必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bangkok

省份(region): Bangkok

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Chulalongkorn University

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.44.139.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51181
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;202.44.139.159.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061702 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 18 15:14:41 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
159.139.44.202.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 159.139.44.202.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.54.141.65 attackspambots
2020-05-13T12:58:57.091793abusebot-7.cloudsearch.cf sshd[8522]: Invalid user deploy from 106.54.141.65 port 40986
2020-05-13T12:58:57.102341abusebot-7.cloudsearch.cf sshd[8522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.65
2020-05-13T12:58:57.091793abusebot-7.cloudsearch.cf sshd[8522]: Invalid user deploy from 106.54.141.65 port 40986
2020-05-13T12:58:58.544294abusebot-7.cloudsearch.cf sshd[8522]: Failed password for invalid user deploy from 106.54.141.65 port 40986 ssh2
2020-05-13T13:03:41.794592abusebot-7.cloudsearch.cf sshd[8898]: Invalid user teste from 106.54.141.65 port 43832
2020-05-13T13:03:41.804314abusebot-7.cloudsearch.cf sshd[8898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.65
2020-05-13T13:03:41.794592abusebot-7.cloudsearch.cf sshd[8898]: Invalid user teste from 106.54.141.65 port 43832
2020-05-13T13:03:43.897748abusebot-7.cloudsearch.cf sshd[8898]: Failed pass
...
2020-05-13 21:31:05
213.94.190.15 attackspam
PHISHING SPAM !
2020-05-13 21:48:48
182.253.68.122 attackbotsspam
May 13 15:41:32 meumeu sshd[30376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122 
May 13 15:41:34 meumeu sshd[30376]: Failed password for invalid user map from 182.253.68.122 port 33348 ssh2
May 13 15:45:51 meumeu sshd[30927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122 
...
2020-05-13 21:58:58
203.189.135.197 attack
KH_MAINT-KH-BPC_<177>1589373502 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 203.189.135.197:54961
2020-05-13 21:52:51
162.144.141.141 attackspambots
05/13/2020-14:38:02.822701 162.144.141.141 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-05-13 22:09:56
211.145.49.253 attack
May 13 18:23:07 gw1 sshd[4934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.253
May 13 18:23:09 gw1 sshd[4934]: Failed password for invalid user leyton from 211.145.49.253 port 59625 ssh2
...
2020-05-13 22:15:27
185.53.88.169 attackspam
[2020-05-13 09:59:33] NOTICE[1157][C-000043aa] chan_sip.c: Call from '' (185.53.88.169:61745) to extension '+046457381103' rejected because extension not found in context 'public'.
[2020-05-13 09:59:33] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-13T09:59:33.301-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+046457381103",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.169/61745",ACLName="no_extension_match"
[2020-05-13 09:59:40] NOTICE[1157][C-000043ab] chan_sip.c: Call from '' (185.53.88.169:52687) to extension '0+46457381103' rejected because extension not found in context 'public'.
[2020-05-13 09:59:40] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-13T09:59:40.707-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0+46457381103",SessionID="0x7f5f1025af28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.8
...
2020-05-13 22:13:14
106.54.13.167 attackbots
May 13 13:43:25 game-panel sshd[21736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.13.167
May 13 13:43:27 game-panel sshd[21736]: Failed password for invalid user mh from 106.54.13.167 port 60808 ssh2
May 13 13:48:12 game-panel sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.13.167
2020-05-13 21:58:09
80.82.78.104 attackspam
05/13/2020-15:59:15.104935 80.82.78.104 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-05-13 22:07:23
112.215.244.17 attackbots
13.05.2020 14:38:07 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-05-13 22:13:30
206.189.239.103 attackbots
May 13 13:30:32 game-panel sshd[21026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.239.103
May 13 13:30:33 game-panel sshd[21026]: Failed password for invalid user ftp2 from 206.189.239.103 port 33492 ssh2
May 13 13:34:01 game-panel sshd[21196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.239.103
2020-05-13 21:44:52
165.22.77.163 attackspam
2020-05-13T15:34:35.976777afi-git.jinr.ru sshd[15595]: Failed password for invalid user sinus from 165.22.77.163 port 59794 ssh2
2020-05-13T15:38:34.744277afi-git.jinr.ru sshd[16702]: Invalid user suporte from 165.22.77.163 port 38802
2020-05-13T15:38:34.748479afi-git.jinr.ru sshd[16702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.77.163
2020-05-13T15:38:34.744277afi-git.jinr.ru sshd[16702]: Invalid user suporte from 165.22.77.163 port 38802
2020-05-13T15:38:36.958748afi-git.jinr.ru sshd[16702]: Failed password for invalid user suporte from 165.22.77.163 port 38802 ssh2
...
2020-05-13 21:38:21
109.233.154.101 attack
May 13 14:38:15 mail postfix/smtpd[24368]: NOQUEUE: reject: RCPT from mailout2-101.xing.com[109.233.154.101]: 454 4.7.1 : Relay access denied; from= to= proto=ESMTP helo=
...
2020-05-13 22:00:20
118.97.23.33 attackspam
May 13 14:55:22 haigwepa sshd[786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.23.33 
May 13 14:55:24 haigwepa sshd[786]: Failed password for invalid user hao from 118.97.23.33 port 41175 ssh2
...
2020-05-13 21:37:17
14.29.50.74 attackspam
(sshd) Failed SSH login from 14.29.50.74 (CN/China/-): 5 in the last 3600 secs
2020-05-13 21:55:13

最近上报的IP列表

18.115.81.4 182.61.161.109 119.145.251.202 165.22.8.164
159.203.18.21 186.230.234.140 134.209.75.240 126.128.3.86
129.28.121.213 122.114.61.69 146.221.219.188 119.27.175.41
7.39.231.32 114.118.1.130 142.66.143.170 23.74.38.149
88.157.144.58 104.37.131.242 117.236.231.156 173.134.216.160