必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta Raya

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.219.220.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.219.220.200.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:07:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 200.220.219.39.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.220.219.39.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.4.63 attackbotsspam
Dec 17 09:50:37 gw1 sshd[1152]: Failed password for root from 139.59.4.63 port 33552 ssh2
...
2019-12-17 13:09:48
62.234.122.141 attackspam
Dec 17 00:11:53 linuxvps sshd\[63875\]: Invalid user 123321 from 62.234.122.141
Dec 17 00:11:53 linuxvps sshd\[63875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.122.141
Dec 17 00:11:55 linuxvps sshd\[63875\]: Failed password for invalid user 123321 from 62.234.122.141 port 43167 ssh2
Dec 17 00:19:20 linuxvps sshd\[3544\]: Invalid user tercio from 62.234.122.141
Dec 17 00:19:20 linuxvps sshd\[3544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.122.141
2019-12-17 13:36:46
5.135.182.84 attackbots
Dec 16 23:56:46 TORMINT sshd\[22689\]: Invalid user www from 5.135.182.84
Dec 16 23:56:46 TORMINT sshd\[22689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
Dec 16 23:56:48 TORMINT sshd\[22689\]: Failed password for invalid user www from 5.135.182.84 port 57794 ssh2
...
2019-12-17 13:08:46
115.240.192.131 attackspambots
1576558592 - 12/17/2019 05:56:32 Host: 115.240.192.131/115.240.192.131 Port: 445 TCP Blocked
2019-12-17 13:23:59
45.55.158.8 attackbots
Dec 16 23:56:27 TORMINT sshd\[22671\]: Invalid user guillaume from 45.55.158.8
Dec 16 23:56:27 TORMINT sshd\[22671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8
Dec 16 23:56:29 TORMINT sshd\[22671\]: Failed password for invalid user guillaume from 45.55.158.8 port 50758 ssh2
...
2019-12-17 13:24:25
222.186.175.202 attackbotsspam
Dec 17 05:02:53 zeus sshd[5312]: Failed password for root from 222.186.175.202 port 40660 ssh2
Dec 17 05:02:57 zeus sshd[5312]: Failed password for root from 222.186.175.202 port 40660 ssh2
Dec 17 05:03:01 zeus sshd[5312]: Failed password for root from 222.186.175.202 port 40660 ssh2
Dec 17 05:03:06 zeus sshd[5312]: Failed password for root from 222.186.175.202 port 40660 ssh2
Dec 17 05:03:10 zeus sshd[5312]: Failed password for root from 222.186.175.202 port 40660 ssh2
2019-12-17 13:14:59
94.179.128.109 attackspam
Dec 17 04:56:29 thevastnessof sshd[26398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.128.109
...
2019-12-17 13:26:38
170.210.214.50 attack
Dec 17 07:41:12 server sshd\[31825\]: Invalid user johanny from 170.210.214.50
Dec 17 07:41:12 server sshd\[31825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.214.50 
Dec 17 07:41:14 server sshd\[31825\]: Failed password for invalid user johanny from 170.210.214.50 port 55546 ssh2
Dec 17 07:56:47 server sshd\[4282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.214.50  user=root
Dec 17 07:56:49 server sshd\[4282\]: Failed password for root from 170.210.214.50 port 40152 ssh2
...
2019-12-17 13:07:50
106.12.208.27 attackspambots
Dec 17 05:53:36 MK-Soft-VM6 sshd[4960]: Failed password for sshd from 106.12.208.27 port 60460 ssh2
...
2019-12-17 13:32:29
149.56.23.154 attackbotsspam
Dec 16 19:06:54 auw2 sshd\[5604\]: Invalid user ud from 149.56.23.154
Dec 16 19:06:54 auw2 sshd\[5604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns529890.ip-149-56-23.net
Dec 16 19:06:56 auw2 sshd\[5604\]: Failed password for invalid user ud from 149.56.23.154 port 33166 ssh2
Dec 16 19:12:17 auw2 sshd\[6283\]: Invalid user pometisch from 149.56.23.154
Dec 16 19:12:17 auw2 sshd\[6283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns529890.ip-149-56-23.net
2019-12-17 13:27:41
54.36.189.198 attackspam
Dec 16 19:22:45 eddieflores sshd\[7118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.ip-54-36-189.eu  user=root
Dec 16 19:22:47 eddieflores sshd\[7118\]: Failed password for root from 54.36.189.198 port 42459 ssh2
Dec 16 19:28:05 eddieflores sshd\[7669\]: Invalid user dena from 54.36.189.198
Dec 16 19:28:05 eddieflores sshd\[7669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.ip-54-36-189.eu
Dec 16 19:28:07 eddieflores sshd\[7669\]: Failed password for invalid user dena from 54.36.189.198 port 41578 ssh2
2019-12-17 13:34:49
222.186.175.183 attack
Dec 17 02:23:06 firewall sshd[26259]: Failed password for root from 222.186.175.183 port 18268 ssh2
Dec 17 02:23:20 firewall sshd[26259]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 18268 ssh2 [preauth]
Dec 17 02:23:20 firewall sshd[26259]: Disconnecting: Too many authentication failures [preauth]
...
2019-12-17 13:23:30
200.87.178.137 attackbotsspam
Dec 17 06:17:57 cp sshd[1628]: Failed password for root from 200.87.178.137 port 51898 ssh2
Dec 17 06:17:57 cp sshd[1628]: Failed password for root from 200.87.178.137 port 51898 ssh2
2019-12-17 13:38:07
138.68.18.232 attackbotsspam
Dec 16 18:51:03 php1 sshd\[15181\]: Invalid user apache from 138.68.18.232
Dec 16 18:51:03 php1 sshd\[15181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.18.232
Dec 16 18:51:06 php1 sshd\[15181\]: Failed password for invalid user apache from 138.68.18.232 port 46458 ssh2
Dec 16 18:56:50 php1 sshd\[15739\]: Invalid user schultzen from 138.68.18.232
Dec 16 18:56:50 php1 sshd\[15739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.18.232
2019-12-17 13:05:43
106.12.27.11 attack
Dec 17 01:56:35 firewall sshd[25653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.11
Dec 17 01:56:35 firewall sshd[25653]: Invalid user gdm from 106.12.27.11
Dec 17 01:56:37 firewall sshd[25653]: Failed password for invalid user gdm from 106.12.27.11 port 46394 ssh2
...
2019-12-17 13:20:35

最近上报的IP列表

13.8.196.209 199.42.114.117 98.92.3.139 100.208.250.196
89.118.199.117 94.181.157.208 228.189.231.46 222.12.161.13
199.135.66.33 53.58.215.138 233.118.190.16 53.153.118.228
5.197.186.19 174.247.235.150 216.40.118.182 36.32.255.111
15.57.211.236 188.212.63.11 21.223.214.73 138.217.149.240