必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Science & Technology Network

主机名(hostname): unknown

机构(organization): Computer Network Information Center

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Sep  4 08:08:47 localhost sshd\[30962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.145  user=root
Sep  4 08:08:49 localhost sshd\[30962\]: Failed password for root from 124.16.139.145 port 49266 ssh2
Sep  4 08:13:02 localhost sshd\[31501\]: Invalid user oracle from 124.16.139.145 port 56322
2019-09-04 16:48:19
attackbotsspam
Aug 26 15:33:03 ubuntu-2gb-nbg1-dc3-1 sshd[19657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.145
Aug 26 15:33:05 ubuntu-2gb-nbg1-dc3-1 sshd[19657]: Failed password for invalid user tads from 124.16.139.145 port 55422 ssh2
...
2019-08-27 04:11:19
attack
2019-08-15T11:53:10.477964abusebot-6.cloudsearch.cf sshd\[30280\]: Invalid user tam from 124.16.139.145 port 41650
2019-08-16 04:20:29
相同子网IP讨论:
IP 类型 评论内容 时间
124.16.139.244 attack
Dec 22 18:15:50 OPSO sshd\[10200\]: Invalid user mcserver from 124.16.139.244 port 37514
Dec 22 18:15:50 OPSO sshd\[10200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.244
Dec 22 18:15:52 OPSO sshd\[10200\]: Failed password for invalid user mcserver from 124.16.139.244 port 37514 ssh2
Dec 22 18:21:57 OPSO sshd\[11510\]: Invalid user hung from 124.16.139.244 port 38977
Dec 22 18:21:57 OPSO sshd\[11510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.244
2019-12-23 01:31:40
124.16.139.244 attack
Dec 21 07:29:53 MK-Soft-VM5 sshd[24720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.244 
Dec 21 07:29:55 MK-Soft-VM5 sshd[24720]: Failed password for invalid user nt from 124.16.139.244 port 45923 ssh2
...
2019-12-21 15:17:20
124.16.139.243 attackspambots
Dec 19 01:38:20 sd-53420 sshd\[17252\]: Invalid user guest from 124.16.139.243
Dec 19 01:38:20 sd-53420 sshd\[17252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243
Dec 19 01:38:22 sd-53420 sshd\[17252\]: Failed password for invalid user guest from 124.16.139.243 port 50298 ssh2
Dec 19 01:45:35 sd-53420 sshd\[19864\]: Invalid user home from 124.16.139.243
Dec 19 01:45:35 sd-53420 sshd\[19864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243
...
2019-12-19 09:00:33
124.16.139.244 attack
Dec 18 15:36:12 MK-Soft-VM6 sshd[831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.244 
Dec 18 15:36:14 MK-Soft-VM6 sshd[831]: Failed password for invalid user giter from 124.16.139.244 port 45181 ssh2
...
2019-12-19 00:31:59
124.16.139.243 attackspam
Dec 17 12:33:10 sachi sshd\[6929\]: Invalid user mostofi from 124.16.139.243
Dec 17 12:33:10 sachi sshd\[6929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243
Dec 17 12:33:12 sachi sshd\[6929\]: Failed password for invalid user mostofi from 124.16.139.243 port 40312 ssh2
Dec 17 12:39:38 sachi sshd\[7615\]: Invalid user cristal from 124.16.139.243
Dec 17 12:39:38 sachi sshd\[7615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243
2019-12-18 06:53:51
124.16.139.243 attack
Dec 14 01:01:18 herz-der-gamer sshd[1307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243  user=mysql
Dec 14 01:01:20 herz-der-gamer sshd[1307]: Failed password for mysql from 124.16.139.243 port 59428 ssh2
Dec 14 01:11:16 herz-der-gamer sshd[1491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243  user=root
Dec 14 01:11:18 herz-der-gamer sshd[1491]: Failed password for root from 124.16.139.243 port 37106 ssh2
...
2019-12-14 09:06:24
124.16.139.244 attackspambots
$f2bV_matches
2019-12-12 06:22:05
124.16.139.243 attackspam
Invalid user wwwadmin from 124.16.139.243 port 39642
2019-12-11 22:44:29
124.16.139.243 attackbots
Dec  9 01:32:25 linuxvps sshd\[2942\]: Invalid user home from 124.16.139.243
Dec  9 01:32:25 linuxvps sshd\[2942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243
Dec  9 01:32:28 linuxvps sshd\[2942\]: Failed password for invalid user home from 124.16.139.243 port 48282 ssh2
Dec  9 01:39:08 linuxvps sshd\[7427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243  user=root
Dec  9 01:39:10 linuxvps sshd\[7427\]: Failed password for root from 124.16.139.243 port 42286 ssh2
2019-12-09 14:47:01
124.16.139.243 attackbotsspam
$f2bV_matches
2019-12-05 15:37:30
124.16.139.243 attack
Dec  5 00:55:14 plusreed sshd[7116]: Invalid user vvvvvvvv from 124.16.139.243
...
2019-12-05 13:59:02
124.16.139.243 attack
Automatic report - Banned IP Access
2019-11-05 19:36:42
124.16.139.243 attackspambots
Invalid user mongodb from 124.16.139.243 port 44377
2019-10-31 21:58:39
124.16.139.243 attack
Oct 29 15:03:02 server sshd\[18893\]: User root from 124.16.139.243 not allowed because listed in DenyUsers
Oct 29 15:03:02 server sshd\[18893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243  user=root
Oct 29 15:03:04 server sshd\[18893\]: Failed password for invalid user root from 124.16.139.243 port 54674 ssh2
Oct 29 15:08:01 server sshd\[1226\]: User root from 124.16.139.243 not allowed because listed in DenyUsers
Oct 29 15:08:01 server sshd\[1226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243  user=root
