必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.139.84.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;247.139.84.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 21:08:21 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 168.84.139.247.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.84.139.247.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
144.217.42.212 attackbots
Jul 13 15:30:49 localhost sshd[10845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212 
Jul 13 15:30:51 localhost sshd[10845]: Failed password for invalid user rabbitmq from 144.217.42.212 port 52735 ssh2
Jul 13 15:38:22 localhost sshd[32080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212 
Jul 13 15:38:24 localhost sshd[32080]: Failed password for invalid user anu from 144.217.42.212 port 41122 ssh2
...
2019-07-14 04:51:26
188.166.72.240 attackspam
Jul 13 16:15:03 XXXXXX sshd[55140]: Invalid user monique from 188.166.72.240 port 39202
2019-07-14 04:57:03
81.22.45.252 attackbots
Jul 13 22:36:22 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.252 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3223 PROTO=TCP SPT=52331 DPT=34343 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-14 04:54:42
3.84.199.9 attack
Jul 13 15:08:50   TCP Attack: SRC=3.84.199.9 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=235  DF PROTO=TCP SPT=33240 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-07-14 05:18:16
167.71.173.63 attackbots
Unauthorised access (Jul 13) SRC=167.71.173.63 LEN=40 TTL=56 ID=27795 TCP DPT=23 WINDOW=31831 SYN 
Unauthorised access (Jul 11) SRC=167.71.173.63 LEN=40 TTL=56 ID=38082 TCP DPT=23 WINDOW=35588 SYN
2019-07-14 05:27:51
179.180.92.245 attackbots
60001/tcp 60001/tcp
[2019-07-13]2pkt
2019-07-14 05:03:01
218.92.0.148 attackbotsspam
Jul 13 20:33:50 unicornsoft sshd\[2448\]: User root from 218.92.0.148 not allowed because not listed in AllowUsers
Jul 13 20:33:51 unicornsoft sshd\[2448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Jul 13 20:33:52 unicornsoft sshd\[2448\]: Failed password for invalid user root from 218.92.0.148 port 17793 ssh2
2019-07-14 05:05:42
93.102.5.187 attack
Lines containing failures of 93.102.5.187
Jul 12 15:52:00 mellenthin postfix/smtpd[29805]: connect from 93.102.5.187.rev.optimus.pt[93.102.5.187]
Jul x@x
Jul 12 15:52:03 mellenthin postfix/smtpd[29805]: lost connection after DATA from 93.102.5.187.rev.optimus.pt[93.102.5.187]
Jul 12 15:52:03 mellenthin postfix/smtpd[29805]: disconnect from 93.102.5.187.rev.optimus.pt[93.102.5.187] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jul 13 16:54:21 mellenthin postfix/smtpd[5323]: connect from 93.102.5.187.rev.optimus.pt[93.102.5.187]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.102.5.187
2019-07-14 05:24:09
39.33.138.40 attackbotsspam
Lines containing failures of 39.33.138.40
Jul 13 16:53:45 mellenthin postfix/smtpd[7337]: connect from unknown[39.33.138.40]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.33.138.40
2019-07-14 05:12:15
125.111.153.45 attackbotsspam
Automatic report - Port Scan Attack
2019-07-14 05:25:42
196.27.127.61 attackbots
Jul 13 22:12:06 vpn01 sshd\[11872\]: Invalid user test from 196.27.127.61
Jul 13 22:12:06 vpn01 sshd\[11872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61
Jul 13 22:12:08 vpn01 sshd\[11872\]: Failed password for invalid user test from 196.27.127.61 port 59820 ssh2
2019-07-14 04:46:18
114.40.116.116 attackspam
Automatic report - Port Scan Attack
2019-07-14 04:49:07
104.245.153.82 attackbotsspam
$f2bV_matches
2019-07-14 05:04:05
104.236.175.127 attackbotsspam
Jul 13 22:45:31 *** sshd[11931]: Failed password for invalid user cactiuser from 104.236.175.127 port 58948 ssh2
Jul 13 22:55:45 *** sshd[11997]: Failed password for invalid user gitolite3 from 104.236.175.127 port 38820 ssh2
Jul 13 23:01:01 *** sshd[12062]: Failed password for invalid user mt from 104.236.175.127 port 40410 ssh2
Jul 13 23:06:00 *** sshd[12150]: Failed password for invalid user elk from 104.236.175.127 port 42004 ssh2
Jul 13 23:11:12 *** sshd[12248]: Failed password for invalid user marwan from 104.236.175.127 port 43596 ssh2
Jul 13 23:16:23 *** sshd[12280]: Failed password for invalid user oracle from 104.236.175.127 port 45192 ssh2
Jul 13 23:21:24 *** sshd[12344]: Failed password for invalid user admin from 104.236.175.127 port 46782 ssh2
Jul 13 23:26:38 *** sshd[12437]: Failed password for invalid user elasticsearch from 104.236.175.127 port 48384 ssh2
Jul 13 23:31:48 *** sshd[12479]: Failed password for invalid user admin from 104.236.175.127 port 49974 ssh2
Jul 13 23:36:49 *** sshd[12558
2019-07-14 05:23:37
185.159.32.4 attack
2019-07-13T22:43:04.229475  sshd[22993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.159.32.4  user=root
2019-07-13T22:43:06.609643  sshd[22993]: Failed password for root from 185.159.32.4 port 38090 ssh2
2019-07-13T22:47:57.436586  sshd[23056]: Invalid user demo from 185.159.32.4 port 40368
2019-07-13T22:47:57.446057  sshd[23056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.159.32.4
2019-07-13T22:47:57.436586  sshd[23056]: Invalid user demo from 185.159.32.4 port 40368
2019-07-13T22:47:59.048689  sshd[23056]: Failed password for invalid user demo from 185.159.32.4 port 40368 ssh2
...
2019-07-14 05:08:17

最近上报的IP列表

84.61.91.73 149.196.63.158 114.18.195.67 210.109.191.58
132.68.185.225 16.229.167.108 248.154.11.109 22.201.13.183
79.196.70.77 20.109.13.243 209.57.35.90 214.119.236.205
122.223.66.35 251.95.199.179 36.110.245.196 121.91.28.9
188.160.112.224 107.209.171.119 239.64.126.224 45.132.68.98