必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (Republic of)

运营商(isp): CJ Hello Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Unauthorized connection attempt detected from IP address 113.131.139.144 to port 5555 [T]
2020-01-29 17:04:21
attackspam
Unauthorized connection attempt detected from IP address 113.131.139.144 to port 5555 [J]
2020-01-27 14:46:48
相同子网IP讨论:
IP 类型 评论内容 时间
113.131.139.22 attack
Port scan denied
2020-07-13 23:08:28
113.131.139.22 attackspam
Rds Attack
2020-06-11 06:04:02
113.131.139.141 attackspambots
Jun 24 03:45:15 itv-usvr-01 sshd[31702]: Invalid user ireneusz from 113.131.139.141
Jun 24 03:45:15 itv-usvr-01 sshd[31702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.131.139.141
Jun 24 03:45:15 itv-usvr-01 sshd[31702]: Invalid user ireneusz from 113.131.139.141
Jun 24 03:45:18 itv-usvr-01 sshd[31702]: Failed password for invalid user ireneusz from 113.131.139.141 port 24118 ssh2
Jun 24 03:46:53 itv-usvr-01 sshd[31731]: Invalid user ranjeet from 113.131.139.141
2019-06-24 09:03:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.131.139.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.131.139.144.		IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012700 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 14:46:45 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 144.139.131.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.139.131.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.213.115.249 attackbotsspam
$f2bV_matches
2020-05-13 04:05:18
198.108.66.203 attack
scan z
2020-05-13 03:51:56
121.150.11.243 attackspam
Unauthorized connection attempt detected from IP address 121.150.11.243 to port 23
2020-05-13 03:25:00
200.162.228.80 attackbotsspam
Unauthorized connection attempt detected from IP address 200.162.228.80 to port 23
2020-05-13 03:49:33
109.155.70.222 attackspambots
Unauthorized connection attempt detected from IP address 109.155.70.222 to port 81
2020-05-13 04:04:12
223.71.167.164 attackspambots
SmallBizIT.US 9 packets to tcp(789,1234,2323,5222,8088,8161,8554,9002,11310)
2020-05-13 03:45:20
200.37.189.37 attackbots
Unauthorized connection attempt detected from IP address 200.37.189.37 to port 23
2020-05-13 03:51:42
173.76.219.13 attackspambots
Unauthorized connection attempt detected from IP address 173.76.219.13 to port 23
2020-05-13 04:00:44
190.217.4.150 attackbots
Unauthorized connection attempt detected from IP address 190.217.4.150 to port 8089
2020-05-13 03:54:35
78.189.16.133 attack
Unauthorized connection attempt detected from IP address 78.189.16.133 to port 23
2020-05-13 03:37:25
101.96.121.142 attack
Unauthorized connection attempt from IP address 101.96.121.142 on Port 445(SMB)
2020-05-13 03:28:17
188.2.161.160 attackbots
Unauthorized connection attempt from IP address 188.2.161.160 on Port 445(SMB)
2020-05-13 03:56:33
95.214.52.21 attack
Unauthorized connection attempt detected from IP address 95.214.52.21 to port 23
2020-05-13 03:29:22
50.251.120.113 attackbots
Unauthorized connection attempt detected from IP address 50.251.120.113 to port 8089
2020-05-13 03:41:58
78.22.105.173 attack
Unauthorized connection attempt detected from IP address 78.22.105.173 to port 2323
2020-05-13 03:38:22

最近上报的IP列表

85.144.22.101 47.205.188.9 222.116.253.48 120.99.40.165
125.48.35.146 37.204.144.53 212.45.241.184 240.140.164.0
27.224.136.188 188.2.60.15 76.33.218.198 15.124.130.214
162.122.31.37 2.49.144.82 220.141.55.140 220.132.1.64
212.77.138.155 62.233.255.121 200.194.12.37 200.146.248.82