必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Garretson

省份(region): South Dakota

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.249.200.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.249.200.139.		IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020073100 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 01 07:25:42 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
139.200.249.216.in-addr.arpa domain name pointer cust.114559.sxflsdch38R.sdnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.200.249.216.in-addr.arpa	name = cust.114559.sxflsdch38R.sdnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.118.175.23 attackspambots
Honeypot attack, port: 5555, PTR: n112118175023.netvigator.com.
2020-03-08 20:01:52
202.58.98.86 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 20:25:31
2.25.178.217 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-08 20:01:16
168.128.70.151 attackspam
DATE:2020-03-08 08:58:51, IP:168.128.70.151, PORT:ssh SSH brute force auth (docker-dc)
2020-03-08 20:21:10
94.191.86.249 attackbotsspam
Mar  8 09:03:40 ns382633 sshd\[31946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.86.249  user=root
Mar  8 09:03:42 ns382633 sshd\[31946\]: Failed password for root from 94.191.86.249 port 53402 ssh2
Mar  8 09:15:56 ns382633 sshd\[1857\]: Invalid user anil from 94.191.86.249 port 35652
Mar  8 09:15:56 ns382633 sshd\[1857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.86.249
Mar  8 09:15:58 ns382633 sshd\[1857\]: Failed password for invalid user anil from 94.191.86.249 port 35652 ssh2
2020-03-08 20:29:30
129.204.94.79 attackbotsspam
Jan 22 15:15:20 ms-srv sshd[24269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.94.79
Jan 22 15:15:21 ms-srv sshd[24269]: Failed password for invalid user ubuntu from 129.204.94.79 port 58658 ssh2
2020-03-08 20:13:37
151.80.60.151 attackspam
Dec 10 16:47:19 ms-srv sshd[49172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.60.151
Dec 10 16:47:20 ms-srv sshd[49172]: Failed password for invalid user server from 151.80.60.151 port 34848 ssh2
2020-03-08 20:25:07
139.199.34.54 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-03-08 20:26:30
178.254.55.25 attackspam
Mar  8 02:22:13 hanapaa sshd\[25270\]: Invalid user es from 178.254.55.25
Mar  8 02:22:13 hanapaa sshd\[25270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=t2977.greatnet.de
Mar  8 02:22:16 hanapaa sshd\[25270\]: Failed password for invalid user es from 178.254.55.25 port 56132 ssh2
Mar  8 02:29:21 hanapaa sshd\[26043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=t2977.greatnet.de  user=root
Mar  8 02:29:23 hanapaa sshd\[26043\]: Failed password for root from 178.254.55.25 port 51852 ssh2
2020-03-08 20:29:55
190.230.72.185 attackspam
Honeypot attack, port: 5555, PTR: host185.190-230-72.telecom.net.ar.
2020-03-08 20:15:32
159.65.147.107 attackbotsspam
159.65.147.107 - - \[08/Mar/2020:13:06:51 +0100\] "POST /wp-login.php HTTP/1.1" 200 6148 "-" "-"
2020-03-08 20:18:59
52.170.206.139 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-08 20:19:33
116.196.109.72 attackspambots
Mar  8 10:09:00 amit sshd\[18114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.109.72  user=root
Mar  8 10:09:02 amit sshd\[18114\]: Failed password for root from 116.196.109.72 port 35416 ssh2
Mar  8 10:15:52 amit sshd\[4945\]: Invalid user arul from 116.196.109.72
Mar  8 10:15:52 amit sshd\[4945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.109.72
...
2020-03-08 20:11:16
115.75.103.27 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 20:15:08
211.38.111.211 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-08 20:23:51

最近上报的IP列表

32.178.180.242 206.228.95.81 51.6.160.103 23.30.77.113
75.188.111.226 82.245.250.7 67.218.36.153 97.91.196.165
132.170.14.190 206.131.75.179 123.144.53.8 114.228.214.78
68.120.139.235 189.187.110.149 129.230.188.59 40.118.154.70
75.6.156.215 193.170.216.203 58.100.246.163 101.243.90.247