必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.7.10.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9107
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.7.10.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 18:02:09 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 139.10.7.56.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 56.7.10.139.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.76.226.243 attackspambots
20 attempts against mh-ssh on shade.magehost.pro
2019-06-23 18:25:48
103.48.193.61 attack
103.48.193.61 - - \[23/Jun/2019:12:05:32 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.193.61 - - \[23/Jun/2019:12:05:33 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.193.61 - - \[23/Jun/2019:12:05:34 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.193.61 - - \[23/Jun/2019:12:05:35 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.193.61 - - \[23/Jun/2019:12:05:36 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.48.193.61 - - \[23/Jun/2019:12:05:37 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-23 18:14:57
207.148.91.178 attackbots
207.148.91.178 - - \[23/Jun/2019:12:03:47 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
207.148.91.178 - - \[23/Jun/2019:12:03:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
207.148.91.178 - - \[23/Jun/2019:12:03:49 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
207.148.91.178 - - \[23/Jun/2019:12:03:50 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
207.148.91.178 - - \[23/Jun/2019:12:03:50 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
207.148.91.178 - - \[23/Jun/2019:12:03:51 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:6
2019-06-23 18:51:35
66.249.64.154 attackspambots
66.249.64.154 - - [23/Jun/2019:12:05:19 +0200] "GET /admin/wp-login.php HTTP/1.1" 404 1307 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2019-06-23 18:21:15
212.83.145.12 attack
\[2019-06-23 06:18:43\] SECURITY\[1857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-23T06:18:43.344-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="85011972592277524",SessionID="0x7fc4240239d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/53314",ACLName="no_extension_match"
\[2019-06-23 06:23:34\] SECURITY\[1857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-23T06:23:34.778-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="74011972592277524",SessionID="0x7fc424245928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/52295",ACLName="no_extension_match"
\[2019-06-23 06:28:02\] SECURITY\[1857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-23T06:28:02.657-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="57011972592277524",SessionID="0x7fc424245928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/56997",ACLName="
2019-06-23 18:34:21
68.183.37.128 attack
Invalid user ftp from 68.183.37.128 port 45338
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.37.128
Failed password for invalid user ftp from 68.183.37.128 port 45338 ssh2
Invalid user emeraude from 68.183.37.128 port 34498
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.37.128
2019-06-23 18:41:15
189.204.6.157 attackspam
Unauthorized SMTP/IMAP/POP3 connection attempt
2019-06-23 18:36:02
103.249.90.69 attackspam
Hit on /wp-login.php
2019-06-23 18:47:58
46.105.99.163 attack
SS1,DEF GET /admin/login.php
2019-06-23 18:15:50
23.94.108.112 attackspam
NAME : CC-16 CIDR : 23.94.0.0/15 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - New York - block certain countries :) IP: 23.94.108.112  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 18:43:10
103.15.50.131 attackbots
103.15.50.131 - - \[23/Jun/2019:12:04:17 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.15.50.131 - - \[23/Jun/2019:12:04:18 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.15.50.131 - - \[23/Jun/2019:12:04:19 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.15.50.131 - - \[23/Jun/2019:12:04:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.15.50.131 - - \[23/Jun/2019:12:04:21 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.15.50.131 - - \[23/Jun/2019:12:04:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\)
2019-06-23 18:24:51
54.38.82.14 attackspambots
Jun 23 06:04:36 vps200512 sshd\[12019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jun 23 06:04:38 vps200512 sshd\[12019\]: Failed password for root from 54.38.82.14 port 48551 ssh2
Jun 23 06:04:38 vps200512 sshd\[12021\]: Invalid user admin from 54.38.82.14
Jun 23 06:04:38 vps200512 sshd\[12021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Jun 23 06:04:40 vps200512 sshd\[12021\]: Failed password for invalid user admin from 54.38.82.14 port 44168 ssh2
2019-06-23 18:41:49
179.107.84.18 attack
Unauthorized connection attempt from IP address 179.107.84.18 on Port 445(SMB)
2019-06-23 19:03:50
192.198.114.253 attackspam
NAME : NET-192-198-114-224-1 CIDR : 192.198.114.224/27 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Alaska - block certain countries :) IP: 192.198.114.253  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 18:28:23
218.73.129.37 attackspambots
SASL broute force
2019-06-23 18:16:33

最近上报的IP列表

115.241.67.155 218.195.154.130 189.75.70.75 188.67.54.8
200.208.126.15 5.8.247.173 73.150.70.47 251.4.137.177
134.8.25.61 208.203.240.100 92.169.171.232 61.182.119.10
219.95.71.62 55.154.127.234 90.188.202.76 168.109.31.32
22.154.215.191 165.80.120.244 250.36.24.57 213.229.52.100