必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mongolia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.21.103.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.21.103.139.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:37:52 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.103.21.202.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.103.21.202.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.218.118.140 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-06-23 18:56:27
106.13.217.102 attack
$f2bV_matches
2020-06-23 19:00:34
185.220.101.199 attackspambots
2020-06-22 22:46:10.746635-0500  localhost sshd[92925]: Failed password for root from 185.220.101.199 port 15546 ssh2
2020-06-23 18:47:39
106.75.74.225 attack
 TCP (SYN) 106.75.74.225:58914 -> port 51106, len 44
2020-06-23 18:37:11
180.76.136.81 attackbots
$f2bV_matches
2020-06-23 18:53:21
62.234.127.234 attackbots
Unauthorized connection attempt detected from IP address 62.234.127.234 to port 9190
2020-06-23 19:09:18
41.168.8.197 attackbotsspam
Jun 23 01:07:53 server6 sshd[19354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.168.8.197  user=r.r
Jun 23 01:07:54 server6 sshd[19354]: Failed password for r.r from 41.168.8.197 port 41328 ssh2
Jun 23 01:07:54 server6 sshd[19354]: Received disconnect from 41.168.8.197: 11: Bye Bye [preauth]
Jun 23 01:21:34 server6 sshd[29470]: Failed password for invalid user sharon from 41.168.8.197 port 50742 ssh2
Jun 23 01:21:34 server6 sshd[29470]: Received disconnect from 41.168.8.197: 11: Bye Bye [preauth]
Jun 23 01:25:32 server6 sshd[5965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.168.8.197  user=r.r
Jun 23 01:25:34 server6 sshd[5965]: Failed password for r.r from 41.168.8.197 port 56600 ssh2
Jun 23 01:25:34 server6 sshd[5965]: Received disconnect from 41.168.8.197: 11: Bye Bye [preauth]
Jun 23 01:29:28 server6 sshd[12067]: pam_unix(sshd:auth): authentication failure; logname= uid=0........
-------------------------------
2020-06-23 18:48:27
103.141.136.150 attackspambots
170 packets to ports 3333 3388 3390 3398 3399 3400 8933 8989 13389 23389 33389 33890 33891 33892 33893 33894 33895 33896 33897 33898 33899 43389 53389 63389
2020-06-23 18:40:12
157.230.125.207 attackbotsspam
$f2bV_matches
2020-06-23 18:50:14
222.186.173.215 attack
Jun 23 12:32:10 sso sshd[15782]: Failed password for root from 222.186.173.215 port 44746 ssh2
Jun 23 12:32:14 sso sshd[15782]: Failed password for root from 222.186.173.215 port 44746 ssh2
...
2020-06-23 19:05:22
36.22.187.34 attack
Jun 23 06:55:11 fhem-rasp sshd[30603]: Invalid user user15 from 36.22.187.34 port 34608
...
2020-06-23 18:57:12
188.166.117.213 attackbotsspam
Jun 23 08:26:13 vps sshd[10662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 
Jun 23 08:26:15 vps sshd[10662]: Failed password for invalid user ubuntu from 188.166.117.213 port 50668 ssh2
Jun 23 08:29:28 vps sshd[10853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 
...
2020-06-23 19:09:46
203.81.71.188 attack
Automatic report - XMLRPC Attack
2020-06-23 19:11:03
190.143.216.106 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-23 18:49:03
64.90.40.100 attack
64.90.40.100 - - [23/Jun/2020:09:31:47 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.90.40.100 - - [23/Jun/2020:09:31:48 +0100] "POST /wp-login.php HTTP/1.1" 200 1685 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.90.40.100 - - [23/Jun/2020:09:31:49 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-23 18:31:06

最近上报的IP列表

202.21.42.82 202.21.43.1 202.21.42.80 202.21.178.83
202.29.176.169 202.201.12.215 202.29.221.150 202.4.169.243
202.29.80.48 202.244.138.93 202.4.110.130 202.41.10.101
202.43.123.32 202.44.131.100 202.28.215.174 202.43.178.45
202.44.247.114 202.44.249.172 202.44.139.16 202.47.36.75