必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kinston

省份(region): North Carolina

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.4.244.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.4.244.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:51:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 139.244.4.207.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.244.4.207.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.97.192 attackspam
[ssh] SSH attack
2020-06-14 08:46:12
104.248.157.60 attack
2020-06-14T02:08:34.483278hz01.yumiweb.com sshd\[15483\]: Invalid user oracle from 104.248.157.60 port 56164
2020-06-14T02:08:54.774017hz01.yumiweb.com sshd\[15485\]: Invalid user hadoop from 104.248.157.60 port 58424
2020-06-14T02:09:14.577470hz01.yumiweb.com sshd\[15487\]: Invalid user hadoop from 104.248.157.60 port 60684
...
2020-06-14 08:11:43
207.248.113.124 attackbotsspam
Jun 13 22:45:58 mail.srvfarm.net postfix/smtpd[1294955]: warning: unknown[207.248.113.124]: SASL PLAIN authentication failed: 
Jun 13 22:45:58 mail.srvfarm.net postfix/smtpd[1294955]: lost connection after AUTH from unknown[207.248.113.124]
Jun 13 22:46:13 mail.srvfarm.net postfix/smtpd[1294953]: lost connection after CONNECT from unknown[207.248.113.124]
Jun 13 22:51:56 mail.srvfarm.net postfix/smtps/smtpd[1295671]: warning: unknown[207.248.113.124]: SASL PLAIN authentication failed: 
Jun 13 22:51:56 mail.srvfarm.net postfix/smtps/smtpd[1295671]: lost connection after AUTH from unknown[207.248.113.124]
2020-06-14 08:30:33
111.230.226.124 attack
Jun 14 02:07:06 home sshd[19086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
Jun 14 02:07:08 home sshd[19086]: Failed password for invalid user dovecot from 111.230.226.124 port 53428 ssh2
Jun 14 02:08:33 home sshd[20161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
...
2020-06-14 08:15:40
81.163.8.5 attackspam
Jun 13 22:54:11 mail.srvfarm.net postfix/smtpd[1295542]: warning: unknown[81.163.8.5]: SASL PLAIN authentication failed: 
Jun 13 22:54:11 mail.srvfarm.net postfix/smtpd[1295542]: lost connection after AUTH from unknown[81.163.8.5]
Jun 13 22:55:23 mail.srvfarm.net postfix/smtps/smtpd[1296242]: lost connection after CONNECT from unknown[81.163.8.5]
Jun 13 22:55:49 mail.srvfarm.net postfix/smtps/smtpd[1291139]: warning: 81-163-8-5.net.lasnet.pl[81.163.8.5]: SASL PLAIN authentication failed: 
Jun 13 22:55:49 mail.srvfarm.net postfix/smtps/smtpd[1291139]: lost connection after AUTH from 81-163-8-5.net.lasnet.pl[81.163.8.5]
2020-06-14 08:39:14
121.204.145.50 attackspam
Jun 14 01:11:01 server sshd[48351]: Failed password for invalid user tj from 121.204.145.50 port 35772 ssh2
Jun 14 01:13:56 server sshd[50658]: Failed password for root from 121.204.145.50 port 51008 ssh2
Jun 14 01:16:59 server sshd[52959]: Failed password for invalid user bmdmserver from 121.204.145.50 port 37992 ssh2
2020-06-14 08:46:34
193.189.77.114 attackbotsspam
Jun 13 22:57:12 mail.srvfarm.net postfix/smtpd[1294894]: warning: unknown[193.189.77.114]: SASL PLAIN authentication failed: 
Jun 13 22:57:12 mail.srvfarm.net postfix/smtpd[1294894]: lost connection after AUTH from unknown[193.189.77.114]
Jun 13 23:01:27 mail.srvfarm.net postfix/smtpd[1294955]: warning: unknown[193.189.77.114]: SASL PLAIN authentication failed: 
Jun 13 23:01:27 mail.srvfarm.net postfix/smtpd[1294955]: lost connection after AUTH from unknown[193.189.77.114]
Jun 13 23:03:51 mail.srvfarm.net postfix/smtpd[1295544]: lost connection after CONNECT from unknown[193.189.77.114]
2020-06-14 08:31:54
91.144.84.199 attackbotsspam
Jun 13 22:50:05 mail.srvfarm.net postfix/smtps/smtpd[1295671]: warning: unknown[91.144.84.199]: SASL PLAIN authentication failed: 
Jun 13 22:50:05 mail.srvfarm.net postfix/smtps/smtpd[1295671]: lost connection after AUTH from unknown[91.144.84.199]
Jun 13 22:51:28 mail.srvfarm.net postfix/smtpd[1295657]: lost connection after CONNECT from unknown[91.144.84.199]
Jun 13 22:51:32 mail.srvfarm.net postfix/smtpd[1295658]: warning: unknown[91.144.84.199]: SASL PLAIN authentication failed: 
Jun 13 22:51:32 mail.srvfarm.net postfix/smtpd[1295658]: lost connection after AUTH from unknown[91.144.84.199]
2020-06-14 08:38:02
106.75.53.228 attackbots
Invalid user es from 106.75.53.228 port 48998
2020-06-14 08:18:28
46.38.145.253 attackspambots
Jun 14 02:12:45 mail.srvfarm.net postfix/smtpd[1514512]: warning: unknown[46.38.145.253]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 02:14:24 mail.srvfarm.net postfix/smtpd[1518552]: warning: unknown[46.38.145.253]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 02:16:00 mail.srvfarm.net postfix/smtpd[1518555]: warning: unknown[46.38.145.253]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 02:17:40 mail.srvfarm.net postfix/smtpd[1536616]: warning: unknown[46.38.145.253]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 02:19:23 mail.srvfarm.net postfix/smtpd[1536617]: warning: unknown[46.38.145.253]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-14 08:41:09
178.128.88.244 attackspam
srv02 Mass scanning activity detected Target: 3737  ..
2020-06-14 08:20:52
179.26.153.219 attackspam
1592082353 - 06/13/2020 23:05:53 Host: 179.26.153.219/179.26.153.219 Port: 445 TCP Blocked
2020-06-14 08:24:02
193.27.228.131 attackspam
Port scan on 21 port(s): 54052 54087 54134 54137 54139 54203 54236 54237 54280 54356 54366 54386 54413 54456 54508 54513 54609 54616 54719 54732 54921
2020-06-14 08:23:34
176.101.135.32 attackbotsspam
Brute force attempt
2020-06-14 08:35:52
176.31.255.223 attackbotsspam
SSH Invalid Login
2020-06-14 08:27:49

最近上报的IP列表

72.71.130.185 33.161.116.155 171.195.24.138 209.113.215.91
219.186.109.149 120.129.232.228 8.227.153.78 108.86.236.9
214.143.238.103 174.43.214.178 221.48.36.100 166.208.159.121
99.207.98.152 197.155.122.141 152.4.190.110 204.134.97.100
51.73.107.15 3.180.240.74 54.189.92.131 184.217.201.92