必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Ukraine

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.44.139.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.44.139.244.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 14:40:40 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 244.139.44.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.139.44.194.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.165.31.204 attack
Unauthorised access (Feb 13) SRC=119.165.31.204 LEN=40 TTL=49 ID=22902 TCP DPT=8080 WINDOW=57771 SYN 
Unauthorised access (Feb 13) SRC=119.165.31.204 LEN=40 TTL=49 ID=61942 TCP DPT=8080 WINDOW=34004 SYN 
Unauthorised access (Feb 13) SRC=119.165.31.204 LEN=40 TTL=49 ID=51690 TCP DPT=8080 WINDOW=6107 SYN
2020-02-14 04:33:34
193.70.88.213 attackspambots
Feb 13 21:16:30 MK-Soft-Root2 sshd[30613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.88.213 
Feb 13 21:16:33 MK-Soft-Root2 sshd[30613]: Failed password for invalid user riva from 193.70.88.213 port 45130 ssh2
...
2020-02-14 04:17:43
198.98.61.24 attackspam
13.02.2020 19:24:22 Connection to port 8080 blocked by firewall
2020-02-14 04:41:00
103.218.170.116 attackspambots
Feb 13 21:24:17 plex sshd[18488]: Invalid user hadoop from 103.218.170.116 port 40090
2020-02-14 04:29:38
202.125.74.126 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 04:46:56
51.91.110.249 attackbotsspam
Feb 13 20:13:10 MK-Soft-VM8 sshd[27377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.110.249 
Feb 13 20:13:13 MK-Soft-VM8 sshd[27377]: Failed password for invalid user rails from 51.91.110.249 port 39936 ssh2
...
2020-02-14 04:31:30
35.172.236.234 attackspam
Feb 13 21:14:32 legacy sshd[13329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.172.236.234
Feb 13 21:14:34 legacy sshd[13329]: Failed password for invalid user minecraft01 from 35.172.236.234 port 47140 ssh2
Feb 13 21:17:37 legacy sshd[13478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.172.236.234
...
2020-02-14 04:28:19
222.186.175.220 attackspam
Feb 13 05:30:18 debian sshd[29711]: Unable to negotiate with 222.186.175.220 port 9064: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Feb 13 15:34:12 debian sshd[27634]: Unable to negotiate with 222.186.175.220 port 61834: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-02-14 04:46:42
192.241.233.177 attack
scan r
2020-02-14 04:10:49
222.186.30.209 attackbotsspam
Feb 13 21:17:03 debian64 sshd[30450]: Failed password for root from 222.186.30.209 port 11706 ssh2
Feb 13 21:17:08 debian64 sshd[30450]: Failed password for root from 222.186.30.209 port 11706 ssh2
...
2020-02-14 04:28:48
47.208.5.106 attack
Feb 13 12:52:05 askasleikir sshd[7614]: Failed password for invalid user xian from 47.208.5.106 port 58566 ssh2
2020-02-14 04:06:58
106.12.10.21 attackbotsspam
Feb 13 20:14:59 cp sshd[16016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.10.21
2020-02-14 04:09:22
185.130.215.15 attackbots
DATE:2020-02-13 20:14:34, IP:185.130.215.15, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-14 04:27:48
165.22.240.146 attackbotsspam
Feb 13 20:56:40 hell sshd[10618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.240.146
Feb 13 20:56:42 hell sshd[10618]: Failed password for invalid user andria from 165.22.240.146 port 57452 ssh2
...
2020-02-14 04:08:51
103.226.174.221 attackbots
WordPress login Brute force / Web App Attack on client site.
2020-02-14 04:32:39

最近上报的IP列表

194.5.193.170 194.44.193.135 194.67.93.225 194.99.26.192
194.99.24.38 194.99.26.63 194.99.26.223 194.44.20.25
194.99.26.44 194.99.26.50 194.99.26.11 194.99.26.210
194.99.24.218 194.99.26.177 195.135.106.77 195.110.58.121
195.149.196.135 195.133.157.207 195.18.17.22 195.167.104.114