2019-10-30 03:43:32
124.16.139.243 attackspam
2019-10-24T08:40:09.212488scmdmz1 sshd\[12977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243  user=root
2019-10-24T08:40:10.688956scmdmz1 sshd\[12977\]: Failed password for root from 124.16.139.243 port 57888 ssh2
2019-10-24T08:44:30.849142scmdmz1 sshd\[13293\]: Invalid user lucasb from 124.16.139.243 port 47370
...
2019-10-24 14:48:21
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.16.139.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31130
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.16.139.145.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081502 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 16 04:20:22 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 145.139.16.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 145.139.16.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.196.201.7 attackspam
Nov  9 21:08:12 mail postfix/smtpd[29923]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 21:16:34 mail postfix/smtpd[31928]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 21:17:25 mail postfix/smtpd[1437]: warning: unknown[5.196.201.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-10 04:25:43
101.255.90.234 attackspam
Unauthorized connection attempt from IP address 101.255.90.234 on Port 445(SMB)
2019-11-10 04:28:13
222.186.30.59 attackbots
Nov  9 21:21:18 SilenceServices sshd[23595]: Failed password for root from 222.186.30.59 port 45100 ssh2
Nov  9 21:21:21 SilenceServices sshd[23595]: Failed password for root from 222.186.30.59 port 45100 ssh2
Nov  9 21:21:22 SilenceServices sshd[23642]: Failed password for root from 222.186.30.59 port 11673 ssh2
2019-11-10 04:29:53
167.71.47.231 attackspambots
Nov  9 17:47:49 srv-ubuntu-dev3 sshd[41180]: Invalid user jessica from 167.71.47.231
Nov  9 17:47:49 srv-ubuntu-dev3 sshd[41180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.231
Nov  9 17:47:49 srv-ubuntu-dev3 sshd[41180]: Invalid user jessica from 167.71.47.231
Nov  9 17:47:51 srv-ubuntu-dev3 sshd[41180]: Failed password for invalid user jessica from 167.71.47.231 port 38868 ssh2
Nov  9 17:51:22 srv-ubuntu-dev3 sshd[41462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.231  user=root
Nov  9 17:51:25 srv-ubuntu-dev3 sshd[41462]: Failed password for root from 167.71.47.231 port 48042 ssh2
Nov  9 17:54:55 srv-ubuntu-dev3 sshd[41698]: Invalid user ftpuser from 167.71.47.231
Nov  9 17:54:55 srv-ubuntu-dev3 sshd[41698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.231
Nov  9 17:54:55 srv-ubuntu-dev3 sshd[41698]: Invalid user ftpuser f
...
2019-11-10 04:20:16
45.136.110.46 attack
firewall-block, port(s): 5686/tcp, 5882/tcp, 5950/tcp, 6171/tcp, 6500/tcp, 6511/tcp, 6519/tcp, 6601/tcp
2019-11-10 04:16:33
60.249.193.205 attackspambots
Unauthorized connection attempt from IP address 60.249.193.205 on Port 445(SMB)
2019-11-10 04:27:41
106.13.188.147 attackbotsspam
Nov  9 16:16:22 ms-srv sshd[55629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.188.147  user=root
Nov  9 16:16:24 ms-srv sshd[55629]: Failed password for invalid user root from 106.13.188.147 port 49636 ssh2
2019-11-10 04:02:26
58.69.162.235 attackspambots
Unauthorized connection attempt from IP address 58.69.162.235 on Port 445(SMB)
2019-11-10 04:29:32
190.206.52.244 attackspambots
Unauthorized connection attempt from IP address 190.206.52.244 on Port 445(SMB)
2019-11-10 03:59:33
45.117.30.26 attack
Unauthorized connection attempt from IP address 45.117.30.26 on Port 445(SMB)
2019-11-10 04:23:25
80.211.50.102 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-10 04:02:57
185.176.27.38 attack
185.176.27.38 was recorded 16 times by 13 hosts attempting to connect to the following ports: 20202,19999,20200. Incident counter (4h, 24h, all-time): 16, 62, 379
2019-11-10 04:30:35
37.187.181.182 attackbots
Nov  9 08:08:14 hanapaa sshd\[16836\]: Invalid user zx1003 from 37.187.181.182
Nov  9 08:08:14 hanapaa sshd\[16836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu
Nov  9 08:08:15 hanapaa sshd\[16836\]: Failed password for invalid user zx1003 from 37.187.181.182 port 35922 ssh2
Nov  9 08:12:04 hanapaa sshd\[17253\]: Invalid user train123 from 37.187.181.182
Nov  9 08:12:04 hanapaa sshd\[17253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu
2019-11-10 04:14:34
114.5.81.67 attackbotsspam
Nov  9 16:15:59 venus sshd\[7966\]: Invalid user pi from 114.5.81.67 port 41662
Nov  9 16:15:59 venus sshd\[7968\]: Invalid user pi from 114.5.81.67 port 41668
Nov  9 16:15:59 venus sshd\[7966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.81.67
...
2019-11-10 04:24:15
173.249.11.230 attackbots
Caught in portsentry honeypot
2019-11-10 04:06:37

最近上报的IP列表

121.126.72.27 5.182.210.47 200.253.27.109 191.101.199.47
136.217.106.31 104.30.165.73 206.58.69.56 62.234.95.55
36.236.15.33 97.45.163.85 31.124.253.141 53.133.6.194
189.104.43.28 32.56.34.162 191.162.235.241 180.214.34.25
213.131.57.68 89.135.75.249 78.197.178.148 185.63.199.154