05-23 04:58:24
114.202.139.173 attackbotsspam
May 22 22:13:46 rotator sshd\[15904\]: Invalid user ytb from 114.202.139.173May 22 22:13:49 rotator sshd\[15904\]: Failed password for invalid user ytb from 114.202.139.173 port 36268 ssh2May 22 22:16:34 rotator sshd\[16660\]: Invalid user hvg from 114.202.139.173May 22 22:16:36 rotator sshd\[16660\]: Failed password for invalid user hvg from 114.202.139.173 port 35840 ssh2May 22 22:19:29 rotator sshd\[16676\]: Invalid user xtr from 114.202.139.173May 22 22:19:31 rotator sshd\[16676\]: Failed password for invalid user xtr from 114.202.139.173 port 35444 ssh2
...
2020-05-23 04:36:32
92.118.161.45 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-05-23 04:37:44
122.138.113.249 attackspambots
Unauthorised access (May 22) SRC=122.138.113.249 LEN=40 TTL=46 ID=17403 TCP DPT=8080 WINDOW=50338 SYN 
Unauthorised access (May 22) SRC=122.138.113.249 LEN=40 TTL=46 ID=42611 TCP DPT=8080 WINDOW=1451 SYN 
Unauthorised access (May 21) SRC=122.138.113.249 LEN=40 TTL=46 ID=52445 TCP DPT=8080 WINDOW=20018 SYN 
Unauthorised access (May 20) SRC=122.138.113.249 LEN=40 TTL=46 ID=47781 TCP DPT=8080 WINDOW=3154 SYN 
Unauthorised access (May 19) SRC=122.138.113.249 LEN=40 TTL=46 ID=57152 TCP DPT=8080 WINDOW=50743 SYN 
Unauthorised access (May 18) SRC=122.138.113.249 LEN=40 TTL=46 ID=49872 TCP DPT=8080 WINDOW=3154 SYN
2020-05-23 04:45:28
120.71.146.217 attackbots
May 22 22:19:12 vmd48417 sshd[28495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.146.217
2020-05-23 04:52:24
222.186.31.127 attackspam
May 22 20:19:24 ip-172-31-62-245 sshd\[24803\]: Failed password for root from 222.186.31.127 port 16823 ssh2\
May 22 20:19:26 ip-172-31-62-245 sshd\[24803\]: Failed password for root from 222.186.31.127 port 16823 ssh2\
May 22 20:19:29 ip-172-31-62-245 sshd\[24803\]: Failed password for root from 222.186.31.127 port 16823 ssh2\
May 22 20:20:14 ip-172-31-62-245 sshd\[24808\]: Failed password for root from 222.186.31.127 port 14837 ssh2\
May 22 20:22:16 ip-172-31-62-245 sshd\[24822\]: Failed password for root from 222.186.31.127 port 58571 ssh2\
2020-05-23 04:44:38
183.89.214.107 attackspambots
(imapd) Failed IMAP login from 183.89.214.107 (TH/Thailand/mx-ll-183.89.214-107.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 23 00:49:01 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 13 secs): user=, method=PLAIN, rip=183.89.214.107, lip=5.63.12.44, TLS, session=
2020-05-23 04:51:36
111.229.39.187 attack
Bruteforce detected by fail2ban
2020-05-23 04:29:10
14.98.157.126 attackbots
Automatic report - Banned IP Access
2020-05-23 04:55:23
103.78.209.204 attackspam
May 22 22:41:31 nextcloud sshd\[21434\]: Invalid user tfp from 103.78.209.204
May 22 22:41:31 nextcloud sshd\[21434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.78.209.204
May 22 22:41:32 nextcloud sshd\[21434\]: Failed password for invalid user tfp from 103.78.209.204 port 53120 ssh2
2020-05-23 04:47:44
182.61.10.142 attackbotsspam
May 22 23:20:14 lukav-desktop sshd\[32264\]: Invalid user jdl from 182.61.10.142
May 22 23:20:14 lukav-desktop sshd\[32264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.10.142
May 22 23:20:16 lukav-desktop sshd\[32264\]: Failed password for invalid user jdl from 182.61.10.142 port 48348 ssh2
May 22 23:22:19 lukav-desktop sshd\[32279\]: Invalid user pmx from 182.61.10.142
May 22 23:22:19 lukav-desktop sshd\[32279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.10.142
2020-05-23 04:40:01
125.212.233.50 attackbotsspam
2020-05-22T22:44:07.316416scmdmz1 sshd[27426]: Invalid user mta from 125.212.233.50 port 48302
2020-05-22T22:44:08.920020scmdmz1 sshd[27426]: Failed password for invalid user mta from 125.212.233.50 port 48302 ssh2
2020-05-22T22:48:10.824989scmdmz1 sshd[27896]: Invalid user hzq from 125.212.233.50 port 37208
...
2020-05-23 04:50:21
89.244.190.103 attack
May 22 22:09:53 ns382633 sshd\[26066\]: Invalid user mfp from 89.244.190.103 port 60088
May 22 22:09:53 ns382633 sshd\[26066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.244.190.103
May 22 22:09:55 ns382633 sshd\[26066\]: Failed password for invalid user mfp from 89.244.190.103 port 60088 ssh2
May 22 22:19:16 ns382633 sshd\[27887\]: Invalid user dp from 89.244.190.103 port 46000
May 22 22:19:16 ns382633 sshd\[27887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.244.190.103
2020-05-23 04:49:21

最近上报的IP列表

213.0.14.41 150.75.243.87 31.120.176.178 254.143.167.60
141.187.193.179 74.51.58.8 185.252.17.110 129.170.182.39
119.251.139.97 114.163.17.108 205.89.195.47 177.13.229.73
217.84.179.102 231.11.226.14 204.97.38.96 138.110.88.29
71.24.172.87 32.53.253.207 56.253.209.218 173.150.63.132