必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Roodepoort

省份(region): Gauteng

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): IS

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.208.196.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14463
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.208.196.139.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 02:08:27 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
139.196.208.196.in-addr.arpa domain name pointer 196-208-196-139.vpn-dynamic.isgsm.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.196.208.196.in-addr.arpa	name = 196-208-196-139.vpn-dynamic.isgsm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.228.203.170 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:32:57
205.206.50.222 attack
suspicious action Sun, 01 Mar 2020 18:46:41 -0300
2020-03-02 06:21:00
218.95.37.144 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:38:20
222.184.232.217 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:29:52
221.1.154.15 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:34:52
141.98.10.137 attackbotsspam
Mar  1 23:06:46 srv01 postfix/smtpd\[4262\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 23:07:05 srv01 postfix/smtpd\[4259\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 23:07:15 srv01 postfix/smtpd\[4273\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 23:07:31 srv01 postfix/smtpd\[4273\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  1 23:07:39 srv01 postfix/smtpd\[4259\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-02 06:22:04
219.149.190.234 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:36:46
220.126.57.233 attackbots
Unauthorized connection attempt detected from IP address 220.126.57.233 to port 23 [J]
2020-03-02 06:36:08
223.25.69.191 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:27:40
216.218.206.93 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:46:43
219.65.48.200 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:37:46
210.209.170.75 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:55:16
223.30.5.13 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:27:11
217.219.168.168 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:40:47
222.252.51.166 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:28:39

最近上报的IP列表

162.13.194.139 113.33.32.32 167.71.248.95 71.100.234.99
188.225.119.50 185.18.241.119 212.11.141.92 126.123.97.153
2.142.134.46 167.71.81.177 23.7.116.35 150.23.145.85
53.21.230.59 241.216.214.245 198.117.238.182 38.148.37.205
178.64.119.197 173.57.40.241 209.227.57.77 196.160.224.113