必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.239.254.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.239.254.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 19:45:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
139.254.239.2.in-addr.arpa domain name pointer 2-239-254-139.ip251.fastwebnet.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.254.239.2.in-addr.arpa	name = 2-239-254-139.ip251.fastwebnet.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.130.44.108 attackspam
Bruteforce detected by fail2ban
2020-08-19 00:00:55
178.128.61.101 attackbotsspam
Aug 18 12:27:30 ip-172-31-16-56 sshd\[21580\]: Invalid user user from 178.128.61.101\
Aug 18 12:27:32 ip-172-31-16-56 sshd\[21580\]: Failed password for invalid user user from 178.128.61.101 port 47588 ssh2\
Aug 18 12:30:05 ip-172-31-16-56 sshd\[21592\]: Failed password for root from 178.128.61.101 port 55314 ssh2\
Aug 18 12:32:35 ip-172-31-16-56 sshd\[21634\]: Invalid user cwu from 178.128.61.101\
Aug 18 12:32:37 ip-172-31-16-56 sshd\[21634\]: Failed password for invalid user cwu from 178.128.61.101 port 34806 ssh2\
2020-08-18 23:56:20
103.25.84.170 attackspambots
Unauthorized connection attempt from IP address 103.25.84.170 on Port 445(SMB)
2020-08-19 00:01:56
91.132.138.56 attackspam
viewstate hacking
2020-08-18 23:26:27
181.191.241.6 attack
Aug 18 14:28:15 OPSO sshd\[14198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.241.6  user=root
Aug 18 14:28:18 OPSO sshd\[14198\]: Failed password for root from 181.191.241.6 port 46543 ssh2
Aug 18 14:33:02 OPSO sshd\[14919\]: Invalid user tester from 181.191.241.6 port 51099
Aug 18 14:33:02 OPSO sshd\[14919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.241.6
Aug 18 14:33:04 OPSO sshd\[14919\]: Failed password for invalid user tester from 181.191.241.6 port 51099 ssh2
2020-08-18 23:30:16
132.232.68.26 attackspambots
Aug 18 09:23:57 ny01 sshd[9263]: Failed password for root from 132.232.68.26 port 56394 ssh2
Aug 18 09:30:48 ny01 sshd[10911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.26
Aug 18 09:30:50 ny01 sshd[10911]: Failed password for invalid user cwm from 132.232.68.26 port 37556 ssh2
2020-08-18 23:54:40
106.12.18.125 attack
Aug 18 14:26:06 dev0-dcde-rnet sshd[12161]: Failed password for root from 106.12.18.125 port 42170 ssh2
Aug 18 14:30:32 dev0-dcde-rnet sshd[12200]: Failed password for root from 106.12.18.125 port 43046 ssh2
2020-08-18 23:29:14
84.216.178.116 attackspam
SSH login attempts.
2020-08-18 23:38:22
138.197.216.135 attackspam
Aug 18 16:49:37 ns382633 sshd\[26886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.216.135  user=root
Aug 18 16:49:39 ns382633 sshd\[26886\]: Failed password for root from 138.197.216.135 port 36358 ssh2
Aug 18 17:04:15 ns382633 sshd\[29674\]: Invalid user noemi from 138.197.216.135 port 50108
Aug 18 17:04:15 ns382633 sshd\[29674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.216.135
Aug 18 17:04:18 ns382633 sshd\[29674\]: Failed password for invalid user noemi from 138.197.216.135 port 50108 ssh2
2020-08-18 23:59:02
158.140.181.51 attackspambots
Unauthorized connection attempt from IP address 158.140.181.51 on Port 445(SMB)
2020-08-18 23:57:14
79.125.183.146 attackbotsspam
79.125.183.146 - - [18/Aug/2020:14:42:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5374 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.125.183.146 - - [18/Aug/2020:14:42:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5370 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.125.183.146 - - [18/Aug/2020:14:42:49 +0200] "POST /wp-login.php HTTP/1.1" 200 5344 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.125.183.146 - - [18/Aug/2020:15:04:51 +0200] "POST /wp-login.php HTTP/1.1" 200 5293 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.125.183.146 - - [18/Aug/2020:15:04:53 +0200] "POST /wp-login.php HTTP/1.1" 200 5294 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-18 23:19:33
36.74.46.104 attackspam
Unauthorized connection attempt from IP address 36.74.46.104 on Port 445(SMB)
2020-08-18 23:35:58
84.215.23.72 attack
SSH login attempts.
2020-08-18 23:34:02
103.55.36.153 attackspam
Aug 18 11:47:39 NPSTNNYC01T sshd[923]: Failed password for root from 103.55.36.153 port 55906 ssh2
Aug 18 11:52:13 NPSTNNYC01T sshd[1291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.55.36.153
Aug 18 11:52:15 NPSTNNYC01T sshd[1291]: Failed password for invalid user tianyu from 103.55.36.153 port 36774 ssh2
...
2020-08-19 00:01:16
41.76.168.181 attack
Unauthorized connection attempt from IP address 41.76.168.181 on Port 445(SMB)
2020-08-18 23:28:28

最近上报的IP列表

95.22.135.237 253.77.5.134 242.141.187.18 164.225.145.129
91.4.243.239 59.202.252.94 116.157.255.161 126.242.107.193
233.205.112.153 142.48.6.177 181.112.176.205 5.239.114.152
58.197.234.62 120.106.194.13 208.62.135.207 198.62.206.231
53.218.108.46 47.254.133.82 86.50.111.110 116.87.191.131