必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sydney

省份(region): New South Wales

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7137
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.139.48.58.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 05:33:51 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 58.48.139.103.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 103.139.48.58.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.68.177.15 attackbotsspam
Nov 16 08:18:50 legacy sshd[30039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15
Nov 16 08:18:51 legacy sshd[30039]: Failed password for invalid user sammy from 180.68.177.15 port 56026 ssh2
Nov 16 08:24:09 legacy sshd[30196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15
...
2019-11-16 15:45:02
187.109.10.100 attackspam
Nov 16 08:40:39 ns37 sshd[13024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100
Nov 16 08:40:39 ns37 sshd[13024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100
2019-11-16 16:08:52
219.144.65.204 attackbots
$f2bV_matches
2019-11-16 16:10:53
5.14.218.255 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.14.218.255/ 
 
 RO - 1H : (30)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RO 
 NAME ASN : ASN8708 
 
 IP : 5.14.218.255 
 
 CIDR : 5.12.0.0/14 
 
 PREFIX COUNT : 236 
 
 UNIQUE IP COUNT : 2129408 
 
 
 ATTACKS DETECTED ASN8708 :  
  1H - 1 
  3H - 4 
  6H - 8 
 12H - 12 
 24H - 18 
 
 DateTime : 2019-11-16 07:28:19 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-16 15:48:25
222.186.180.8 attackspambots
2019-11-16T07:29:56.688181abusebot-7.cloudsearch.cf sshd\[9923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2019-11-16 15:31:04
43.254.55.179 attackspambots
2019-11-16T01:45:10.7796361495-001 sshd\[50065\]: Invalid user test from 43.254.55.179 port 43098
2019-11-16T01:45:10.7830951495-001 sshd\[50065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.254.55.179
2019-11-16T01:45:12.8645101495-001 sshd\[50065\]: Failed password for invalid user test from 43.254.55.179 port 43098 ssh2
2019-11-16T01:49:35.7150051495-001 sshd\[50231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.254.55.179  user=root
2019-11-16T01:49:37.5100641495-001 sshd\[50231\]: Failed password for root from 43.254.55.179 port 49740 ssh2
2019-11-16T01:54:12.6038191495-001 sshd\[50379\]: Invalid user camateros from 43.254.55.179 port 56378
...
2019-11-16 16:09:34
186.5.204.2 attack
Autoban   186.5.204.2 AUTH/CONNECT
2019-11-16 16:07:25
58.87.108.184 attack
Nov 16 08:11:04 ns41 sshd[3768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.108.184
Nov 16 08:11:04 ns41 sshd[3768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.108.184
2019-11-16 15:32:21
45.124.86.65 attack
Nov 16 07:27:53 amit sshd\[24267\]: Invalid user test from 45.124.86.65
Nov 16 07:27:53 amit sshd\[24267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65
Nov 16 07:27:55 amit sshd\[24267\]: Failed password for invalid user test from 45.124.86.65 port 39422 ssh2
...
2019-11-16 15:58:42
222.186.175.202 attack
Nov 16 12:57:03 vibhu-HP-Z238-Microtower-Workstation sshd\[445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Nov 16 12:57:05 vibhu-HP-Z238-Microtower-Workstation sshd\[445\]: Failed password for root from 222.186.175.202 port 63742 ssh2
Nov 16 12:57:28 vibhu-HP-Z238-Microtower-Workstation sshd\[466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Nov 16 12:57:30 vibhu-HP-Z238-Microtower-Workstation sshd\[466\]: Failed password for root from 222.186.175.202 port 35852 ssh2
Nov 16 12:57:52 vibhu-HP-Z238-Microtower-Workstation sshd\[488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
...
2019-11-16 15:37:03
190.64.68.178 attackspam
Jan 28 04:52:58 microserver sshd[51214]: Invalid user ts2 from 190.64.68.178 port 50241
Jan 28 04:52:58 microserver sshd[51214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178
Jan 28 04:53:01 microserver sshd[51214]: Failed password for invalid user ts2 from 190.64.68.178 port 50241 ssh2
Jan 28 04:57:37 microserver sshd[51673]: Invalid user teamspeak2 from 190.64.68.178 port 14721
Jan 28 04:57:37 microserver sshd[51673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178
Jan 30 18:53:14 microserver sshd[13293]: Invalid user ts2 from 190.64.68.178 port 29218
Jan 30 18:53:14 microserver sshd[13293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178
Jan 30 18:53:16 microserver sshd[13293]: Failed password for invalid user ts2 from 190.64.68.178 port 29218 ssh2
Jan 30 18:57:58 microserver sshd[13805]: Invalid user sysadmin from 190.64.68.178 port 6721
Jan 30
2019-11-16 16:06:55
27.72.92.178 attackspam
Unauthorised access (Nov 16) SRC=27.72.92.178 LEN=52 TTL=107 ID=6033 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-16 16:05:44
112.186.77.98 attack
2019-11-16T07:32:38.808037abusebot-2.cloudsearch.cf sshd\[13284\]: Invalid user ddtddt from 112.186.77.98 port 49610
2019-11-16 16:03:27
171.110.82.113 attack
Forbidden directory scan :: 2019/11/16 06:28:21 [error] 9952#9952: *309966 access forbidden by rule, client: 171.110.82.113, server: [censored_1], request: "GET /.../exchange-2010-how-to-create-a-distribution-list HTTP/1.1", host: "www.[censored_1]"
2019-11-16 15:46:48
88.84.200.139 attackbotsspam
Nov 16 08:54:25 vps647732 sshd[27127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139
Nov 16 08:54:27 vps647732 sshd[27127]: Failed password for invalid user operator from 88.84.200.139 port 39408 ssh2
...
2019-11-16 15:58:27

最近上报的IP列表

103.139.48.57 103.139.48.6 103.139.48.62 103.139.48.63
103.139.48.65 103.139.48.67 103.139.48.7 103.139.48.70
103.139.48.74 103.139.48.76 103.139.48.78 103.139.48.85
103.139.48.86 103.139.48.88 103.139.48.90 103.139.48.91
103.139.48.92 103.212.121.153 103.212.121.6 103.212.35.35