必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.139.199.169 attack
Invalid user in from 119.139.199.169 port 39462
2020-04-30 03:28:17
119.139.199.169 attack
Lines containing failures of 119.139.199.169
Apr 17 11:09:22 icinga sshd[18483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169  user=r.r
Apr 17 11:09:24 icinga sshd[18483]: Failed password for r.r from 119.139.199.169 port 57084 ssh2
Apr 17 11:09:24 icinga sshd[18483]: Received disconnect from 119.139.199.169 port 57084:11: Bye Bye [preauth]
Apr 17 11:09:24 icinga sshd[18483]: Disconnected from authenticating user r.r 119.139.199.169 port 57084 [preauth]
Apr 17 11:21:07 icinga sshd[21716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169  user=r.r
Apr 17 11:21:09 icinga sshd[21716]: Failed password for r.r from 119.139.199.169 port 43960 ssh2
Apr 17 11:21:10 icinga sshd[21716]: Received disconnect from 119.139.199.169 port 43960:11: Bye Bye [preauth]
Apr 17 11:21:10 icinga sshd[21716]: Disconnected from authenticating user r.r 119.139.199.169 port 43960 [preau........
------------------------------
2020-04-19 01:39:46
119.139.199.169 attack
2020-04-17T10:48:08.655006abusebot.cloudsearch.cf sshd[26084]: Invalid user admin from 119.139.199.169 port 46566
2020-04-17T10:48:08.661391abusebot.cloudsearch.cf sshd[26084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169
2020-04-17T10:48:08.655006abusebot.cloudsearch.cf sshd[26084]: Invalid user admin from 119.139.199.169 port 46566
2020-04-17T10:48:10.309493abusebot.cloudsearch.cf sshd[26084]: Failed password for invalid user admin from 119.139.199.169 port 46566 ssh2
2020-04-17T10:55:26.679947abusebot.cloudsearch.cf sshd[26755]: Invalid user um from 119.139.199.169 port 37730
2020-04-17T10:55:26.686051abusebot.cloudsearch.cf sshd[26755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169
2020-04-17T10:55:26.679947abusebot.cloudsearch.cf sshd[26755]: Invalid user um from 119.139.199.169 port 37730
2020-04-17T10:55:29.131833abusebot.cloudsearch.cf sshd[26755]: Failed passwor
...
2020-04-17 22:33:21
119.139.199.28 attackspambots
Feb 28 10:44:00 liveconfig01 sshd[30775]: Connection closed by 119.139.199.28 port 22309 [preauth]
Feb 28 10:57:57 liveconfig01 sshd[31448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.28  user=mysql
Feb 28 10:57:58 liveconfig01 sshd[31448]: Failed password for mysql from 119.139.199.28 port 10332 ssh2
Feb 28 10:57:59 liveconfig01 sshd[31448]: Received disconnect from 119.139.199.28 port 10332:11: Normal Shutdown [preauth]
Feb 28 10:57:59 liveconfig01 sshd[31448]: Disconnected from 119.139.199.28 port 10332 [preauth]
Feb 28 11:05:20 liveconfig01 sshd[31756]: Invalid user www from 119.139.199.28
Feb 28 11:05:20 liveconfig01 sshd[31756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.28
Feb 28 11:05:22 liveconfig01 sshd[31756]: Failed password for invalid user www from 119.139.199.28 port 36332 ssh2
Feb 28 11:05:22 liveconfig01 sshd[31756]: Received disconnect from........
-------------------------------
2020-03-01 23:40:57
119.139.199.28 attackspambots
$f2bV_matches
2020-02-29 16:03:05
119.139.199.146 attackbotsspam
Unauthorized connection attempt detected from IP address 119.139.199.146 to port 1433
2019-12-31 08:51:57
119.139.199.173 attackspam
Aug 16 21:10:31 tdfoods sshd\[3976\]: Invalid user aok from 119.139.199.173
Aug 16 21:10:31 tdfoods sshd\[3976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.173
Aug 16 21:10:33 tdfoods sshd\[3976\]: Failed password for invalid user aok from 119.139.199.173 port 51018 ssh2
Aug 16 21:17:45 tdfoods sshd\[4615\]: Invalid user kafka from 119.139.199.173
Aug 16 21:17:45 tdfoods sshd\[4615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.173
2019-08-17 21:51:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.139.199.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.139.199.250.		IN	A

