必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santa Isabel

省份(region): unknown

国家(country): Puerto Rico

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.139.122.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;24.139.122.104.			IN	A

;; AUTHORITY SECTION:
.			151	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102501 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 26 02:30:22 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 104.122.139.24.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 104.122.139.24.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.149.89.84 attackspambots
$f2bV_matches
2020-05-12 00:29:38
165.22.215.163 attack
Lines containing failures of 165.22.215.163
May 11 13:19:42 *** sshd[116967]: Invalid user api from 165.22.215.163 port 53050
May 11 13:19:42 *** sshd[116967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.215.163
May 11 13:19:45 *** sshd[116967]: Failed password for invalid user api from 165.22.215.163 port 53050 ssh2
May 11 13:19:45 *** sshd[116967]: Received disconnect from 165.22.215.163 port 53050:11: Bye Bye [preauth]
May 11 13:19:45 *** sshd[116967]: Disconnected from invalid user api 165.22.215.163 port 53050 [preauth]
May 11 13:24:52 *** sshd[117471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.215.163  user=r.r
May 11 13:24:55 *** sshd[117471]: Failed password for r.r from 165.22.215.163 port 57420 ssh2
May 11 13:24:55 *** sshd[117471]: Received disconnect from 165.22.215.163 port 57420:11: Bye Bye [preauth]
May 11 13:24:55 *** sshd[117471]: Disconnected from aut........
------------------------------
2020-05-12 00:25:23
198.211.101.147 attackspambots
2020-05-11T13:15:49.310081shield sshd\[7494\]: Invalid user geert from 198.211.101.147 port 51242
2020-05-11T13:15:49.313902shield sshd\[7494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.101.147
2020-05-11T13:15:51.253858shield sshd\[7494\]: Failed password for invalid user geert from 198.211.101.147 port 51242 ssh2
2020-05-11T13:19:23.640344shield sshd\[8382\]: Invalid user postgres from 198.211.101.147 port 60036
2020-05-11T13:19:23.643878shield sshd\[8382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.101.147
2020-05-12 00:09:34
51.75.66.142 attack
May 11 10:35:01 NPSTNNYC01T sshd[2521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
May 11 10:35:03 NPSTNNYC01T sshd[2521]: Failed password for invalid user cola from 51.75.66.142 port 51730 ssh2
May 11 10:38:57 NPSTNNYC01T sshd[2923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
...
2020-05-12 00:14:27
181.129.182.3 attackbots
May 11 17:50:26 santamaria sshd\[6243\]: Invalid user teampspeak from 181.129.182.3
May 11 17:50:26 santamaria sshd\[6243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.182.3
May 11 17:50:27 santamaria sshd\[6243\]: Failed password for invalid user teampspeak from 181.129.182.3 port 38600 ssh2
...
2020-05-12 00:24:59
144.217.86.183 attackbots
May 11 20:55:26 gw1 sshd[30559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.86.183
May 11 20:55:28 gw1 sshd[30559]: Failed password for invalid user line1 from 144.217.86.183 port 39946 ssh2
...
2020-05-12 00:27:10
152.136.142.30 attackspam
$f2bV_matches
2020-05-12 00:04:27
134.175.32.95 attackspam
May 11 15:10:30 OPSO sshd\[8320\]: Invalid user aaaaaa from 134.175.32.95 port 59010
May 11 15:10:30 OPSO sshd\[8320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.32.95
May 11 15:10:32 OPSO sshd\[8320\]: Failed password for invalid user aaaaaa from 134.175.32.95 port 59010 ssh2
May 11 15:15:41 OPSO sshd\[9038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.32.95  user=admin
May 11 15:15:43 OPSO sshd\[9038\]: Failed password for admin from 134.175.32.95 port 37772 ssh2
2020-05-11 23:52:18
91.202.230.152 attackspam
20/5/11@08:05:37: FAIL: Alarm-Intrusion address from=91.202.230.152
...
2020-05-12 00:07:03
178.90.155.152 attack
1589198742 - 05/11/2020 14:05:42 Host: 178.90.155.152/178.90.155.152 Port: 445 TCP Blocked
2020-05-11 23:59:53
94.137.39.171 attack
1589198737 - 05/11/2020 14:05:37 Host: 94.137.39.171/94.137.39.171 Port: 445 TCP Blocked
2020-05-12 00:05:15
95.53.192.44 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-05-12 00:32:40
92.118.37.83 attack
Port-scan: detected 131 distinct ports within a 24-hour window.
2020-05-12 00:15:49
87.251.74.165 attack
Excessive Port-Scanning
2020-05-11 23:52:58
134.209.28.70 attackbots
May 11 19:47:07 itv-usvr-01 sshd[21430]: Invalid user art from 134.209.28.70
May 11 19:47:07 itv-usvr-01 sshd[21430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.28.70
May 11 19:47:07 itv-usvr-01 sshd[21430]: Invalid user art from 134.209.28.70
May 11 19:47:09 itv-usvr-01 sshd[21430]: Failed password for invalid user art from 134.209.28.70 port 54654 ssh2
May 11 19:51:49 itv-usvr-01 sshd[21656]: Invalid user majordomo from 134.209.28.70
2020-05-11 23:58:36

最近上报的IP列表

118.69.26.167 122.7.244.16 220.19.147.134 71.200.32.155
3.224.67.86 87.157.190.242 200.1.15.30 84.20.184.27
129.127.63.29 110.215.79.144 71.174.171.90 181.20.79.26
54.78.167.54 223.97.41.63 185.18.4.6 104.218.63.74
58.236.109.5 147.236.119.57 149.159.252.214 84.106.148.167