必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Multicast Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.73.2.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;234.73.2.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:01:01 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 139.2.73.234.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.2.73.234.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.221 attack
Repeated brute force against a port
2020-08-20 21:34:30
103.230.241.16 attackspam
Aug 20 13:02:10 vps-51d81928 sshd[770742]: Invalid user ydy from 103.230.241.16 port 38690
Aug 20 13:02:10 vps-51d81928 sshd[770742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.230.241.16 
Aug 20 13:02:10 vps-51d81928 sshd[770742]: Invalid user ydy from 103.230.241.16 port 38690
Aug 20 13:02:13 vps-51d81928 sshd[770742]: Failed password for invalid user ydy from 103.230.241.16 port 38690 ssh2
Aug 20 13:03:34 vps-51d81928 sshd[770791]: Invalid user yjy from 103.230.241.16 port 60344
...
2020-08-20 21:19:37
170.210.214.50 attackbotsspam
20 attempts against mh-ssh on cloud
2020-08-20 21:49:40
112.85.42.89 attackspambots
Aug 20 15:36:43 PorscheCustomer sshd[21394]: Failed password for root from 112.85.42.89 port 63932 ssh2
Aug 20 15:36:45 PorscheCustomer sshd[21394]: Failed password for root from 112.85.42.89 port 63932 ssh2
Aug 20 15:36:47 PorscheCustomer sshd[21394]: Failed password for root from 112.85.42.89 port 63932 ssh2
...
2020-08-20 21:45:59
138.121.128.19 attackspam
Aug 20 12:07:00 scw-6657dc sshd[7596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Aug 20 12:07:00 scw-6657dc sshd[7596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Aug 20 12:07:02 scw-6657dc sshd[7596]: Failed password for root from 138.121.128.19 port 34650 ssh2
...
2020-08-20 21:41:38
167.114.227.94 attackspam
Automatic report - Banned IP Access
2020-08-20 21:45:24
117.211.70.70 attack
117.211.70.70 - [20/Aug/2020:16:22:56 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
117.211.70.70 - [20/Aug/2020:16:24:34 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-20 21:26:17
72.44.74.96 attackspam
Aug 19 12:50:53 kmh-wmh-003-nbg03 sshd[23831]: Invalid user ghostname from 72.44.74.96 port 45230
Aug 19 12:50:53 kmh-wmh-003-nbg03 sshd[23831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.44.74.96
Aug 19 12:50:56 kmh-wmh-003-nbg03 sshd[23831]: Failed password for invalid user ghostname from 72.44.74.96 port 45230 ssh2
Aug 19 12:50:56 kmh-wmh-003-nbg03 sshd[23831]: Received disconnect from 72.44.74.96 port 45230:11: Bye Bye [preauth]
Aug 19 12:50:56 kmh-wmh-003-nbg03 sshd[23831]: Disconnected from 72.44.74.96 port 45230 [preauth]
Aug 19 12:55:36 kmh-wmh-003-nbg03 sshd[24336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.44.74.96  user=r.r
Aug 19 12:55:39 kmh-wmh-003-nbg03 sshd[24336]: Failed password for r.r from 72.44.74.96 port 40184 ssh2
Aug 19 12:55:39 kmh-wmh-003-nbg03 sshd[24336]: Received disconnect from 72.44.74.96 port 40184:11: Bye Bye [preauth]
Aug 19 12:55:39 kmh-wmh........
-------------------------------
2020-08-20 21:07:57
45.129.33.9 attackbotsspam
 TCP (SYN) 45.129.33.9:53032 -> port 11832, len 44
2020-08-20 21:12:16
94.181.182.1 attack
Automatic report - Port Scan Attack
2020-08-20 21:08:36
173.212.207.88 attackspambots
Aug 19 13:32:52 venus sshd[3149]: Invalid user suser from 173.212.207.88
Aug 19 13:32:52 venus sshd[3149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.207.88 
Aug 19 13:32:53 venus sshd[3149]: Failed password for invalid user suser from 173.212.207.88 port 37920 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=173.212.207.88
2020-08-20 21:15:41
14.227.135.2 attackspambots
Port scan on 1 port(s): 445
2020-08-20 21:50:41
41.36.102.106 attackbots
Unauthorised access (Aug 20) SRC=41.36.102.106 LEN=52 TTL=116 ID=22019 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-20 21:43:32
193.112.100.92 attackspam
2020-08-20T07:31:19.717866linuxbox-skyline sshd[17138]: Invalid user vector from 193.112.100.92 port 41120
...
2020-08-20 21:41:17
94.176.205.124 attackspambots
(Aug 20)  LEN=40 TTL=243 ID=40900 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 20)  LEN=40 TTL=243 ID=46167 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 20)  LEN=40 TTL=243 ID=12774 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 20)  LEN=40 TTL=243 ID=14021 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 20)  LEN=40 TTL=243 ID=27039 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 20)  LEN=40 TTL=243 ID=11720 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 20)  LEN=40 TTL=243 ID=20328 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 19)  LEN=40 TTL=243 ID=21924 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 19)  LEN=40 TTL=243 ID=144 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 19)  LEN=40 TTL=243 ID=28398 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 19)  LEN=40 TTL=243 ID=47514 DF TCP DPT=23 WINDOW=14600 SYN
2020-08-20 21:46:16

最近上报的IP列表

203.224.168.140 161.102.39.184 74.34.162.217 152.129.193.117
221.9.155.81 230.31.34.150 187.118.121.197 35.29.196.85
126.91.187.155 224.247.171.220 128.76.95.245 17.247.178.191
200.245.237.77 134.233.18.160 94.35.51.10 52.140.132.19
85.208.187.129 226.141.181.2 232.59.41.113 220.230.102.239