必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.139.232.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.139.232.131.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 05:49:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
131.232.139.216.in-addr.arpa domain name pointer 216-139-232-131.aus.us.siteprotect.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.232.139.216.in-addr.arpa	name = 216-139-232-131.aus.us.siteprotect.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.234.66.22 attack
Mar 11 06:51:15 server sshd\[7317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.234.66.22  user=root
Mar 11 06:51:17 server sshd\[7317\]: Failed password for root from 41.234.66.22 port 54342 ssh2
Mar 11 06:51:22 server sshd\[7337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.234.66.22  user=root
Mar 11 06:51:24 server sshd\[7337\]: Failed password for root from 41.234.66.22 port 49004 ssh2
Mar 11 06:51:32 server sshd\[7357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.234.66.22  user=root
...
2020-03-11 12:42:51
192.241.159.70 attackspambots
192.241.159.70 - - [11/Mar/2020:03:14:19 +0100] "GET /wp-login.php HTTP/1.1" 200 5466 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.241.159.70 - - [11/Mar/2020:03:14:21 +0100] "POST /wp-login.php HTTP/1.1" 200 6245 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.241.159.70 - - [11/Mar/2020:03:14:22 +0100] "POST /xmlrpc.php HTTP/1.1" 200 437 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-11 12:30:37
159.65.4.86 attackbots
2020-03-10T20:15:00.886840linuxbox-skyline sshd[13397]: Invalid user testsite from 159.65.4.86 port 33802
...
2020-03-11 12:02:10
223.206.130.141 attackbotsspam
Mar 11 03:14:01 *host* sshd\[30017\]: Invalid user admin1 from 223.206.130.141 port 64367
2020-03-11 12:45:32
14.63.167.192 attackspambots
Mar 11 00:05:41 plusreed sshd[13034]: Invalid user user6 from 14.63.167.192
...
2020-03-11 12:19:50
179.124.34.9 attack
Mar 10 23:28:55 NPSTNNYC01T sshd[28227]: Failed password for root from 179.124.34.9 port 36624 ssh2
Mar 10 23:32:59 NPSTNNYC01T sshd[28368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.9
Mar 10 23:33:01 NPSTNNYC01T sshd[28368]: Failed password for invalid user rinko from 179.124.34.9 port 39177 ssh2
...
2020-03-11 12:06:07
5.101.113.57 attackspambots
Observed brute-forces/probes into wordpress endpoints
2020-03-11 12:07:00
201.208.56.75 attackspam
20/3/10@22:34:16: FAIL: Alarm-Network address from=201.208.56.75
...
2020-03-11 12:37:44
80.78.240.240 attackbots
[portscan] Port scan
2020-03-11 12:04:25
192.144.225.182 attackbotsspam
Mar 11 03:01:27 icinga sshd[51697]: Failed password for root from 192.144.225.182 port 52642 ssh2
Mar 11 03:06:59 icinga sshd[57423]: Failed password for root from 192.144.225.182 port 54576 ssh2
...
2020-03-11 12:07:15
156.236.119.125 attack
Mar 11 04:21:24 web8 sshd\[17020\]: Invalid user keith from 156.236.119.125
Mar 11 04:21:24 web8 sshd\[17020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.125
Mar 11 04:21:26 web8 sshd\[17020\]: Failed password for invalid user keith from 156.236.119.125 port 45412 ssh2
Mar 11 04:27:48 web8 sshd\[20280\]: Invalid user ken from 156.236.119.125
Mar 11 04:27:48 web8 sshd\[20280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.125
2020-03-11 12:28:00
46.101.19.133 attackbotsspam
2020-03-11T02:43:51.641466vps773228.ovh.net sshd[13125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
2020-03-11T02:43:53.424387vps773228.ovh.net sshd[13125]: Failed password for root from 46.101.19.133 port 54006 ssh2
2020-03-11T02:51:32.285266vps773228.ovh.net sshd[13199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
2020-03-11T02:51:34.354573vps773228.ovh.net sshd[13199]: Failed password for root from 46.101.19.133 port 33440 ssh2
2020-03-11T02:59:04.823172vps773228.ovh.net sshd[13268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
2020-03-11T02:59:06.611264vps773228.ovh.net sshd[13268]: Failed password for root from 46.101.19.133 port 41108 ssh2
2020-03-11T03:06:35.992109vps773228.ovh.net sshd[13323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= 
...
2020-03-11 12:29:54
190.111.249.133 attack
Mar 11 05:01:20 srv-ubuntu-dev3 sshd[742]: Invalid user jessie from 190.111.249.133
Mar 11 05:01:20 srv-ubuntu-dev3 sshd[742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.133
Mar 11 05:01:20 srv-ubuntu-dev3 sshd[742]: Invalid user jessie from 190.111.249.133
Mar 11 05:01:22 srv-ubuntu-dev3 sshd[742]: Failed password for invalid user jessie from 190.111.249.133 port 50186 ssh2
Mar 11 05:05:44 srv-ubuntu-dev3 sshd[1379]: Invalid user brian from 190.111.249.133
Mar 11 05:05:44 srv-ubuntu-dev3 sshd[1379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.133
Mar 11 05:05:44 srv-ubuntu-dev3 sshd[1379]: Invalid user brian from 190.111.249.133
Mar 11 05:05:46 srv-ubuntu-dev3 sshd[1379]: Failed password for invalid user brian from 190.111.249.133 port 46458 ssh2
Mar 11 05:10:38 srv-ubuntu-dev3 sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2020-03-11 12:20:55
118.71.170.201 attackbots
1583892853 - 03/11/2020 03:14:13 Host: 118.71.170.201/118.71.170.201 Port: 445 TCP Blocked
2020-03-11 12:39:02
163.172.150.2 attackspam
Mar 11 04:56:05 ns381471 sshd[29828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.150.2
Mar 11 04:56:07 ns381471 sshd[29828]: Failed password for invalid user teamspeak3 from 163.172.150.2 port 40334 ssh2
2020-03-11 12:18:15

最近上报的IP列表

148.150.255.4 148.85.244.89 235.88.30.11 71.246.148.178
196.43.105.109 154.182.80.146 15.135.216.95 51.109.164.81
79.50.151.230 171.113.127.224 124.127.217.219 45.227.12.87
70.156.98.134 80.81.44.53 199.207.77.130 44.192.228.113
54.182.233.30 217.146.229.128 97.69.253.172 68.128.26.173