;; AUTHORITY SECTION:
.			320	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:03:56 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 250.199.139.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 250.199.139.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.191.0.3 attackspam
Invalid user nagios from 118.191.0.3 port 51730
2019-10-30 06:59:00
83.169.202.2 attackbotsspam
Unauthorized connection attempt from IP address 83.169.202.2 on Port 445(SMB)
2019-10-30 06:28:15
147.135.156.89 attackspam
Oct 29 10:46:49 *** sshd[30012]: Failed password for invalid user dev2 from 147.135.156.89 port 34716 ssh2
Oct 29 11:34:36 *** sshd[30921]: Failed password for invalid user steam1 from 147.135.156.89 port 53804 ssh2
Oct 29 11:56:56 *** sshd[31327]: Failed password for invalid user pc from 147.135.156.89 port 36474 ssh2
Oct 29 12:00:41 *** sshd[31388]: Failed password for invalid user ts from 147.135.156.89 port 47702 ssh2
Oct 29 12:08:11 *** sshd[31549]: Failed password for invalid user test from 147.135.156.89 port 41934 ssh2
Oct 29 12:11:56 *** sshd[31651]: Failed password for invalid user ds from 147.135.156.89 port 53158 ssh2
Oct 29 12:34:30 *** sshd[32021]: Failed password for invalid user nz from 147.135.156.89 port 35836 ssh2
Oct 29 12:42:00 *** sshd[32196]: Failed password for invalid user openfire from 147.135.156.89 port 58282 ssh2
Oct 29 12:49:33 *** sshd[32368]: Failed password for invalid user ftpuser from 147.135.156.89 port 52522 ssh2
Oct 29 13:12:29 *** sshd[516]: Failed password for invalid u
2019-10-30 06:26:28
95.64.119.106 attackbots
Unauthorized connection attempt from IP address 95.64.119.106 on Port 445(SMB)
2019-10-30 06:32:38
190.147.159.34 attackspam
Oct 29 09:56:59 web9 sshd\[6000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.159.34  user=root
Oct 29 09:57:01 web9 sshd\[6000\]: Failed password for root from 190.147.159.34 port 55286 ssh2
Oct 29 10:01:23 web9 sshd\[6584\]: Invalid user heng from 190.147.159.34
Oct 29 10:01:23 web9 sshd\[6584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.159.34
Oct 29 10:01:25 web9 sshd\[6584\]: Failed password for invalid user heng from 190.147.159.34 port 46389 ssh2
2019-10-30 06:25:17
141.105.89.89 attackspam
Automatic report - XMLRPC Attack
2019-10-30 06:54:51
77.29.255.253 attackspam
Unauthorized connection attempt from IP address 77.29.255.253 on Port 445(SMB)
2019-10-30 06:59:52
123.206.80.113 attackbots
Oct 29 22:20:45 vmanager6029 sshd\[765\]: Invalid user trendimsa1.0 from 123.206.80.113 port 50860
Oct 29 22:20:45 vmanager6029 sshd\[765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.80.113
Oct 29 22:20:47 vmanager6029 sshd\[765\]: Failed password for invalid user trendimsa1.0 from 123.206.80.113 port 50860 ssh2
2019-10-30 06:53:24
130.211.246.128 attack
Oct 29 23:35:24 cavern sshd[30854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.211.246.128
2019-10-30 06:42:23
14.162.144.39 attackspam
Unauthorized connection attempt from IP address 14.162.144.39 on Port 445(SMB)
2019-10-30 07:01:29
200.122.249.203 attackspam
Invalid user mhasan from 200.122.249.203 port 39997
2019-10-30 06:50:43
110.139.76.216 attackbotsspam
Unauthorized connection attempt from IP address 110.139.76.216 on Port 445(SMB)
2019-10-30 06:34:18
189.47.25.82 attackspambots
Unauthorized connection attempt from IP address 189.47.25.82 on Port 445(SMB)
2019-10-30 06:33:29
41.235.130.206 attack
Brute force attempt
2019-10-30 06:28:32
106.0.6.33 attack
Fail2Ban Ban Triggered
2019-10-30 06:26:51

最近上报的IP列表

119.139.199.34 119.139.199.64 119.139.199.50 119.139.33.224
119.139.35.111 119.139.33.17 119.14.117.31 119.139.199.77
119.14.147.69 119.14.118.37 119.14.16.24 119.14.160.222
116.72.203.219 119.14.60.73 119.14.21.63 119.14.37.180
119.14.7.50 116.72.251.146 116.72.53.210 116.72.57.94