必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.39.139.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.39.139.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 20:03:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 130.139.39.33.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 33.39.139.130.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.55.210.232 attack
Automatic report - Banned IP Access
2019-07-16 19:04:33
49.86.17.34 attackbots
2019-07-15 20:26:47 H=(Aebk3kmxN) [49.86.17.34]:61404 I=[192.147.25.65]:25 F= rejected RCPT <2507202191@qq.com>: RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/49.86.17.34)
2019-07-15 20:26:51 H=(3DosbZAD) [49.86.17.34]:61444 I=[192.147.25.65]:587 F= rejected RCPT <2507202191@qq.com>: RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/49.86.17.34)
2019-07-15 20:27:24 dovecot_login authenticator failed for (lDeCBcp64a) [49.86.17.34]:63617 I=[192.147.25.65]:587: 535 Incorrect authentication data (set_id=virusalert@lerctr.org)
...
2019-07-16 18:45:31
86.122.123.56 attack
Automatic report - Port Scan Attack
2019-07-16 18:49:01
148.251.244.137 attackbots
20 attempts against mh-misbehave-ban on sea.magehost.pro
2019-07-16 18:43:55
193.9.245.143 attackbotsspam
RDP Bruteforce
2019-07-16 18:34:29
212.237.53.69 attack
Jul 16 04:53:48 OPSO sshd\[29829\]: Invalid user fmaster from 212.237.53.69 port 40210
Jul 16 04:53:48 OPSO sshd\[29829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.69
Jul 16 04:53:50 OPSO sshd\[29829\]: Failed password for invalid user fmaster from 212.237.53.69 port 40210 ssh2
Jul 16 04:58:31 OPSO sshd\[30570\]: Invalid user paul from 212.237.53.69 port 37330
Jul 16 04:58:31 OPSO sshd\[30570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.69
2019-07-16 19:05:44
185.176.27.166 attackbotsspam
16.07.2019 10:54:10 Connection to port 501 blocked by firewall
2019-07-16 18:58:15
169.239.13.41 attackbotsspam
/xmlrpc.php
2019-07-16 18:19:39
96.3.179.228 attackspam
Jul 16 11:24:59 tux-35-217 sshd\[10263\]: Invalid user alex from 96.3.179.228 port 46948
Jul 16 11:24:59 tux-35-217 sshd\[10263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.3.179.228
Jul 16 11:25:02 tux-35-217 sshd\[10263\]: Failed password for invalid user alex from 96.3.179.228 port 46948 ssh2
Jul 16 11:30:02 tux-35-217 sshd\[10298\]: Invalid user greta from 96.3.179.228 port 45292
Jul 16 11:30:02 tux-35-217 sshd\[10298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.3.179.228
...
2019-07-16 18:22:31
81.241.157.172 attackbotsspam
...
2019-07-16 18:18:40
107.170.76.170 attack
Jul 16 09:41:16 MK-Soft-VM3 sshd\[2490\]: Invalid user donna from 107.170.76.170 port 59309
Jul 16 09:41:16 MK-Soft-VM3 sshd\[2490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.76.170
Jul 16 09:41:18 MK-Soft-VM3 sshd\[2490\]: Failed password for invalid user donna from 107.170.76.170 port 59309 ssh2
...
2019-07-16 18:56:12
66.7.148.40 attackbotsspam
Jul 16 06:32:22 web1 postfix/smtpd[11816]: warning: Dell860-544.rapidns.com[66.7.148.40]: SASL LOGIN authentication failed: authentication failure
...
2019-07-16 18:53:54
159.89.202.20 attackspambots
Jul 14 21:33:39 wp sshd[17850]: Did not receive identification string from 159.89.202.20
Jul 14 21:34:55 wp sshd[17869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.202.20  user=r.r
Jul 14 21:34:57 wp sshd[17869]: Failed password for r.r from 159.89.202.20 port 54484 ssh2
Jul 14 21:34:57 wp sshd[17869]: Received disconnect from 159.89.202.20: 11: Bye Bye [preauth]
Jul 14 21:36:54 wp sshd[17905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.202.20  user=r.r
Jul 14 21:36:56 wp sshd[17905]: Failed password for r.r from 159.89.202.20 port 45134 ssh2
Jul 14 21:36:56 wp sshd[17905]: Received disconnect from 159.89.202.20: 11: Bye Bye [preauth]
Jul 14 21:41:44 wp sshd[17985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.202.20  user=r.r
Jul 14 21:41:46 wp sshd[17985]: Failed password for r.r from 159.89.202.20 port 59504 ssh2
Ju........
-------------------------------
2019-07-16 19:11:51
109.195.170.205 attackbots
[portscan] Port scan
2019-07-16 18:37:20
89.210.197.140 attack
" "
2019-07-16 18:39:44

最近上报的IP列表

202.147.211.177 76.114.34.168 251.68.9.83 133.183.241.114
66.46.110.240 45.60.105.66 52.232.98.149 174.178.212.105
217.121.170.255 40.141.254.132 65.34.86.112 203.148.142.190
207.69.34.103 77.47.140.189 177.224.17.99 126.131.249.241
230.22.237.55 213.175.99.33 126.133.85.136 142.195.132.226