必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
92.20.139.211 attackbots
port scan and connect, tcp 23 (telnet)
2019-12-10 00:46:48
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.20.139.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.20.139.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 01:52:58 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
99.139.20.92.in-addr.arpa domain name pointer host-92-20-139-99.as13285.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.139.20.92.in-addr.arpa	name = host-92-20-139-99.as13285.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.70.130.152 attack
1419. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 66.70.130.152.
2020-07-16 06:20:11
185.103.51.85 attackspam
Jul 14 21:20:44 lunarastro sshd[12584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.103.51.85 
Jul 14 21:20:46 lunarastro sshd[12584]: Failed password for invalid user nathaly from 185.103.51.85 port 43616 ssh2
Jul 14 21:26:48 lunarastro sshd[12696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.103.51.85
2020-07-16 06:08:46
67.216.193.153 attack
1426. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 21 unique times by 67.216.193.153.
2020-07-16 06:15:12
52.254.85.5 attackspam
SSH Invalid Login
2020-07-16 06:01:04
54.37.226.123 attackbotsspam
SSH Invalid Login
2020-07-16 05:45:40
218.4.164.86 attackspam
Jul 16 00:07:02 lnxmail61 sshd[28531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.164.86
2020-07-16 06:23:02
191.232.177.26 attackbotsspam
SSH Invalid Login
2020-07-16 05:50:18
67.207.88.180 attackspambots
1423. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 7 unique times by 67.207.88.180.
2020-07-16 06:17:27
67.209.79.254 attackspambots
1425. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 67.209.79.254.
2020-07-16 06:15:43
14.136.245.194 attack
$f2bV_matches
2020-07-16 06:16:41
106.12.46.229 attack
SSH Invalid Login
2020-07-16 05:54:05
66.70.153.87 attack
spam (f2b h2)
2020-07-16 05:52:37
185.16.37.135 attack
$f2bV_matches
2020-07-16 06:16:58
106.54.85.36 attack
SSH Invalid Login
2020-07-16 05:49:13
193.35.51.13 attackspambots
Jul 15 23:27:59 mail.srvfarm.net postfix/smtpd[403556]: warning: unknown[193.35.51.13]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 23:27:59 mail.srvfarm.net postfix/smtpd[403556]: lost connection after AUTH from unknown[193.35.51.13]
Jul 15 23:28:04 mail.srvfarm.net postfix/smtpd[404901]: lost connection after AUTH from unknown[193.35.51.13]
Jul 15 23:28:10 mail.srvfarm.net postfix/smtpd[402191]: lost connection after AUTH from unknown[193.35.51.13]
Jul 15 23:28:14 mail.srvfarm.net postfix/smtpd[402194]: lost connection after AUTH from unknown[193.35.51.13]
2020-07-16 06:05:47

最近上报的IP列表

31.67.21.73 203.251.210.161 218.126.125.54 41.152.59.149
147.47.139.199 106.91.117.131 82.28.179.117 65.237.199.231
106.50.0.213 39.232.87.150 126.134.198.80 44.135.156.91
207.66.232.223 115.99.101.29 19.139.97.249 78.176.128.190
225.29.113.250 145.173.51.165 66.228.67.140 104.226.139.20