必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.16.139.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.16.139.116.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:59:57 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
116.139.16.86.in-addr.arpa domain name pointer cpc79921-stkp12-2-0-cust371.10-2.cable.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.139.16.86.in-addr.arpa	name = cpc79921-stkp12-2-0-cust371.10-2.cable.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.235.240.189 attack
rdp brute-force attack
2019-10-02 16:22:34
222.186.175.154 attack
Oct  2 10:38:17 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2
Oct  2 10:38:21 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2
Oct  2 10:38:26 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2
Oct  2 10:38:33 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2
...
2019-10-02 16:42:03
173.208.200.154 attackbotsspam
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-10-02 16:38:53
148.70.201.162 attackspambots
Oct  2 09:51:18 SilenceServices sshd[19768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162
Oct  2 09:51:20 SilenceServices sshd[19768]: Failed password for invalid user rotartsinimdA from 148.70.201.162 port 35600 ssh2
Oct  2 09:56:30 SilenceServices sshd[21244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162
2019-10-02 16:16:13
218.249.24.98 attackbotsspam
Brute force attempt
2019-10-02 16:26:30
221.122.67.66 attackspambots
Oct  1 19:04:17 php1 sshd\[12923\]: Invalid user user from 221.122.67.66
Oct  1 19:04:17 php1 sshd\[12923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66
Oct  1 19:04:19 php1 sshd\[12923\]: Failed password for invalid user user from 221.122.67.66 port 47816 ssh2
Oct  1 19:10:02 php1 sshd\[14270\]: Invalid user kp from 221.122.67.66
Oct  1 19:10:02 php1 sshd\[14270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66
2019-10-02 16:37:19
13.59.186.123 attack
Oct  2 11:01:44 tuotantolaitos sshd[10869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.59.186.123
Oct  2 11:01:46 tuotantolaitos sshd[10869]: Failed password for invalid user 87654321 from 13.59.186.123 port 37488 ssh2
...
2019-10-02 16:30:57
112.175.232.155 attackspam
SSH Bruteforce
2019-10-02 16:15:25
77.81.230.143 attackspam
Oct  2 05:04:13 localhost sshd\[9640\]: Invalid user cheryl from 77.81.230.143 port 52914
Oct  2 05:04:13 localhost sshd\[9640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143
Oct  2 05:04:15 localhost sshd\[9640\]: Failed password for invalid user cheryl from 77.81.230.143 port 52914 ssh2
...
2019-10-02 16:21:07
5.9.141.8 attackbots
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-10-02 16:22:15
176.27.8.105 attackspam
Automatic report - Port Scan Attack
2019-10-02 16:51:38
164.132.57.16 attackbotsspam
Oct  2 02:56:27 ny01 sshd[18651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
Oct  2 02:56:29 ny01 sshd[18651]: Failed password for invalid user stack from 164.132.57.16 port 43486 ssh2
Oct  2 03:00:21 ny01 sshd[19482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
2019-10-02 16:43:40
77.247.110.222 attackspambots
10/02/2019-10:12:41.298305 77.247.110.222 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-10-02 16:31:37
212.147.15.213 attackspambots
Invalid user oliver from 212.147.15.213 port 28485
2019-10-02 16:33:54
106.13.93.161 attackbots
Oct  2 10:04:53 vps01 sshd[9904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.161
Oct  2 10:04:56 vps01 sshd[9904]: Failed password for invalid user demo from 106.13.93.161 port 39032 ssh2
2019-10-02 16:26:10

最近上报的IP列表

83.60.0.124 239.115.41.194 33.250.132.176 170.92.170.64
84.244.181.87 254.134.102.119 135.6.174.115 224.2.11.116
231.81.78.162 43.102.18.101 226.62.42.88 9.226.194.69
4.11.196.81 93.118.3.162 53.199.136.251 116.200.80.195
203.114.122.216 80.65.184.175 12.39.18.166 254.55.180.114