必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.139.25.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.139.25.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:24:14 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 190.25.139.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 190.25.139.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.245.55.145 attackbotsspam
xmlrpc attack
2020-03-24 10:08:28
173.244.209.5 attackspam
Mar 24 02:11:35 vpn01 sshd[10228]: Failed password for root from 173.244.209.5 port 51188 ssh2
Mar 24 02:11:38 vpn01 sshd[10228]: Failed password for root from 173.244.209.5 port 51188 ssh2
...
2020-03-24 10:01:14
63.82.48.68 attack
Mar 24 00:21:43 web01 postfix/smtpd[7559]: connect from bump.saparel.com[63.82.48.68]
Mar 24 00:21:43 web01 policyd-spf[8166]: None; identhostnamey=helo; client-ip=63.82.48.68; helo=bump.kranbery.com; envelope-from=x@x
Mar 24 00:21:43 web01 policyd-spf[8166]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.68; helo=bump.kranbery.com; envelope-from=x@x
Mar x@x
Mar 24 00:21:44 web01 postfix/smtpd[7559]: disconnect from bump.saparel.com[63.82.48.68]
Mar 24 00:24:43 web01 postfix/smtpd[8332]: connect from bump.saparel.com[63.82.48.68]
Mar 24 00:24:43 web01 policyd-spf[8337]: None; identhostnamey=helo; client-ip=63.82.48.68; helo=bump.kranbery.com; envelope-from=x@x
Mar 24 00:24:43 web01 policyd-spf[8337]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.68; helo=bump.kranbery.com; envelope-from=x@x
Mar x@x
Mar 24 00:24:43 web01 postfix/smtpd[8332]: disconnect from bump.saparel.com[63.82.48.68]
Mar 24 00:28:02 web01 postfix/smtpd[8480]: connect from bump.saparel.com[63.82........
-------------------------------
2020-03-24 10:08:59
128.199.76.166 attack
Telnet Server BruteForce Attack
2020-03-24 10:20:17
117.202.8.55 attackbotsspam
Mar 24 02:30:27 hosting sshd[24699]: Invalid user zhanglin from 117.202.8.55 port 41441
Mar 24 02:30:27 hosting sshd[24699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.202.8.55
Mar 24 02:30:27 hosting sshd[24699]: Invalid user zhanglin from 117.202.8.55 port 41441
Mar 24 02:30:29 hosting sshd[24699]: Failed password for invalid user zhanglin from 117.202.8.55 port 41441 ssh2
...
2020-03-24 12:00:20
40.65.127.97 attackspam
$f2bV_matches
2020-03-24 09:58:05
104.236.125.98 attackbotsspam
Mar 24 02:38:49 ns382633 sshd\[5632\]: Invalid user teamspeak2 from 104.236.125.98 port 49006
Mar 24 02:38:49 ns382633 sshd\[5632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.125.98
Mar 24 02:38:51 ns382633 sshd\[5632\]: Failed password for invalid user teamspeak2 from 104.236.125.98 port 49006 ssh2
Mar 24 02:47:55 ns382633 sshd\[7411\]: Invalid user debian from 104.236.125.98 port 52508
Mar 24 02:47:55 ns382633 sshd\[7411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.125.98
2020-03-24 09:51:37
120.92.34.203 attack
Mar 24 03:20:50 XXX sshd[41426]: Invalid user netapp from 120.92.34.203 port 23158
2020-03-24 12:02:12
167.250.31.82 attackspambots
Mar 24 02:50:02 markkoudstaal sshd[27344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.250.31.82
Mar 24 02:50:04 markkoudstaal sshd[27344]: Failed password for invalid user bw from 167.250.31.82 port 36472 ssh2
Mar 24 02:54:41 markkoudstaal sshd[27931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.250.31.82
2020-03-24 10:02:01
119.28.73.77 attack
Mar 24 03:19:43 XXX sshd[41398]: Invalid user shu from 119.28.73.77 port 51204
2020-03-24 12:03:54
134.122.50.84 attackbotsspam
Port 22 Scan, PTR: None
2020-03-24 12:01:38
81.192.100.222 attack
DATE:2020-03-24 01:02:59, IP:81.192.100.222, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-03-24 10:06:47
183.215.125.210 attackspam
Mar 24 00:01:43 nxxxxxxx sshd[26961]: Invalid user lzz from 183.215.125.210
Mar 24 00:01:43 nxxxxxxx sshd[26961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.215.125.210 
Mar 24 00:01:45 nxxxxxxx sshd[26961]: Failed password for invalid user lzz from 183.215.125.210 port 38516 ssh2
Mar 24 00:01:46 nxxxxxxx sshd[26961]: Received disconnect from 183.215.125.210: 11: Bye Bye [preauth]
Mar 24 00:17:01 nxxxxxxx sshd[28694]: Invalid user teamspeak from 183.215.125.210
Mar 24 00:17:01 nxxxxxxx sshd[28694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.215.125.210 
Mar 24 00:17:03 nxxxxxxx sshd[28694]: Failed password for invalid user teamspeak from 183.215.125.210 port 45814 ssh2
Mar 24 00:17:03 nxxxxxxx sshd[28694]: Received disconnect from 183.215.125.210: 11: Bye Bye [preauth]
Mar 24 00:21:55 nxxxxxxx sshd[29309]: Invalid user user from 183.215.125.210
Mar 24 00:21:55 nxxxxxxx sshd........
-------------------------------
2020-03-24 10:04:24
93.43.13.178 spambotsattackproxy
Attack, like DDOS, Brute-Force, Port Scan, Hack
2020-03-24 11:35:28
51.38.130.63 attack
Mar 24 04:03:14 localhost sshd\[15751\]: Invalid user user from 51.38.130.63 port 60906
Mar 24 04:03:14 localhost sshd\[15751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.130.63
Mar 24 04:03:16 localhost sshd\[15751\]: Failed password for invalid user user from 51.38.130.63 port 60906 ssh2
...
2020-03-24 12:05:02

最近上报的IP列表

65.221.92.111 86.132.139.97 154.49.90.152 221.200.116.210
75.168.244.235 242.68.145.137 116.79.124.201 51.46.99.57
56.55.173.20 99.32.133.2 74.125.151.5 83.158.9.106
255.174.114.185 239.198.215.190 62.183.46.15 52.70.200.13
214.221.194.181 235.96.228.71 62.120.60.51 85.87.156.107