必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.136.19.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.136.19.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:15:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 139.19.136.207.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 207.136.19.139.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.19.210.10 attackbots
Invalid user fauzi from 58.19.210.10 port 58850
2019-10-25 07:58:28
103.81.171.204 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/103.81.171.204/ 
 
 US - 1H : (276)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN137443 
 
 IP : 103.81.171.204 
 
 CIDR : 103.81.171.0/24 
 
 PREFIX COUNT : 617 
 
 UNIQUE IP COUNT : 239872 
 
 
 ATTACKS DETECTED ASN137443 :  
  1H - 2 
  3H - 3 
  6H - 3 
 12H - 3 
 24H - 3 
 
 DateTime : 2019-10-24 22:12:09 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-25 07:42:34
52.83.255.255 attackspam
2019-10-25T01:51:17.149479scmdmz1 sshd\[1180\]: Invalid user freaky from 52.83.255.255 port 63974
2019-10-25T01:51:17.153955scmdmz1 sshd\[1180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-83-255-255.cn-northwest-1.compute.amazonaws.com.cn
2019-10-25T01:51:18.739053scmdmz1 sshd\[1180\]: Failed password for invalid user freaky from 52.83.255.255 port 63974 ssh2
...
2019-10-25 07:53:02
116.212.131.27 attack
SPAM Delivery Attempt
2019-10-25 07:40:40
222.186.173.183 attackbotsspam
Oct 25 02:13:16 amit sshd\[28096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Oct 25 02:13:18 amit sshd\[28096\]: Failed password for root from 222.186.173.183 port 48014 ssh2
Oct 25 02:13:45 amit sshd\[28098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
...
2019-10-25 08:15:35
222.186.180.223 attackspam
Oct 25 02:10:42 meumeu sshd[16328]: Failed password for root from 222.186.180.223 port 10238 ssh2
Oct 25 02:10:47 meumeu sshd[16328]: Failed password for root from 222.186.180.223 port 10238 ssh2
Oct 25 02:10:51 meumeu sshd[16328]: Failed password for root from 222.186.180.223 port 10238 ssh2
Oct 25 02:10:57 meumeu sshd[16328]: Failed password for root from 222.186.180.223 port 10238 ssh2
...
2019-10-25 08:15:59
117.102.68.188 attackbotsspam
F2B jail: sshd. Time: 2019-10-24 22:31:47, Reported by: VKReport
2019-10-25 07:53:51
113.228.176.103 attackbots
Telnet Server BruteForce Attack
2019-10-25 08:08:54
198.108.67.45 attackbotsspam
10/24/2019-16:11:44.138842 198.108.67.45 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-25 08:04:08
46.38.144.146 attackbots
Oct 25 02:01:10 relay postfix/smtpd\[21722\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 02:01:53 relay postfix/smtpd\[25601\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 02:02:18 relay postfix/smtpd\[25029\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 02:03:04 relay postfix/smtpd\[23936\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 02:03:31 relay postfix/smtpd\[31771\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-25 08:06:00
5.54.208.216 attackspambots
Telnet Server BruteForce Attack
2019-10-25 08:17:56
31.163.236.193 attack
Chat Spam
2019-10-25 07:55:27
144.48.223.181 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/144.48.223.181/ 
 
 CN - 1H : (845)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN135357 
 
 IP : 144.48.223.181 
 
 CIDR : 144.48.223.0/24 
 
 PREFIX COUNT : 174 
 
 UNIQUE IP COUNT : 44544 
 
 
 ATTACKS DETECTED ASN135357 :  
  1H - 2 
  3H - 3 
  6H - 3 
 12H - 3 
 24H - 3 
 
 DateTime : 2019-10-24 22:11:27 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-25 08:11:17
176.100.113.83 attackbotsspam
Fail2Ban Ban Triggered
2019-10-25 08:02:45
54.37.232.108 attackspambots
Oct 25 00:46:46 site2 sshd\[40294\]: Failed password for root from 54.37.232.108 port 39820 ssh2Oct 25 00:50:26 site2 sshd\[40370\]: Invalid user subzero from 54.37.232.108Oct 25 00:50:28 site2 sshd\[40370\]: Failed password for invalid user subzero from 54.37.232.108 port 50984 ssh2Oct 25 00:54:14 site2 sshd\[40478\]: Invalid user test from 54.37.232.108Oct 25 00:54:16 site2 sshd\[40478\]: Failed password for invalid user test from 54.37.232.108 port 33946 ssh2
...
2019-10-25 08:14:27

最近上报的IP列表

251.60.78.90 9.16.31.111 222.250.171.160 255.179.134.25
98.126.214.85 171.198.151.93 115.64.156.170 161.14.249.9
240.138.187.167 235.4.154.136 39.231.101.198 123.184.170.70
138.10.5.57 80.100.72.164 86.107.60.88 167.120.170.12
21.140.41.211 218.96.112.127 52.92.233.41 73.88.123.97