必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bulgaria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.139.204.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.139.204.105.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 17:41:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
105.204.139.91.in-addr.arpa domain name pointer tanevi.stz.ddns.bulsat.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.204.139.91.in-addr.arpa	name = tanevi.stz.ddns.bulsat.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.3.29 attackbotsspam
Feb  8 02:57:57 legacy sshd[5048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.3.29
Feb  8 02:57:59 legacy sshd[5048]: Failed password for invalid user rmk from 118.25.3.29 port 40306 ssh2
Feb  8 03:01:46 legacy sshd[5226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.3.29
...
2020-02-08 10:23:31
117.51.157.137 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-08 10:02:18
103.17.44.154 attack
23/tcp
[2020-02-07]1pkt
2020-02-08 10:18:19
113.238.140.153 attack
23/tcp
[2020-02-07]1pkt
2020-02-08 10:23:53
1.9.128.17 attackspambots
Feb  8 01:50:42 vpn01 sshd[1835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17
Feb  8 01:50:44 vpn01 sshd[1835]: Failed password for invalid user rbf from 1.9.128.17 port 12325 ssh2
...
2020-02-08 10:05:02
176.31.207.10 attackbotsspam
445/tcp
[2020-02-07]1pkt
2020-02-08 10:20:48
190.140.182.202 attack
Email rejected due to spam filtering
2020-02-08 10:22:27
93.42.117.137 attackbots
Feb  8 02:20:22 h1745522 sshd[17881]: Invalid user jbe from 93.42.117.137 port 39775
Feb  8 02:20:22 h1745522 sshd[17881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.117.137
Feb  8 02:20:22 h1745522 sshd[17881]: Invalid user jbe from 93.42.117.137 port 39775
Feb  8 02:20:24 h1745522 sshd[17881]: Failed password for invalid user jbe from 93.42.117.137 port 39775 ssh2
Feb  8 02:20:57 h1745522 sshd[17894]: Invalid user koc from 93.42.117.137 port 42867
Feb  8 02:20:57 h1745522 sshd[17894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.117.137
Feb  8 02:20:57 h1745522 sshd[17894]: Invalid user koc from 93.42.117.137 port 42867
Feb  8 02:20:59 h1745522 sshd[17894]: Failed password for invalid user koc from 93.42.117.137 port 42867 ssh2
Feb  8 02:23:34 h1745522 sshd[17959]: Invalid user tiw from 93.42.117.137 port 60706
...
2020-02-08 09:53:28
77.42.88.101 attack
port 23
2020-02-08 09:47:38
78.191.226.199 attackspam
port 23
2020-02-08 09:46:20
138.197.179.111 attackbots
Feb  8 03:16:33 legacy sshd[5788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111
Feb  8 03:16:35 legacy sshd[5788]: Failed password for invalid user irw from 138.197.179.111 port 57722 ssh2
Feb  8 03:19:38 legacy sshd[5922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111
...
2020-02-08 10:21:02
213.186.129.192 attackspam
Email rejected due to spam filtering
2020-02-08 10:20:24
1.4.139.214 attack
Honeypot attack, port: 5555, PTR: node-2c6.pool-1-4.dynamic.totinternet.net.
2020-02-08 09:54:15
222.186.173.180 attack
Feb  8 02:43:50 vps691689 sshd[10783]: Failed password for root from 222.186.173.180 port 39766 ssh2
Feb  8 02:44:02 vps691689 sshd[10783]: Failed password for root from 222.186.173.180 port 39766 ssh2
Feb  8 02:44:02 vps691689 sshd[10783]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 39766 ssh2 [preauth]
...
2020-02-08 09:57:58
203.57.58.74 attackbotsspam
6379/tcp
[2020-02-07]1pkt
2020-02-08 10:10:36

最近上报的IP列表

2.237.230.146 219.45.106.118 133.150.194.154 231.184.155.137
193.248.41.48 119.157.84.11 168.53.43.252 4.78.200.175
211.43.246.214 191.235.79.51 161.69.111.245 5.180.104.19
127.9.69.40 240.227.148.51 227.160.158.112 153.127.79.197
9.66.82.129 111.92.175.14 245.143.56.126 255.156.206.86