必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.146.135.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57856
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.146.135.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:17:00 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.135.146.219.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.135.146.219.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.211.78.132 attackspambots
Dec 20 13:41:36 eddieflores sshd\[20546\]: Invalid user yazdani from 80.211.78.132
Dec 20 13:41:36 eddieflores sshd\[20546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.132
Dec 20 13:41:37 eddieflores sshd\[20546\]: Failed password for invalid user yazdani from 80.211.78.132 port 45934 ssh2
Dec 20 13:46:05 eddieflores sshd\[20936\]: Invalid user muay from 80.211.78.132
Dec 20 13:46:05 eddieflores sshd\[20936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.132
2019-12-21 08:14:21
104.248.90.77 attack
Dec 21 00:45:55 ArkNodeAT sshd\[3188\]: Invalid user oasys from 104.248.90.77
Dec 21 00:45:55 ArkNodeAT sshd\[3188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.90.77
Dec 21 00:45:57 ArkNodeAT sshd\[3188\]: Failed password for invalid user oasys from 104.248.90.77 port 33310 ssh2
2019-12-21 08:22:08
188.19.119.4 attackbots
1576885579 - 12/21/2019 00:46:19 Host: 188.19.119.4/188.19.119.4 Port: 445 TCP Blocked
2019-12-21 07:57:11
138.68.243.208 attackspambots
SSH brute-force: detected 26 distinct usernames within a 24-hour window.
2019-12-21 08:16:43
190.72.180.235 attackbots
Unauthorized connection attempt from IP address 190.72.180.235 on Port 445(SMB)
2019-12-21 08:25:31
202.70.89.55 attack
Dec 21 00:39:58 eventyay sshd[13036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.70.89.55
Dec 21 00:40:00 eventyay sshd[13036]: Failed password for invalid user lightdm from 202.70.89.55 port 34838 ssh2
Dec 21 00:46:31 eventyay sshd[13350]: Failed password for root from 202.70.89.55 port 45816 ssh2
...
2019-12-21 07:59:15
114.98.225.210 attack
Dec 21 01:00:34 root sshd[11611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.225.210 
Dec 21 01:00:35 root sshd[11611]: Failed password for invalid user wernher from 114.98.225.210 port 35768 ssh2
Dec 21 01:06:35 root sshd[11707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.225.210 
...
2019-12-21 08:10:50
140.246.124.36 attackspambots
Dec 20 19:01:11 TORMINT sshd\[15369\]: Invalid user reynard from 140.246.124.36
Dec 20 19:01:11 TORMINT sshd\[15369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.124.36
Dec 20 19:01:13 TORMINT sshd\[15369\]: Failed password for invalid user reynard from 140.246.124.36 port 59834 ssh2
...
2019-12-21 08:02:31
34.219.36.191 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-12-21 08:25:45
119.29.65.240 attackbotsspam
2019-12-21T00:46:01.653440stark.klein-stark.info sshd\[21887\]: Invalid user guest from 119.29.65.240 port 59872
2019-12-21T00:46:01.660540stark.klein-stark.info sshd\[21887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.65.240
2019-12-21T00:46:03.755544stark.klein-stark.info sshd\[21887\]: Failed password for invalid user guest from 119.29.65.240 port 59872 ssh2
...
2019-12-21 08:13:56
103.129.222.135 attackbots
Dec 21 00:41:37 vtv3 sshd[16414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135 
Dec 21 00:41:39 vtv3 sshd[16414]: Failed password for invalid user mysql from 103.129.222.135 port 48084 ssh2
Dec 21 00:50:17 vtv3 sshd[20641]: Failed password for root from 103.129.222.135 port 36673 ssh2
Dec 21 01:02:46 vtv3 sshd[26325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135 
Dec 21 01:02:47 vtv3 sshd[26325]: Failed password for invalid user yonghwan from 103.129.222.135 port 44136 ssh2
Dec 21 01:09:14 vtv3 sshd[29364]: Failed password for games from 103.129.222.135 port 47927 ssh2
Dec 21 01:21:53 vtv3 sshd[3204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135 
Dec 21 01:21:55 vtv3 sshd[3204]: Failed password for invalid user audny from 103.129.222.135 port 55503 ssh2
Dec 21 01:28:16 vtv3 sshd[5980]: pam_unix(sshd:auth): authentication failure; logna
2019-12-21 08:29:09
220.180.149.110 attack
1576886006 - 12/21/2019 00:53:26 Host: 220.180.149.110/220.180.149.110 Port: 445 TCP Blocked
2019-12-21 08:12:34
164.132.110.223 attackspambots
Dec 21 00:00:19 web8 sshd\[22941\]: Invalid user webmaster from 164.132.110.223
Dec 21 00:00:19 web8 sshd\[22941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.223
Dec 21 00:00:22 web8 sshd\[22941\]: Failed password for invalid user webmaster from 164.132.110.223 port 44228 ssh2
Dec 21 00:05:07 web8 sshd\[25197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.223  user=root
Dec 21 00:05:09 web8 sshd\[25197\]: Failed password for root from 164.132.110.223 port 47051 ssh2
2019-12-21 08:05:32
179.189.236.78 attackspambots
Unauthorized connection attempt from IP address 179.189.236.78 on Port 445(SMB)
2019-12-21 08:10:29
54.39.107.119 attackspambots
Invalid user amaude from 54.39.107.119 port 52950
2019-12-21 08:09:37

最近上报的IP列表

2.194.76.125 47.232.116.217 5.45.246.174 127.146.150.223
26.73.117.198 196.249.155.193 85.60.128.180 47.31.229.73
175.93.200.202 199.98.188.212 252.198.250.46 70.40.224.160
22.9.71.23 132.82.103.178 181.104.105.69 228.116.175.27
117.20.145.18 193.141.163.71 193.243.40.4 56.118.115.53