必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.139.13.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.139.13.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 09:14:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
126.13.139.64.in-addr.arpa domain name pointer ip-64-139-13-126.dsl.sca.megapath.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.13.139.64.in-addr.arpa	name = ip-64-139-13-126.dsl.sca.megapath.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.199.41.211 attackbotsspam
2020-04-16T23:24:48.941360dmca.cloudsearch.cf sshd[13048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.41.211  user=root
2020-04-16T23:24:51.336603dmca.cloudsearch.cf sshd[13048]: Failed password for root from 113.199.41.211 port 12668 ssh2
2020-04-16T23:29:52.355313dmca.cloudsearch.cf sshd[13572]: Invalid user nr from 113.199.41.211 port 48522
2020-04-16T23:29:52.360959dmca.cloudsearch.cf sshd[13572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.41.211
2020-04-16T23:29:52.355313dmca.cloudsearch.cf sshd[13572]: Invalid user nr from 113.199.41.211 port 48522
2020-04-16T23:29:54.490904dmca.cloudsearch.cf sshd[13572]: Failed password for invalid user nr from 113.199.41.211 port 48522 ssh2
2020-04-16T23:33:15.790910dmca.cloudsearch.cf sshd[13920]: Invalid user bj from 113.199.41.211 port 18326
...
2020-04-17 08:19:18
103.68.241.68 attackbots
Unauthorized connection attempt from IP address 103.68.241.68 on Port 445(SMB)
2020-04-17 08:10:42
54.38.180.53 attackbots
2020-04-17T01:33:30.598334amanda2.illicoweb.com sshd\[47818\]: Invalid user oracle from 54.38.180.53 port 46892
2020-04-17T01:33:30.602242amanda2.illicoweb.com sshd\[47818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=53.ip-54-38-180.eu
2020-04-17T01:33:32.657391amanda2.illicoweb.com sshd\[47818\]: Failed password for invalid user oracle from 54.38.180.53 port 46892 ssh2
2020-04-17T01:36:43.665074amanda2.illicoweb.com sshd\[47942\]: Invalid user rj from 54.38.180.53 port 54094
2020-04-17T01:36:43.669357amanda2.illicoweb.com sshd\[47942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=53.ip-54-38-180.eu
...
2020-04-17 08:20:01
181.129.165.139 attack
Apr 16 11:14:47 XXX sshd[24418]: Invalid user dp from 181.129.165.139 port 37884
2020-04-17 08:29:39
204.48.27.62 attackbots
2020-04-17T01:31:29.537494  sshd[10981]: Invalid user anil from 204.48.27.62 port 47744
2020-04-17T01:31:29.551364  sshd[10981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.27.62
2020-04-17T01:31:29.537494  sshd[10981]: Invalid user anil from 204.48.27.62 port 47744
2020-04-17T01:31:31.661458  sshd[10981]: Failed password for invalid user anil from 204.48.27.62 port 47744 ssh2
...
2020-04-17 08:12:33
35.188.62.96 attackspam
20 attempts against mh-ssh on creek
2020-04-17 08:08:50
180.250.247.45 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-17 08:20:38
197.59.110.129 attackspambots
(LocalIPAttack) Local IP Attack From  197.59.110.129 (EG/Egypt/host-197.59.110.129.tedata.net): 1 in the last 3600 secs
2020-04-17 08:21:54
159.89.170.20 attack
2020-04-16T23:44:24.287982shield sshd\[23478\]: Invalid user admin from 159.89.170.20 port 39184
2020-04-16T23:44:24.291974shield sshd\[23478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.20
2020-04-16T23:44:25.800874shield sshd\[23478\]: Failed password for invalid user admin from 159.89.170.20 port 39184 ssh2
2020-04-16T23:48:43.054472shield sshd\[24500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.20  user=root
2020-04-16T23:48:45.450192shield sshd\[24500\]: Failed password for root from 159.89.170.20 port 45340 ssh2
2020-04-17 08:31:51
89.45.45.178 attackbotsspam
Apr 16 19:59:46 ny01 sshd[4216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.45.178
Apr 16 19:59:47 ny01 sshd[4216]: Failed password for invalid user w from 89.45.45.178 port 54526 ssh2
Apr 16 20:03:37 ny01 sshd[4688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.45.178
2020-04-17 08:30:33
37.187.195.209 attack
Apr 17 02:17:13 meumeu sshd[16436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.195.209 
Apr 17 02:17:16 meumeu sshd[16436]: Failed password for invalid user test from 37.187.195.209 port 48618 ssh2
Apr 17 02:20:31 meumeu sshd[16965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.195.209 
...
2020-04-17 08:29:11
179.53.200.114 attackbots
Apr 17 01:31:29 ArkNodeAT sshd\[19153\]: Invalid user test from 179.53.200.114
Apr 17 01:31:29 ArkNodeAT sshd\[19153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.53.200.114
Apr 17 01:31:31 ArkNodeAT sshd\[19153\]: Failed password for invalid user test from 179.53.200.114 port 41106 ssh2
2020-04-17 08:10:06
123.138.18.35 attackspambots
Apr 17 01:44:07 localhost sshd\[26772\]: Invalid user rf from 123.138.18.35
Apr 17 01:44:08 localhost sshd\[26772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35
Apr 17 01:44:10 localhost sshd\[26772\]: Failed password for invalid user rf from 123.138.18.35 port 47808 ssh2
Apr 17 01:52:12 localhost sshd\[27401\]: Invalid user git from 123.138.18.35
Apr 17 01:52:12 localhost sshd\[27401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35
...
2020-04-17 08:25:36
106.13.165.164 attackbots
Apr 17 02:06:21 vps647732 sshd[23988]: Failed password for root from 106.13.165.164 port 45712 ssh2
...
2020-04-17 08:24:49
85.26.233.149 attackspambots
Unauthorized connection attempt from IP address 85.26.233.149 on Port 445(SMB)
2020-04-17 08:26:35

最近上报的IP列表

43.154.200.147 98.94.66.237 147.93.190.168 47.98.164.140
91.230.168.24 91.230.168.20 59.96.139.164 219.136.105.136
183.186.228.202 49.4.32.31 159.138.86.200 121.36.117.176
49.4.17.87 49.4.43.77 116.179.37.227 10.50.111.235
172.20.2.2 172.20.2.1 157.175.76.105 170.64.173.170