必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): Viettel Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
1576621576 - 12/17/2019 23:26:16 Host: 117.2.139.91/117.2.139.91 Port: 445 TCP Blocked
2019-12-18 07:26:14
相同子网IP讨论:
IP 类型 评论内容 时间
117.2.139.117 attackbots
20/3/8@23:47:04: FAIL: Alarm-Network address from=117.2.139.117
...
2020-03-09 17:13:09
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.2.139.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.2.139.91.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121702 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 18 07:26:07 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
91.139.2.117.in-addr.arpa domain name pointer localhost.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.139.2.117.in-addr.arpa	name = localhost.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.92.227.19 attackspam
SSH Brute-Force reported by Fail2Ban
2019-08-07 03:27:03
46.101.206.205 attackspam
Automatic report - Banned IP Access
2019-08-07 03:43:58
35.240.122.31 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-08-07 03:32:41
134.175.89.186 attackbots
Aug  6 07:49:25 master sshd[21718]: Failed password for invalid user invitado from 134.175.89.186 port 44156 ssh2
Aug  6 08:18:18 master sshd[22042]: Failed password for invalid user appli from 134.175.89.186 port 33104 ssh2
Aug  6 08:29:18 master sshd[22057]: Failed password for invalid user mailman1 from 134.175.89.186 port 47576 ssh2
Aug  6 08:34:42 master sshd[22367]: Failed password for invalid user kaiju from 134.175.89.186 port 40392 ssh2
Aug  6 08:40:54 master sshd[22373]: Failed password for invalid user cvsuser from 134.175.89.186 port 33360 ssh2
Aug  6 08:46:30 master sshd[22392]: Failed password for invalid user test from 134.175.89.186 port 54592 ssh2
Aug  6 08:52:03 master sshd[22398]: Failed password for invalid user test from 134.175.89.186 port 47660 ssh2
Aug  6 08:57:31 master sshd[22410]: Failed password for invalid user holger from 134.175.89.186 port 40820 ssh2
Aug  6 09:03:14 master sshd[22722]: Failed password for invalid user samples from 134.175.89.186 port 33858 ssh2
Aug  6 09:08:40
2019-08-07 03:49:57
176.31.123.76 attack
Sniffing for wp-login
2019-08-07 02:56:47
105.186.159.148 attackspam
DATE:2019-08-06 13:13:44, IP:105.186.159.148, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-08-07 03:37:58
178.62.239.249 attackspambots
Automated report - ssh fail2ban:
Aug 6 13:08:03 authentication failure 
Aug 6 13:08:05 wrong password, user=zen, port=34826, ssh2
Aug 6 13:14:24 authentication failure
2019-08-07 03:15:12
223.244.100.31 attackspambots
Aug620:34:00server2pure-ftpd:\(\?@223.244.100.31\)[WARNING]Authenticationfailedforuser[anonymous]Aug620:34:06server2pure-ftpd:\(\?@223.244.100.31\)[WARNING]Authenticationfailedforuser[maurokorangraf]Aug620:34:11server2pure-ftpd:\(\?@223.244.100.31\)[WARNING]Authenticationfailedforuser[maurokorangraf]Aug620:34:17server2pure-ftpd:\(\?@223.244.100.31\)[WARNING]Authenticationfailedforuser[maurokorangraf]Aug620:34:22server2pure-ftpd:\(\?@223.244.100.31\)[WARNING]Authenticationfailedforuser[maurokorangraf]
2019-08-07 03:36:41
193.188.22.188 attackspambots
2019-08-07T01:27:42.477439enmeeting.mahidol.ac.th sshd\[27681\]: Invalid user admin from 193.188.22.188 port 32214
2019-08-07T01:27:42.735745enmeeting.mahidol.ac.th sshd\[27681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188
2019-08-07T01:27:44.271019enmeeting.mahidol.ac.th sshd\[27681\]: Failed password for invalid user admin from 193.188.22.188 port 32214 ssh2
...
2019-08-07 02:57:37
104.194.69.10 attackspam
Aug  6 19:03:45 MK-Soft-VM7 sshd\[27225\]: Invalid user yu from 104.194.69.10 port 38106
Aug  6 19:03:45 MK-Soft-VM7 sshd\[27225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.194.69.10
Aug  6 19:03:48 MK-Soft-VM7 sshd\[27225\]: Failed password for invalid user yu from 104.194.69.10 port 38106 ssh2
...
2019-08-07 03:14:36
96.57.28.210 attackbotsspam
Aug  6 15:51:33 vps691689 sshd[13849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.57.28.210
Aug  6 15:51:35 vps691689 sshd[13849]: Failed password for invalid user ftp from 96.57.28.210 port 53499 ssh2
...
2019-08-07 03:33:30
165.227.18.169 attackspam
Aug  6 20:35:25 srv-4 sshd\[14726\]: Invalid user jrun from 165.227.18.169
Aug  6 20:35:25 srv-4 sshd\[14726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.18.169
Aug  6 20:35:28 srv-4 sshd\[14726\]: Failed password for invalid user jrun from 165.227.18.169 port 38964 ssh2
...
2019-08-07 03:25:42
106.51.141.20 attackspam
Automatic report - Banned IP Access
2019-08-07 03:35:12
94.176.64.125 attack
(Aug  6)  LEN=40 TTL=244 ID=57156 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=50096 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=49677 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=5166 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=28923 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=16108 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=39580 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=25313 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=41403 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=9983 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  6)  LEN=40 TTL=244 ID=20644 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  5)  LEN=40 TTL=244 ID=25875 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  5)  LEN=40 TTL=244 ID=32034 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  5)  LEN=40 TTL=244 ID=15637 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug  5)  LEN=40 TTL=244 ID=347 DF TCP DPT=23 WINDOW=14600 SYN ...
2019-08-07 03:19:20
122.116.184.131 attack
19/8/6@07:14:12: FAIL: Alarm-Intrusion address from=122.116.184.131
...
2019-08-07 03:23:54

最近上报的IP列表

165.22.205.254 41.249.250.209 113.23.81.168 151.80.12.8
79.106.24.116 143.176.18.30 123.7.55.216 40.92.66.13
40.74.78.4 219.85.63.109 160.20.145.205 80.0.24.49
64.225.59.225 118.114.237.85 209.141.62.184 94.99.49.125
5.104.38.89 190.117.151.78 158.69.57.32 113.57.166.210