必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.81.139.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;24.81.139.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 13:40:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
12.139.81.24.in-addr.arpa domain name pointer S01060011d83e4347.vc.shawcable.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.139.81.24.in-addr.arpa	name = S01060011d83e4347.vc.shawcable.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.148.6.36 attack
Icarus honeypot on github
2020-09-03 04:33:57
193.169.253.128 attack
Too many connections or unauthorized access detected from Yankee banned ip
2020-09-03 04:09:41
104.198.172.68 attack
104.198.172.68 - - [02/Sep/2020:19:05:48 +0200] "POST /xmlrpc.php HTTP/1.1" 403 21242 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.198.172.68 - - [02/Sep/2020:19:33:35 +0200] "POST /xmlrpc.php HTTP/1.1" 403 21243 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-03 04:42:00
178.122.11.116 attack
 TCP (SYN) 178.122.11.116:41153 -> port 445, len 52
2020-09-03 04:18:41
187.162.61.168 attackbots
Automatic report - Port Scan Attack
2020-09-03 04:16:47
115.146.127.147 attack
115.146.127.147 - - \[02/Sep/2020:18:49:30 +0200\] "POST /wp-login.php HTTP/1.0" 200 8625 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
115.146.127.147 - - \[02/Sep/2020:18:49:33 +0200\] "POST /wp-login.php HTTP/1.0" 200 8409 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
115.146.127.147 - - \[02/Sep/2020:18:49:35 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-09-03 04:40:34
61.155.209.51 attackspam
 TCP (SYN) 61.155.209.51:51777 -> port 30996, len 44
2020-09-03 04:24:58
45.236.105.5 attack
45 x 45.236.105.5 in under a minute on port 23
2020-09-03 04:08:38
41.76.8.16 attackspambots
Sep  2 21:48:19 host postfix/smtpd[20826]: warning: unknown[41.76.8.16]: SASL LOGIN authentication failed: authentication failure
Sep  2 21:48:20 host postfix/smtpd[20826]: warning: unknown[41.76.8.16]: SASL LOGIN authentication failed: authentication failure
...
2020-09-03 04:44:06
42.123.99.67 attackspambots
Port scan: Attack repeated for 24 hours
2020-09-03 04:07:35
68.183.178.111 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 58 - port: 3196 proto: tcp cat: Misc Attackbytes: 60
2020-09-03 04:29:45
49.235.193.207 attackspambots
SSH Brute-Force attacks
2020-09-03 04:06:26
188.75.16.163 attackspambots
 TCP (SYN) 188.75.16.163:50554 -> port 445, len 40
2020-09-03 04:12:05
64.188.3.210 attackspambots
Fail2Ban Ban Triggered
2020-09-03 04:26:42
222.186.175.216 attackspam
Sep  2 21:05:51 ajax sshd[10334]: Failed password for root from 222.186.175.216 port 13058 ssh2
Sep  2 21:05:56 ajax sshd[10334]: Failed password for root from 222.186.175.216 port 13058 ssh2
2020-09-03 04:06:40

最近上报的IP列表

139.92.28.195 189.131.16.184 8.134.243.119 55.139.133.20
96.200.27.52 5.240.64.21 219.208.207.73 220.112.21.239
239.19.203.39 201.182.225.21 152.237.102.178 93.212.147.175
92.144.46.220 32.31.247.222 175.197.49.115 118.144.227.53
170.187.125.209 180.77.142.47 150.158.153.53 20.142.160.241