必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Host Europe GmbH

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.138.139.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22572
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;62.138.139.146.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 05 04:09:52 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
146.139.138.62.in-addr.arpa domain name pointer vl54304.dns-privadas.es.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
146.139.138.62.in-addr.arpa	name = vl54304.dns-privadas.es.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.207.188.95 attack
Oct 22 07:19:46 amit sshd\[21767\]: Invalid user server from 123.207.188.95
Oct 22 07:19:46 amit sshd\[21767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.188.95
Oct 22 07:19:48 amit sshd\[21767\]: Failed password for invalid user server from 123.207.188.95 port 51352 ssh2
...
2019-10-22 14:05:27
203.101.178.107 attackbots
Oct 21 18:34:15 lvps5-35-247-183 sshd[23911]: Invalid user ftp from 203.101.178.107
Oct 21 18:34:15 lvps5-35-247-183 sshd[23911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.101.178.107 
Oct 21 18:34:17 lvps5-35-247-183 sshd[23911]: Failed password for invalid user ftp from 203.101.178.107 port 24417 ssh2
Oct 21 18:34:17 lvps5-35-247-183 sshd[23911]: Received disconnect from 203.101.178.107: 11: Bye Bye [preauth]
Oct 21 18:48:54 lvps5-35-247-183 sshd[24239]: Invalid user ashton from 203.101.178.107
Oct 21 18:48:54 lvps5-35-247-183 sshd[24239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.101.178.107 
Oct 21 18:48:56 lvps5-35-247-183 sshd[24239]: Failed password for invalid user ashton from 203.101.178.107 port 45953 ssh2
Oct 21 18:48:56 lvps5-35-247-183 sshd[24239]: Received disconnect from 203.101.178.107: 11: Bye Bye [preauth]
Oct 21 18:53:38 lvps5-35-247-183 sshd[24442]: pa........
-------------------------------
2019-10-22 14:24:05
2.202.115.144 attackbotsspam
UTC: 2019-10-21 port: 23/tcp
2019-10-22 14:11:33
5.196.201.7 attackbotsspam
Oct 22 05:19:29  postfix/smtpd: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed
2019-10-22 14:17:14
187.0.211.99 attackspambots
2019-10-22T04:29:50.071643abusebot-2.cloudsearch.cf sshd\[3596\]: Invalid user admin1 from 187.0.211.99 port 57155
2019-10-22 14:14:27
201.131.185.126 attackspambots
Oct 22 06:55:47 taivassalofi sshd[190903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.185.126
Oct 22 06:55:48 taivassalofi sshd[190903]: Failed password for invalid user admin from 201.131.185.126 port 38908 ssh2
...
2019-10-22 14:08:37
210.121.13.62 attackbotsspam
UTC: 2019-10-21 port: 80/tcp
2019-10-22 14:22:12
72.82.59.23 attackbotsspam
UTC: 2019-10-21 pkts: 2 port: 82/tcp
2019-10-22 14:15:00
178.128.76.6 attack
2019-10-22T06:00:35.605351shield sshd\[13012\]: Invalid user Puzzle@2017 from 178.128.76.6 port 44404
2019-10-22T06:00:35.611561shield sshd\[13012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6
2019-10-22T06:00:37.751552shield sshd\[13012\]: Failed password for invalid user Puzzle@2017 from 178.128.76.6 port 44404 ssh2
2019-10-22T06:04:38.884206shield sshd\[13842\]: Invalid user p4sswd1234 from 178.128.76.6 port 54828
2019-10-22T06:04:38.891898shield sshd\[13842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6
2019-10-22 14:19:58
2.135.188.7 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/2.135.188.7/ 
 
 KZ - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KZ 
 NAME ASN : ASN9198 
 
 IP : 2.135.188.7 
 
 CIDR : 2.135.188.0/22 
 
 PREFIX COUNT : 1223 
 
 UNIQUE IP COUNT : 1472256 
 
 
 ATTACKS DETECTED ASN9198 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 4 
 24H - 5 
 
 DateTime : 2019-10-22 05:56:10 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-22 13:52:23
122.143.99.191 attack
Unauthorised access (Oct 22) SRC=122.143.99.191 LEN=40 TTL=49 ID=44997 TCP DPT=8080 WINDOW=46339 SYN 
Unauthorised access (Oct 19) SRC=122.143.99.191 LEN=40 TTL=49 ID=50662 TCP DPT=8080 WINDOW=34126 SYN 
Unauthorised access (Oct 18) SRC=122.143.99.191 LEN=40 TTL=49 ID=9168 TCP DPT=8080 WINDOW=46339 SYN
2019-10-22 14:16:00
90.29.73.194 attackspam
Oct 22 08:48:58 tuotantolaitos sshd[9430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.29.73.194
Oct 22 08:49:00 tuotantolaitos sshd[9430]: Failed password for invalid user ed from 90.29.73.194 port 60986 ssh2
...
2019-10-22 13:59:57
113.88.159.216 attackbotsspam
PHI,WP GET /wp-login.php
2019-10-22 13:59:12
36.72.98.237 attackspam
" "
2019-10-22 14:21:42
134.175.141.166 attack
2019-10-22T04:30:51.364355abusebot-5.cloudsearch.cf sshd\[14410\]: Invalid user mailer from 134.175.141.166 port 41271
2019-10-22 14:27:23

最近上报的IP列表

49.231.222.14 116.54.91.81 92.96.159.67 178.82.165.116
42.118.118.88 209.233.72.17 90.252.172.92 103.254.59.218
188.23.204.87 14.204.233.112 57.103.245.0 183.222.178.85
54.36.150.122 183.76.48.242 145.155.224.229 202.174.41.63
150.86.233.221 125.235.9.10 37.42.170.249 101.64.39.81