必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.225.94.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.225.94.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 178 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 04:15:33 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.94.225.198.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.94.225.198.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.228.101 attackspambots
 TCP (SYN) 192.241.228.101:38604 -> port 8087, len 44
2020-08-29 14:36:29
128.199.81.66 attackspambots
(sshd) Failed SSH login from 128.199.81.66 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 29 07:36:17 s1 sshd[5493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.81.66  user=root
Aug 29 07:36:20 s1 sshd[5493]: Failed password for root from 128.199.81.66 port 57630 ssh2
Aug 29 07:55:51 s1 sshd[6226]: Invalid user guillaume from 128.199.81.66 port 56010
Aug 29 07:55:54 s1 sshd[6226]: Failed password for invalid user guillaume from 128.199.81.66 port 56010 ssh2
Aug 29 08:08:32 s1 sshd[6772]: Invalid user pyramide from 128.199.81.66 port 56852
2020-08-29 15:02:39
193.112.49.125 attackspam
web-1 [ssh_2] SSH Attack
2020-08-29 14:45:27
216.218.206.119 attack
445/tcp 23/tcp 11211/tcp...
[2020-07-01/08-29]37pkt,14pt.(tcp),2pt.(udp)
2020-08-29 15:05:21
185.34.107.128 attack
used some sort of "Stresser" to take my wifi out. I had to buy a new router.
2020-08-29 14:50:02
23.129.64.197 attackspam
Bruteforce detected by fail2ban
2020-08-29 14:35:52
101.231.146.36 attackbotsspam
Invalid user suporte from 101.231.146.36 port 56662
2020-08-29 15:14:46
179.131.11.234 attack
Aug 29 06:11:43 cho sshd[1843502]: Failed password for invalid user epsilon from 179.131.11.234 port 41838 ssh2
Aug 29 06:16:35 cho sshd[1843678]: Invalid user emerson from 179.131.11.234 port 50628
Aug 29 06:16:35 cho sshd[1843678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.11.234 
Aug 29 06:16:35 cho sshd[1843678]: Invalid user emerson from 179.131.11.234 port 50628
Aug 29 06:16:38 cho sshd[1843678]: Failed password for invalid user emerson from 179.131.11.234 port 50628 ssh2
...
2020-08-29 15:06:55
92.154.95.236 attack
Port scan detected
2020-08-29 15:13:07
117.69.190.140 attackbotsspam
Aug 29 08:03:16 srv01 postfix/smtpd\[1881\]: warning: unknown\[117.69.190.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 08:03:28 srv01 postfix/smtpd\[1881\]: warning: unknown\[117.69.190.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 08:03:44 srv01 postfix/smtpd\[1881\]: warning: unknown\[117.69.190.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 08:04:03 srv01 postfix/smtpd\[1881\]: warning: unknown\[117.69.190.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 08:04:16 srv01 postfix/smtpd\[1881\]: warning: unknown\[117.69.190.140\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-29 14:31:46
158.101.157.58 attackbots
$f2bV_matches
2020-08-29 14:49:29
54.37.159.45 attackspambots
T: f2b ssh aggressive 3x
2020-08-29 14:44:59
80.67.172.162 attackbotsspam
Bruteforce detected by fail2ban
2020-08-29 14:50:57
107.6.171.132 attackbots
Unwanted checking 80 or 443 port
...
2020-08-29 14:32:09
91.121.205.83 attack
Invalid user vbox from 91.121.205.83 port 36290
2020-08-29 15:01:45

最近上报的IP列表

249.133.21.213 59.228.22.163 130.24.5.143 38.6.30.83
118.104.221.3 64.28.212.192 236.87.254.95 124.114.182.146
214.136.192.214 130.215.112.24 127.71.82.7 93.159.253.110
245.102.202.109 15.178.154.180 67.63.88.202 250.118.210.116
41.33.173.223 45.172.250.230 12.148.252.92 232.30.64.205