必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hamburg

省份(region): Hamburg

国家(country): Germany

运营商(isp): Telekom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.201.54.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.201.54.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 20:58:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
139.54.201.93.in-addr.arpa domain name pointer p5dc9368b.dip0.t-ipconnect.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.54.201.93.in-addr.arpa	name = p5dc9368b.dip0.t-ipconnect.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.63.253.157 attackspambots
2020-07-05T17:47:15.061869mail.csmailer.org sshd[15708]: Failed password for root from 185.63.253.157 port 51134 ssh2
2020-07-05T17:48:48.450636mail.csmailer.org sshd[15845]: Invalid user support from 185.63.253.157 port 60272
2020-07-05T17:48:48.455348mail.csmailer.org sshd[15845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.63.253.157
2020-07-05T17:48:48.450636mail.csmailer.org sshd[15845]: Invalid user support from 185.63.253.157 port 60272
2020-07-05T17:48:50.448358mail.csmailer.org sshd[15845]: Failed password for invalid user support from 185.63.253.157 port 60272 ssh2
...
2020-07-06 01:49:20
51.255.35.58 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-06 01:42:18
23.96.212.188 attack
Jul  5 14:39:45 jumpserver sshd[352734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.212.188 
Jul  5 14:39:45 jumpserver sshd[352734]: Invalid user student from 23.96.212.188 port 8799
Jul  5 14:39:47 jumpserver sshd[352734]: Failed password for invalid user student from 23.96.212.188 port 8799 ssh2
...
2020-07-06 01:22:21
119.2.17.138 attackspambots
Jul  5 14:22:49 vpn01 sshd[20256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.2.17.138
Jul  5 14:22:51 vpn01 sshd[20256]: Failed password for invalid user admin from 119.2.17.138 port 59552 ssh2
...
2020-07-06 01:40:13
194.26.29.32 attackbotsspam
Jul  5 19:10:11 debian-2gb-nbg1-2 kernel: \[16227623.976042\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.32 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=43050 PROTO=TCP SPT=53202 DPT=4037 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 01:35:04
219.84.213.188 attackbotsspam
Honeypot attack, port: 81, PTR: 219-84-213-188-FIX-KHH.dynamic.so-net.net.tw.
2020-07-06 01:26:37
51.91.143.21 attack
05.07.2020 18:15:12 - Wordpress fail 
Detected by ELinOX-ALM
2020-07-06 01:45:36
218.92.0.223 attack
DATE:2020-07-05 19:57:22, IP:218.92.0.223, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc)
2020-07-06 01:57:32
59.126.149.208 attackbotsspam
Honeypot attack, port: 81, PTR: 59-126-149-208.HINET-IP.hinet.net.
2020-07-06 01:46:44
54.37.65.3 attack
Jul  5 11:22:42 vps46666688 sshd[805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.65.3
Jul  5 11:22:43 vps46666688 sshd[805]: Failed password for invalid user ans from 54.37.65.3 port 46436 ssh2
...
2020-07-06 01:45:18
94.102.56.151 attack
[H1.VM6] Blocked by UFW
2020-07-06 01:14:56
37.48.72.216 attack
Jul  5 18:13:45 hosting sshd[30990]: Invalid user nodes2 from 37.48.72.216 port 56580
...
2020-07-06 01:22:09
220.129.178.96 attackbotsspam
Jul  5 19:19:05 journals sshd\[58509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.129.178.96  user=root
Jul  5 19:19:07 journals sshd\[58509\]: Failed password for root from 220.129.178.96 port 38440 ssh2
Jul  5 19:23:25 journals sshd\[58955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.129.178.96  user=root
Jul  5 19:23:27 journals sshd\[58955\]: Failed password for root from 220.129.178.96 port 38280 ssh2
Jul  5 19:28:00 journals sshd\[59355\]: Invalid user git from 220.129.178.96
Jul  5 19:28:00 journals sshd\[59355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.129.178.96
...
2020-07-06 01:27:18
150.129.8.4 attackbotsspam
 TCP (SYN) 150.129.8.4:39166 -> port 1080, len 60
2020-07-06 01:16:42
23.95.85.68 attack
(sshd) Failed SSH login from 23.95.85.68 (US/United States/23-95-85-68-host.colocrossing.com): 5 in the last 3600 secs
2020-07-06 01:29:30

最近上报的IP列表

67.179.104.145 197.105.134.176 180.118.51.221 142.80.122.12
146.76.255.231 17.158.163.225 165.130.149.104 166.167.115.76
115.58.108.199 63.149.136.34 117.22.201.250 111.35.163.130
182.117.73.52 21.149.228.141 88.182.17.109 205.33.136.148
183.70.103.32 127.193.227.162 125.42.147.107 29.68.69.192