必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.139.105.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;247.139.105.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:21:57 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 2.105.139.247.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.105.139.247.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.229.168.146 attackspam
Malicious Traffic/Form Submission
2019-07-08 01:43:19
150.95.52.71 attackspam
45 attempts against mh-misbehave-ban on beach.magehost.pro
2019-07-08 02:04:56
187.189.63.198 attack
Jul  7 18:17:46 srv-4 sshd\[24347\]: Invalid user nginx from 187.189.63.198
Jul  7 18:17:46 srv-4 sshd\[24347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.63.198
Jul  7 18:17:49 srv-4 sshd\[24347\]: Failed password for invalid user nginx from 187.189.63.198 port 39248 ssh2
...
2019-07-08 01:51:32
5.196.75.178 attackbots
Jul  7 17:47:58 mail sshd[22808]: Invalid user pa from 5.196.75.178
Jul  7 17:47:58 mail sshd[22808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.178
Jul  7 17:47:58 mail sshd[22808]: Invalid user pa from 5.196.75.178
Jul  7 17:48:00 mail sshd[22808]: Failed password for invalid user pa from 5.196.75.178 port 60282 ssh2
Jul  7 17:52:37 mail sshd[23475]: Invalid user servidor1 from 5.196.75.178
...
2019-07-08 02:15:01
178.62.239.249 attackbots
Jul  7 15:33:51 ns37 sshd[22654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.239.249
Jul  7 15:33:53 ns37 sshd[22654]: Failed password for invalid user juan from 178.62.239.249 port 41428 ssh2
Jul  7 15:38:16 ns37 sshd[22881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.239.249
2019-07-08 01:54:49
115.207.107.108 attackbots
Banned for posting to wp-login.php without referer {"wp-submit":"Log In","redirect_to":"http:\/\/alfredturner.com\/wp-admin\/","pwd":"alfredturner1","log":"alfredturner","testcookie":"1"}
2019-07-08 02:10:16
140.143.196.66 attackspam
Jul  7 15:59:19 core01 sshd\[9255\]: Invalid user admin from 140.143.196.66 port 52070
Jul  7 15:59:19 core01 sshd\[9255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.66
...
2019-07-08 02:07:58
46.33.225.84 attackspambots
Jul  7 17:59:13 lnxweb61 sshd[9560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.33.225.84
Jul  7 17:59:15 lnxweb61 sshd[9560]: Failed password for invalid user test from 46.33.225.84 port 51448 ssh2
Jul  7 18:01:57 lnxweb61 sshd[13278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.33.225.84
2019-07-08 01:54:22
207.46.13.170 attackspambots
Automatic report - Web App Attack
2019-07-08 01:59:24
187.189.109.138 attackbots
2019-07-07T20:37:36.221860enmeeting.mahidol.ac.th sshd\[19444\]: Invalid user wp from 187.189.109.138 port 36430
2019-07-07T20:37:36.236361enmeeting.mahidol.ac.th sshd\[19444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-189-109-138.totalplay.net
2019-07-07T20:37:38.045735enmeeting.mahidol.ac.th sshd\[19444\]: Failed password for invalid user wp from 187.189.109.138 port 36430 ssh2
...
2019-07-08 02:09:37
162.243.4.134 attackspambots
Jul  7 13:37:28 MK-Soft-VM3 sshd\[21140\]: Invalid user keng from 162.243.4.134 port 52922
Jul  7 13:37:28 MK-Soft-VM3 sshd\[21140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.4.134
Jul  7 13:37:29 MK-Soft-VM3 sshd\[21140\]: Failed password for invalid user keng from 162.243.4.134 port 52922 ssh2
...
2019-07-08 02:11:18
206.189.153.178 attackspambots
Jul  7 14:06:09 marvibiene sshd[13781]: Invalid user suser from 206.189.153.178 port 49104
Jul  7 14:06:09 marvibiene sshd[13781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178
Jul  7 14:06:09 marvibiene sshd[13781]: Invalid user suser from 206.189.153.178 port 49104
Jul  7 14:06:11 marvibiene sshd[13781]: Failed password for invalid user suser from 206.189.153.178 port 49104 ssh2
...
2019-07-08 02:14:23
64.9.223.129 attackbotsspam
Jul  7 17:57:16 lnxmail61 sshd[18400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.9.223.129
Jul  7 17:57:16 lnxmail61 sshd[18400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.9.223.129
2019-07-08 01:38:12
216.218.206.79 attack
Unauthorised access (Jul  7) SRC=216.218.206.79 LEN=40 TTL=243 ID=54321 TCP DPT=445 WINDOW=65535 SYN
2019-07-08 02:16:18
50.93.249.242 attackspam
Jul  7 18:01:56 vps647732 sshd[17918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.93.249.242
Jul  7 18:01:58 vps647732 sshd[17918]: Failed password for invalid user cen from 50.93.249.242 port 57093 ssh2
...
2019-07-08 01:47:07

最近上报的IP列表

40.38.147.48 193.10.40.83 107.141.234.41 57.103.68.166
152.238.86.252 2.67.236.206 228.154.243.69 162.172.71.126
58.212.193.209 22.46.197.43 171.37.128.156 171.45.94.77
22.176.104.8 147.21.71.115 235.2.183.70 150.245.176.102
136.147.62.195 45.33.65.170 22.144.74.164 222.227.211.157