必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.137.139.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.137.139.53.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:02:06 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 53.139.137.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.139.137.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.35.139.72 attackspam
Jul 23 03:21:35 microserver sshd[55458]: Invalid user felix from 185.35.139.72 port 60924
Jul 23 03:21:35 microserver sshd[55458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72
Jul 23 03:21:37 microserver sshd[55458]: Failed password for invalid user felix from 185.35.139.72 port 60924 ssh2
Jul 23 03:25:34 microserver sshd[56089]: Invalid user umesh from 185.35.139.72 port 53514
Jul 23 03:25:34 microserver sshd[56089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72
Jul 23 03:37:24 microserver sshd[57522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72  user=root
Jul 23 03:37:26 microserver sshd[57522]: Failed password for root from 185.35.139.72 port 59514 ssh2
Jul 23 03:41:27 microserver sshd[58140]: Invalid user dm from 185.35.139.72 port 52102
Jul 23 03:41:27 microserver sshd[58140]: pam_unix(sshd:auth): authentication failure; logname= uid=0
2019-07-23 09:53:31
40.76.63.49 attackbots
Port scan: Attack repeated for 24 hours
2019-07-23 10:09:52
122.15.55.1 attackspam
Jul 23 07:25:44 vibhu-HP-Z238-Microtower-Workstation sshd\[21695\]: Invalid user pepper from 122.15.55.1
Jul 23 07:25:44 vibhu-HP-Z238-Microtower-Workstation sshd\[21695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.15.55.1
Jul 23 07:25:46 vibhu-HP-Z238-Microtower-Workstation sshd\[21695\]: Failed password for invalid user pepper from 122.15.55.1 port 56032 ssh2
Jul 23 07:32:08 vibhu-HP-Z238-Microtower-Workstation sshd\[21894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.15.55.1  user=postgres
Jul 23 07:32:10 vibhu-HP-Z238-Microtower-Workstation sshd\[21894\]: Failed password for postgres from 122.15.55.1 port 35495 ssh2
...
2019-07-23 10:04:08
185.220.101.35 attack
Jul 23 00:12:40 unicornsoft sshd\[24143\]: Invalid user admin from 185.220.101.35
Jul 23 00:12:40 unicornsoft sshd\[24143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.35
Jul 23 00:12:42 unicornsoft sshd\[24143\]: Failed password for invalid user admin from 185.220.101.35 port 33949 ssh2
2019-07-23 10:13:52
188.166.226.209 attackspambots
Jul 23 04:28:57 srv-4 sshd\[8107\]: Invalid user ftpuser from 188.166.226.209
Jul 23 04:28:57 srv-4 sshd\[8107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.209
Jul 23 04:28:59 srv-4 sshd\[8107\]: Failed password for invalid user ftpuser from 188.166.226.209 port 58191 ssh2
...
2019-07-23 10:04:29
2001:41d0:8:5cc3:: attack
xmlrpc attack
2019-07-23 09:52:01
198.199.74.151 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-23 09:59:40
185.244.25.108 attackspambots
Splunk® : port scan detected:
Jul 22 21:34:26 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=185.244.25.108 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=56844 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2019-07-23 10:07:36
200.153.20.178 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 19:21:28,868 INFO [shellcode_manager] (200.153.20.178) no match, writing hexdump (476471caee695e76029aa5d9b5466954 :2384825) - MS17010 (EternalBlue)
2019-07-23 09:58:31
92.50.249.92 attackspam
Jul 23 03:42:43 mail sshd\[20458\]: Failed password for root from 92.50.249.92 port 40054 ssh2
Jul 23 03:47:18 mail sshd\[21145\]: Invalid user rick from 92.50.249.92 port 35818
Jul 23 03:47:18 mail sshd\[21145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.92
Jul 23 03:47:21 mail sshd\[21145\]: Failed password for invalid user rick from 92.50.249.92 port 35818 ssh2
Jul 23 03:51:52 mail sshd\[21616\]: Invalid user chao from 92.50.249.92 port 59818
2019-07-23 10:06:13
185.176.26.100 attackbotsspam
Splunk® : port scan detected:
Jul 22 22:06:32 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.176.26.100 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=50646 PROTO=TCP SPT=41515 DPT=6534 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-23 10:12:59
202.51.110.214 attackbotsspam
Jul 23 01:34:55 localhost sshd\[113789\]: Invalid user tom from 202.51.110.214 port 46641
Jul 23 01:34:55 localhost sshd\[113789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
Jul 23 01:34:57 localhost sshd\[113789\]: Failed password for invalid user tom from 202.51.110.214 port 46641 ssh2
Jul 23 01:40:16 localhost sshd\[114040\]: Invalid user oliver from 202.51.110.214 port 45045
Jul 23 01:40:16 localhost sshd\[114040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
...
2019-07-23 10:00:31
178.255.112.71 attackbots
DATE:2019-07-23 01:25:12, IP:178.255.112.71, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-23 10:08:42
62.75.159.60 attackspambots
SQL injection:/index.php?menu_selected=144&sub_menu_selected=1024&language=FR&ID_CON=IND&country=india&URL=www.servicevolontaire.org/index.php_menu_selected=144&numero_page=141111111111111'+UNION+SELECT+CHAR(45,120,49,45,81,45),CHAR(45,120,50,45,81,45),CHAR(45,120,51,45,81,45),CHAR(45,120,52,45,81,45),CHAR(45,120,53,45,81,45),CHAR(45,120,54,45,81,45),CHAR(45,120,55,45,81,45),CHAR(45,120,56,45,81,45),CHAR(45,120,57,45,81,45),CHAR(45,120,49,48,45,81,45),CHAR(45,120,49,49,45,81,45),CHAR(45,120,49,50,45,81,45),CHAR(45,120,49,51,45,81,45),CHAR(45,120,49,52,45,81,45),CHAR(45,120,49,53,45,81,45),CHAR(45,120,49,54,45,81,45),CHAR(45,120,49,55,45,81,45),CHAR(45,120,49,56,45,81,45),CHAR(45,120,49,57,45,81,45),CHAR(45,120,50,48,45,81,45),CHAR(45,120,50,49,45,81,45),CHAR(45,120,50,50,45,81,45),CHAR(45,120,50,51,45,81,45),CHAR(45,120,50,52,45,81,45),CHAR(45,120,50,53,45,81,45),CHAR(45,120,50,54,45,81,45),CHAR(45,120,50,55,45,81,45),CHAR(45,120,50,56,45,81,45),CHAR(45,120,50,57,45,81,45),CHAR(45,120,51,48,45,81,45),CHAR(45,
2019-07-23 10:00:10
201.230.55.55 attackspambots
Jul 23 04:06:12 host sshd\[43906\]: Invalid user zabbix from 201.230.55.55 port 52037
Jul 23 04:06:12 host sshd\[43906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.230.55.55
...
2019-07-23 10:10:36

最近上报的IP列表

208.42.216.67 217.234.229.243 116.119.106.234 39.74.99.45
109.253.128.93 134.53.144.5 215.168.60.68 161.5.109.250
138.226.67.109 205.201.204.204 54.20.41.210 81.123.25.238
248.167.74.53 193.46.56.245 62.30.99.234 217.118.50.5
106.218.106.166 144.51.2.34 57.6.109.47 127.219.102.19