必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Multicast Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.142.127.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.142.127.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 09:38:58 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 56.127.142.239.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.127.142.239.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.22.45.49 attackbotsspam
10/26/2019-19:31:04.310594 81.22.45.49 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 08:16:38
31.184.215.240 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 17 - port: 6666 proto: TCP cat: Misc Attack
2019-10-27 08:21:23
77.247.108.77 attack
10/27/2019-00:29:07.081399 77.247.108.77 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 74
2019-10-27 08:18:29
59.56.74.165 attackspam
Oct 27 04:54:19 meumeu sshd[9745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165 
Oct 27 04:54:21 meumeu sshd[9745]: Failed password for invalid user elsje from 59.56.74.165 port 44410 ssh2
Oct 27 04:59:18 meumeu sshd[10669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165 
...
2019-10-27 12:01:14
88.254.111.116 attack
Automatic report - Banned IP Access
2019-10-27 08:24:02
83.16.200.171 attackbotsspam
SSH brutforce
2019-10-27 08:25:38
114.67.80.161 attack
Oct 27 05:54:43 site3 sshd\[23505\]: Invalid user nw from 114.67.80.161
Oct 27 05:54:43 site3 sshd\[23505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
Oct 27 05:54:45 site3 sshd\[23505\]: Failed password for invalid user nw from 114.67.80.161 port 34764 ssh2
Oct 27 05:58:46 site3 sshd\[23578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161  user=root
Oct 27 05:58:48 site3 sshd\[23578\]: Failed password for root from 114.67.80.161 port 52363 ssh2
...
2019-10-27 12:10:32
222.186.173.142 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Failed password for root from 222.186.173.142 port 7054 ssh2
Failed password for root from 222.186.173.142 port 7054 ssh2
Failed password for root from 222.186.173.142 port 7054 ssh2
Failed password for root from 222.186.173.142 port 7054 ssh2
2019-10-27 12:22:33
129.211.62.131 attackbotsspam
Oct 27 04:52:02 vtv3 sshd\[6501\]: Invalid user ftpuser from 129.211.62.131 port 54046
Oct 27 04:52:02 vtv3 sshd\[6501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.131
Oct 27 04:52:04 vtv3 sshd\[6501\]: Failed password for invalid user ftpuser from 129.211.62.131 port 54046 ssh2
Oct 27 04:56:17 vtv3 sshd\[8597\]: Invalid user cong from 129.211.62.131 port 28683
Oct 27 04:56:17 vtv3 sshd\[8597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.131
Oct 27 05:06:46 vtv3 sshd\[13591\]: Invalid user bismark from 129.211.62.131 port 42068
Oct 27 05:06:46 vtv3 sshd\[13591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.131
Oct 27 05:06:48 vtv3 sshd\[13591\]: Failed password for invalid user bismark from 129.211.62.131 port 42068 ssh2
Oct 27 05:11:10 vtv3 sshd\[15862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ru
2019-10-27 12:18:43
79.143.28.113 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 73 - port: 65383 proto: TCP cat: Misc Attack
2019-10-27 08:18:01
83.249.145.81 attackspambots
Invalid user admin from 83.249.145.81 port 59688
2019-10-27 08:24:33
80.82.70.239 attackbotsspam
10/26/2019-18:33:42.668693 80.82.70.239 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 08:17:43
49.232.35.211 attack
Oct 27 05:58:46 www5 sshd\[24879\]: Invalid user giacomini from 49.232.35.211
Oct 27 05:58:46 www5 sshd\[24879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.35.211
Oct 27 05:58:49 www5 sshd\[24879\]: Failed password for invalid user giacomini from 49.232.35.211 port 57540 ssh2
...
2019-10-27 12:11:03
193.32.160.155 attackbotsspam
Oct 26 22:25:48 relay postfix/smtpd\[7054\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.155\]: 554 5.7.1 \: Relay access denied\; from=\<5frlmehmqajjz@binet.su\> to=\ proto=ESMTP helo=\<\[193.32.160.150\]\>
Oct 26 22:25:48 relay postfix/smtpd\[7054\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.155\]: 554 5.7.1 \: Relay access denied\; from=\<5frlmehmqajjz@binet.su\> to=\ proto=ESMTP helo=\<\[193.32.160.150\]\>
Oct 26 22:25:48 relay postfix/smtpd\[7054\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.155\]: 554 5.7.1 \: Relay access denied\; from=\<5frlmehmqajjz@binet.su\> to=\ proto=ESMTP helo=\<\[193.32.160.150\]\>
Oct 26 22:25:48 relay postfix/smtpd\[7054\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.155\]: 554 5.7.1 \: Relay access 
...
2019-10-27 08:26:02
51.89.17.205 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 41 - port: 6080 proto: UDP cat: Misc Attack
2019-10-27 08:20:12

最近上报的IP列表

47.172.188.255 13.217.29.232 116.201.107.189 133.223.127.66
205.204.157.81 7.147.58.215 63.146.181.201 227.20.27.28
101.101.216.85 192.123.195.234 151.81.58.162 17.244.184.221
205.222.120.174 121.3.187.247 176.6.177.27 156.5.233.38
166.5.52.80 116.239.118.37 235.39.152.19 250.20.30.160