必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.161.92.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.161.92.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 00:17:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
139.92.161.51.in-addr.arpa domain name pointer ip139.ip-51-161-92.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.92.161.51.in-addr.arpa	name = ip139.ip-51-161-92.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.22.45.225 attackbotsspam
11/30/2019-15:48:39.530846 81.22.45.225 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 23:06:21
222.186.173.142 attackbotsspam
Fail2Ban Ban Triggered
2019-11-30 22:42:21
152.32.187.177 attackbots
Lines containing failures of 152.32.187.177
Nov 30 08:51:58 localhost sshd[986391]: Invalid user kimijiro from 152.32.187.177 port 40024
Nov 30 08:51:58 localhost sshd[986391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.187.177
Nov 30 08:52:00 localhost sshd[986391]: Failed password for invalid user kimijiro from 152.32.187.177 port 40024 ssh2
Nov 30 08:52:03 localhost sshd[986391]: Received disconnect from 152.32.187.177 port 40024:11: Bye Bye [preauth]
Nov 30 08:52:03 localhost sshd[986391]: Disconnected from invalid user kimijiro 152.32.187.177 port 40024 [preauth]
Nov 30 09:09:11 localhost sshd[1049492]: Invalid user tanko from 152.32.187.177 port 55544
Nov 30 09:09:11 localhost sshd[1049492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.187.177
Nov 30 09:09:13 localhost sshd[1049492]: Failed password for invalid user tanko from 152.32.187.177 port 55544 ssh2
Nov 30 ........
------------------------------
2019-11-30 22:51:22
104.211.218.235 attack
port scan and connect, tcp 22 (ssh)
2019-11-30 22:50:04
125.214.52.123 attack
Unauthorised access (Nov 30) SRC=125.214.52.123 LEN=52 TTL=108 ID=11221 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 22:52:02
196.52.43.57 attack
Automatic report - Banned IP Access
2019-11-30 23:10:42
193.77.216.143 attackbotsspam
Nov 30 14:34:42 localhost sshd\[105992\]: Invalid user bertille from 193.77.216.143 port 57704
Nov 30 14:34:42 localhost sshd\[105992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
Nov 30 14:34:44 localhost sshd\[105992\]: Failed password for invalid user bertille from 193.77.216.143 port 57704 ssh2
Nov 30 14:38:27 localhost sshd\[106036\]: Invalid user mofcom from 193.77.216.143 port 36676
Nov 30 14:38:27 localhost sshd\[106036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
...
2019-11-30 22:57:53
112.85.42.174 attackbots
Nov 30 14:43:17 venus sshd\[8688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Nov 30 14:43:20 venus sshd\[8688\]: Failed password for root from 112.85.42.174 port 51696 ssh2
Nov 30 14:43:23 venus sshd\[8688\]: Failed password for root from 112.85.42.174 port 51696 ssh2
...
2019-11-30 22:52:35
37.139.0.226 attackbots
5x Failed Password
2019-11-30 22:57:02
68.183.127.93 attackbotsspam
Oct  2 19:09:15 vtv3 sshd[17735]: Failed password for invalid user cod2 from 68.183.127.93 port 45356 ssh2
Oct  2 19:13:28 vtv3 sshd[19822]: Invalid user bandit from 68.183.127.93 port 58164
Oct  2 19:13:28 vtv3 sshd[19822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.127.93
Oct  2 19:26:00 vtv3 sshd[26796]: Invalid user suporte from 68.183.127.93 port 40128
Oct  2 19:26:01 vtv3 sshd[26796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.127.93
Oct  2 19:26:02 vtv3 sshd[26796]: Failed password for invalid user suporte from 68.183.127.93 port 40128 ssh2
Oct  2 19:30:14 vtv3 sshd[28883]: Invalid user brad from 68.183.127.93 port 52940
Oct  2 19:30:14 vtv3 sshd[28883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.127.93
Oct  2 19:42:41 vtv3 sshd[2647]: Invalid user steven from 68.183.127.93 port 34906
Oct  2 19:42:41 vtv3 sshd[2647]: pam_unix(sshd:auth): authenticat
2019-11-30 22:47:29
218.92.0.145 attack
Nov 30 05:08:25 php1 sshd\[12356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Nov 30 05:08:27 php1 sshd\[12356\]: Failed password for root from 218.92.0.145 port 61315 ssh2
Nov 30 05:08:31 php1 sshd\[12356\]: Failed password for root from 218.92.0.145 port 61315 ssh2
Nov 30 05:08:34 php1 sshd\[12356\]: Failed password for root from 218.92.0.145 port 61315 ssh2
Nov 30 05:08:47 php1 sshd\[12394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
2019-11-30 23:16:17
142.93.195.189 attack
Nov 30 15:38:46 ns381471 sshd[1386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.189
Nov 30 15:38:49 ns381471 sshd[1386]: Failed password for invalid user 123456 from 142.93.195.189 port 57618 ssh2
2019-11-30 22:41:31
222.186.175.181 attackbotsspam
Nov 30 20:43:44 vibhu-HP-Z238-Microtower-Workstation sshd\[19725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
Nov 30 20:43:45 vibhu-HP-Z238-Microtower-Workstation sshd\[19725\]: Failed password for root from 222.186.175.181 port 7099 ssh2
Nov 30 20:44:07 vibhu-HP-Z238-Microtower-Workstation sshd\[19741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
Nov 30 20:44:09 vibhu-HP-Z238-Microtower-Workstation sshd\[19741\]: Failed password for root from 222.186.175.181 port 54687 ssh2
Nov 30 20:44:25 vibhu-HP-Z238-Microtower-Workstation sshd\[19741\]: Failed password for root from 222.186.175.181 port 54687 ssh2
...
2019-11-30 23:18:46
80.91.176.139 attackspam
Nov 30 15:38:42 dedicated sshd[16238]: Invalid user pris from 80.91.176.139 port 33460
2019-11-30 22:48:36
39.42.106.83 attack
Unauthorized connection attempt from IP address 39.42.106.83 on Port 445(SMB)
2019-11-30 22:34:00

最近上报的IP列表

30.72.77.220 116.34.221.13 122.195.36.98 57.105.145.76
168.148.127.161 178.122.185.185 48.45.219.92 174.195.11.94
22.108.54.253 212.126.175.188 64.155.29.199 239.104.20.90
235.188.200.214 30.186.111.149 234.224.76.120 45.175.226.216
125.53.4.211 63.70.131.112 192.250.56.55 6.214.87.177