必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.134.234.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;241.134.234.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:38:54 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.234.134.241.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.234.134.241.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.124.58.206 attackspam
SSH login attempts.
2020-08-23 03:14:37
220.84.73.190 attack
SSH login attempts.
2020-08-23 02:55:57
103.199.18.109 attackspam
spam (f2b h2)
2020-08-23 03:20:17
65.151.160.89 attack
2020-08-22T17:51:17.857641mail.standpoint.com.ua sshd[16461]: Failed password for root from 65.151.160.89 port 36390 ssh2
2020-08-22T17:55:03.989945mail.standpoint.com.ua sshd[17207]: Invalid user fcs from 65.151.160.89 port 43472
2020-08-22T17:55:03.992500mail.standpoint.com.ua sshd[17207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.160.89
2020-08-22T17:55:03.989945mail.standpoint.com.ua sshd[17207]: Invalid user fcs from 65.151.160.89 port 43472
2020-08-22T17:55:06.812959mail.standpoint.com.ua sshd[17207]: Failed password for invalid user fcs from 65.151.160.89 port 43472 ssh2
...
2020-08-23 03:08:25
222.186.42.137 attack
Aug 22 19:01:23 scw-6657dc sshd[19337]: Failed password for root from 222.186.42.137 port 64842 ssh2
Aug 22 19:01:23 scw-6657dc sshd[19337]: Failed password for root from 222.186.42.137 port 64842 ssh2
Aug 22 19:01:25 scw-6657dc sshd[19337]: Failed password for root from 222.186.42.137 port 64842 ssh2
...
2020-08-23 03:02:04
219.78.43.77 attackspam
SSH login attempts.
2020-08-23 03:18:23
134.209.96.131 attackspam
Aug 22 17:12:35 ip40 sshd[8995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.96.131 
Aug 22 17:12:37 ip40 sshd[8995]: Failed password for invalid user apps from 134.209.96.131 port 53754 ssh2
...
2020-08-23 02:57:36
187.141.128.42 attack
2020-08-22T13:10:55.410485linuxbox-skyline sshd[57556]: Invalid user maven from 187.141.128.42 port 51402
...
2020-08-23 03:15:23
118.117.89.212 attack
(smtpauth) Failed SMTP AUTH login from 118.117.89.212 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-22 16:39:45 login authenticator failed for (LkOzTLKe) [118.117.89.212]: 535 Incorrect authentication data (set_id=chenting)
2020-08-23 02:46:43
118.25.195.78 attackbots
Aug 22 16:28:00 scw-6657dc sshd[14295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.78
Aug 22 16:28:00 scw-6657dc sshd[14295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.78
Aug 22 16:28:02 scw-6657dc sshd[14295]: Failed password for invalid user deploy from 118.25.195.78 port 37194 ssh2
...
2020-08-23 03:16:26
191.193.206.49 attack
Aug 21 00:22:16 our-server-hostname sshd[26336]: reveeclipse mapping checking getaddrinfo for 191-193-206-49.user.vivozap.com.br [191.193.206.49] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 21 00:22:16 our-server-hostname sshd[26336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.206.49  user=r.r
Aug 21 00:22:18 our-server-hostname sshd[26336]: Failed password for r.r from 191.193.206.49 port 55504 ssh2
Aug 21 00:31:58 our-server-hostname sshd[28066]: reveeclipse mapping checking getaddrinfo for 191-193-206-49.user.vivozap.com.br [191.193.206.49] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 21 00:31:58 our-server-hostname sshd[28066]: Invalid user abc123 from 191.193.206.49
Aug 21 00:31:58 our-server-hostname sshd[28066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.206.49 
Aug 21 00:32:00 our-server-hostname sshd[28066]: Failed password for invalid user abc123 from 191.193.206.4........
-------------------------------
2020-08-23 03:19:44
51.38.168.26 attackbotsspam
Invalid user zhangyansen from 51.38.168.26 port 59840
2020-08-23 02:54:33
112.85.42.237 attackbots
Aug 23 00:43:34 dhoomketu sshd[2580805]: Failed password for root from 112.85.42.237 port 12278 ssh2
Aug 23 00:43:29 dhoomketu sshd[2580805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Aug 23 00:43:32 dhoomketu sshd[2580805]: Failed password for root from 112.85.42.237 port 12278 ssh2
Aug 23 00:43:34 dhoomketu sshd[2580805]: Failed password for root from 112.85.42.237 port 12278 ssh2
Aug 23 00:43:37 dhoomketu sshd[2580805]: Failed password for root from 112.85.42.237 port 12278 ssh2
...
2020-08-23 03:19:13
221.122.73.130 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-22T12:44:25Z and 2020-08-22T12:49:39Z
2020-08-23 02:54:55
142.93.240.192 attackspambots
$f2bV_matches
2020-08-23 02:58:53

最近上报的IP列表

180.124.4.244 191.173.126.12 58.115.206.123 227.102.43.138
41.184.131.178 181.16.165.17 39.125.211.36 251.15.92.255
77.183.180.133 43.207.212.56 59.74.147.150 176.123.66.91
178.171.108.79 60.105.124.92 253.14.25.191 19.65.254.93
196.125.240.28 164.116.95.225 84.250.252.204 56.239.71.109