必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Mobile

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.145.239.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.145.239.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 17 16:22:04 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.239.145.39.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.239.145.39.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.34.191.152 attackbotsspam
Unauthorised access (Aug  3) SRC=114.34.191.152 LEN=40 TTL=46 ID=13512 TCP DPT=23 WINDOW=1017 SYN
2020-08-04 01:18:54
129.158.74.141 attackspambots
Aug  3 13:31:24 django-0 sshd[23356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-74-141.compute.oraclecloud.com  user=root
Aug  3 13:31:27 django-0 sshd[23356]: Failed password for root from 129.158.74.141 port 40755 ssh2
...
2020-08-04 01:31:42
51.77.150.203 attack
Aug  3 17:07:10 marvibiene sshd[27293]: Failed password for root from 51.77.150.203 port 35816 ssh2
Aug  3 17:18:24 marvibiene sshd[27818]: Failed password for root from 51.77.150.203 port 38010 ssh2
2020-08-04 01:22:23
103.100.209.172 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-04 01:28:32
173.182.68.96 attack
Aug  3 14:13:29 mx01 sshd[20072]: Bad protocol version identification '' from 173.182.68.96
Aug  3 14:15:14 mx01 sshd[20073]: Invalid user osboxes from 173.182.68.96
Aug  3 14:15:17 mx01 sshd[20073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.182.68.96 
Aug  3 14:15:19 mx01 sshd[20073]: Failed password for invalid user osboxes from 173.182.68.96 port 31275 ssh2
Aug  3 14:15:22 mx01 sshd[20073]: Connection closed by 173.182.68.96 [preauth]
Aug  3 14:16:53 mx01 sshd[20326]: Invalid user NetLinx from 173.182.68.96
Aug  3 14:16:56 mx01 sshd[20326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.182.68.96 
Aug  3 14:16:58 mx01 sshd[20326]: Failed password for invalid user NetLinx from 173.182.68.96 port 44806 ssh2
Aug  3 14:17:02 mx01 sshd[20326]: Connection closed by 173.182.68.96 [preauth]
Aug  3 14:18:49 mx01 sshd[20501]: Invalid user nexthink from 173.182.68.96
Aug  3 14:18:52 m........
-------------------------------
2020-08-04 01:33:16
59.126.109.49 attackspam
SMB Server BruteForce Attack
2020-08-04 01:49:44
190.223.26.38 attackbotsspam
Brute-force attempt banned
2020-08-04 01:35:26
223.71.167.164 attack
 TCP (SYN) 223.71.167.164:9080 -> port 5986, len 44
2020-08-04 01:35:12
49.232.168.32 attackbotsspam
Aug  3 09:15:37 ny01 sshd[12741]: Failed password for root from 49.232.168.32 port 56994 ssh2
Aug  3 09:18:53 ny01 sshd[13142]: Failed password for root from 49.232.168.32 port 34840 ssh2
2020-08-04 01:15:52
217.182.77.186 attack
2020-08-03T10:23:19.8598421495-001 sshd[22501]: Invalid user PA5sword from 217.182.77.186 port 46770
2020-08-03T10:23:22.2079171495-001 sshd[22501]: Failed password for invalid user PA5sword from 217.182.77.186 port 46770 ssh2
2020-08-03T10:26:35.6475381495-001 sshd[22672]: Invalid user dqwkqk7417 from 217.182.77.186 port 42734
2020-08-03T10:26:35.6507381495-001 sshd[22672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.ip-217-182-77.eu
2020-08-03T10:26:35.6475381495-001 sshd[22672]: Invalid user dqwkqk7417 from 217.182.77.186 port 42734
2020-08-03T10:26:37.3473291495-001 sshd[22672]: Failed password for invalid user dqwkqk7417 from 217.182.77.186 port 42734 ssh2
...
2020-08-04 01:20:45
165.227.219.148 attack
michaelklotzbier.de 165.227.219.148 [03/Aug/2020:18:39:14 +0200] "POST /wp-login.php HTTP/1.1" 200 6149 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
michaelklotzbier.de 165.227.219.148 [03/Aug/2020:18:39:20 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4068 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 01:29:38
80.82.77.139 attackbotsspam
08/03/2020-13:31:41.382384 80.82.77.139 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-08-04 01:43:24
192.35.169.36 attackspambots
" "
2020-08-04 01:34:43
179.109.227.201 attackbots
From bpelorca@live-confeb.com Mon Aug 03 09:22:48 2020
Received: from pm03-1.7678.allin.live-confeb.com ([179.109.227.201]:47312)
2020-08-04 01:20:29
119.2.17.138 attack
Aug  3 18:19:14 xeon sshd[64042]: Failed password for root from 119.2.17.138 port 55352 ssh2
2020-08-04 01:41:53

最近上报的IP列表

205.98.249.121 122.117.101.135 149.17.101.8 170.184.179.195
217.3.177.207 10.80.122.158 192.168.31.204 29.122.68.114
80.193.64.100 157.93.36.73 106.63.122.187 213.139.64.53
245.246.242.120 7.228.11.43 250.5.174.62 116.231.91.0
147.49.81.30 250.235.199.105 36.172.32.206 29.62.253.212