必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.144.139.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.144.139.8.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 285 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:33:27 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
8.139.144.216.in-addr.arpa domain name pointer 216-144-139-8.unfiltered.holt.macff.wiktel.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.139.144.216.in-addr.arpa	name = 216-144-139-8.unfiltered.holt.macff.wiktel.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.173.121.213 attackbots
Jul 14 10:47:00 vps200512 sshd\[19193\]: Invalid user student from 222.173.121.213
Jul 14 10:47:00 vps200512 sshd\[19193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.121.213
Jul 14 10:47:03 vps200512 sshd\[19193\]: Failed password for invalid user student from 222.173.121.213 port 38770 ssh2
Jul 14 10:53:15 vps200512 sshd\[19277\]: Invalid user git from 222.173.121.213
Jul 14 10:53:15 vps200512 sshd\[19277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.121.213
2019-07-14 23:07:28
137.74.44.72 attack
Jul 14 16:20:14 mail sshd\[17870\]: Failed password for invalid user vijay from 137.74.44.72 port 54538 ssh2
Jul 14 16:40:07 mail sshd\[18147\]: Invalid user tomas from 137.74.44.72 port 58066
...
2019-07-14 23:41:58
103.236.253.45 attackspambots
Jul 14 17:41:03 dev sshd\[18856\]: Invalid user dw from 103.236.253.45 port 48821
Jul 14 17:41:03 dev sshd\[18856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.253.45
...
2019-07-14 23:53:36
207.154.229.50 attackspambots
Jul 14 16:42:05 MainVPS sshd[10239]: Invalid user ljy from 207.154.229.50 port 34640
Jul 14 16:42:05 MainVPS sshd[10239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
Jul 14 16:42:05 MainVPS sshd[10239]: Invalid user ljy from 207.154.229.50 port 34640
Jul 14 16:42:06 MainVPS sshd[10239]: Failed password for invalid user ljy from 207.154.229.50 port 34640 ssh2
Jul 14 16:47:37 MainVPS sshd[10646]: Invalid user stefan from 207.154.229.50 port 33900
...
2019-07-14 23:26:48
110.244.74.161 attack
firewall-block, port(s): 23/tcp
2019-07-14 22:48:26
42.57.203.243 attack
Unauthorised access (Jul 14) SRC=42.57.203.243 LEN=40 TTL=49 ID=27441 TCP DPT=23 WINDOW=43325 SYN
2019-07-14 23:21:02
188.117.151.197 attackbotsspam
Jul 14 16:30:28 rpi sshd[25769]: Failed password for root from 188.117.151.197 port 51346 ssh2
2019-07-14 23:09:09
79.174.12.138 attack
Automatic report - Banned IP Access
2019-07-14 23:17:17
153.36.240.126 attackspambots
Bruteforce on SSH Honeypot
2019-07-14 23:05:30
206.189.185.202 attack
DATE:2019-07-14 12:31:02, IP:206.189.185.202, PORT:ssh SSH brute force auth (thor)
2019-07-14 22:38:02
123.206.27.113 attackbotsspam
Jul 14 14:54:40 animalibera sshd[27613]: Invalid user jesus from 123.206.27.113 port 36424
...
2019-07-14 23:12:50
78.128.113.67 attackspam
smtp attack
2019-07-14 23:06:47
129.204.254.4 attackbots
Jul 14 17:38:12 vpn01 sshd\[18573\]: Invalid user ahmadi from 129.204.254.4
Jul 14 17:38:12 vpn01 sshd\[18573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4
Jul 14 17:38:14 vpn01 sshd\[18573\]: Failed password for invalid user ahmadi from 129.204.254.4 port 58634 ssh2
2019-07-14 23:42:54
71.6.233.103 attackspam
firewall-block, port(s): 49153/tcp
2019-07-14 23:04:10
109.101.212.199 attack
[portscan] Port scan
2019-07-14 23:51:05

最近上报的IP列表

76.74.193.145 160.153.115.99 214.232.59.35 37.36.141.56
206.234.195.223 86.72.148.89 193.75.130.34 133.142.107.170
197.96.186.167 131.29.2.174 41.199.164.15 181.43.119.247
60.220.214.199 114.56.52.226 80.178.5.114 107.112.233.5
75.163.135.58 94.32.26.93 83.24.202.2 235.222.135.129