必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bogor

省份(region): West Java

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.16.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.16.202.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:06 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
202.16.0.139.in-addr.arpa domain name pointer ln-static-139-0-16-202.link.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
202.16.0.139.in-addr.arpa	name = ln-static-139-0-16-202.link.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.210.104.131 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 00:48:13,765 INFO [shellcode_manager] (201.210.104.131) no match, writing hexdump (8ffc2529c0241a83eda74b5c05290290 :17940) - SMB (Unknown)
2019-07-17 14:54:36
177.154.234.126 attack
$f2bV_matches
2019-07-17 15:12:25
128.134.187.155 attackspambots
Mar 17 14:07:24 vtv3 sshd\[30544\]: Invalid user sinusbot from 128.134.187.155 port 57504
Mar 17 14:07:24 vtv3 sshd\[30544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.155
Mar 17 14:07:26 vtv3 sshd\[30544\]: Failed password for invalid user sinusbot from 128.134.187.155 port 57504 ssh2
Mar 17 14:14:04 vtv3 sshd\[738\]: Invalid user admin from 128.134.187.155 port 37412
Mar 17 14:14:04 vtv3 sshd\[738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.155
Mar 21 07:58:16 vtv3 sshd\[3822\]: Invalid user ftphome from 128.134.187.155 port 36610
Mar 21 07:58:16 vtv3 sshd\[3822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.155
Mar 21 07:58:18 vtv3 sshd\[3822\]: Failed password for invalid user ftphome from 128.134.187.155 port 36610 ssh2
Mar 21 08:03:13 vtv3 sshd\[5768\]: Invalid user take from 128.134.187.155 port 44712
Mar 21 08:03:13 vtv3 s
2019-07-17 15:21:50
187.84.169.63 attackspam
Excessive failed login attempts on port 587
2019-07-17 15:17:12
46.101.163.220 attack
17.07.2019 06:14:30 SSH access blocked by firewall
2019-07-17 14:36:51
45.55.41.232 attack
Jul 17 06:13:58 MK-Soft-VM4 sshd\[26407\]: Invalid user peter from 45.55.41.232 port 34502
Jul 17 06:13:58 MK-Soft-VM4 sshd\[26407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.41.232
Jul 17 06:14:00 MK-Soft-VM4 sshd\[26407\]: Failed password for invalid user peter from 45.55.41.232 port 34502 ssh2
...
2019-07-17 15:02:16
122.114.10.7 attackbotsspam
Automatic report generated by Wazuh
2019-07-17 14:52:53
106.12.199.98 attackbotsspam
Jul 17 08:10:25 vps691689 sshd[12362]: Failed password for root from 106.12.199.98 port 41072 ssh2
Jul 17 08:14:08 vps691689 sshd[12383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.98
...
2019-07-17 14:55:58
92.253.111.93 attackbots
Jul 17 08:08:50 dev0-dcde-rnet sshd[20240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.253.111.93
Jul 17 08:08:51 dev0-dcde-rnet sshd[20240]: Failed password for invalid user inssserver from 92.253.111.93 port 38994 ssh2
Jul 17 08:26:53 dev0-dcde-rnet sshd[20311]: Failed password for root from 92.253.111.93 port 60560 ssh2
2019-07-17 14:56:17
189.62.155.72 attack
Jul 17 08:34:28 localhost sshd\[7598\]: Invalid user yeti from 189.62.155.72 port 34881
Jul 17 08:34:28 localhost sshd\[7598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.62.155.72
Jul 17 08:34:29 localhost sshd\[7598\]: Failed password for invalid user yeti from 189.62.155.72 port 34881 ssh2
2019-07-17 14:45:27
153.127.8.122 attack
Automatic report - Banned IP Access
2019-07-17 15:13:15
77.247.108.119 attackbotsspam
" "
2019-07-17 14:38:38
78.46.110.58 attack
Jul 17 08:13:53 mintao sshd\[12841\]: Address 78.46.110.58 maps to ten-guitars.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!\
Jul 17 08:14:09 mintao sshd\[12867\]: Address 78.46.110.58 maps to ten-guitars.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!\
2019-07-17 14:53:39
183.90.238.41 attack
Received: from sv2340.xserver.jp (sv2340.xserver.jp [183.90.238.41])
Received: from virusgw2301.xserver.jp (virusgw2301.xserver.jp [183.90.238.243])
Received: from sv2340.xserver.jp (183.90.238.41)
 by virusgw2301.xserver.jp (F-Secure/fsigk_smtp/521/virusgw2301.xserver.jp);
Received: from localhost.localdomain (v133-130-126-241.a059.g.tyo1.static.cnode.io [133.130.126.241])
NETFLIX FRAUD/PHISHING MAIL
2019-07-17 14:34:04
197.214.10.4 attackspam
Jul 17 09:14:21 srv-4 sshd\[3246\]: Invalid user admin from 197.214.10.4
Jul 17 09:14:21 srv-4 sshd\[3246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.214.10.4
Jul 17 09:14:23 srv-4 sshd\[3246\]: Failed password for invalid user admin from 197.214.10.4 port 4931 ssh2
...
2019-07-17 14:41:16

最近上报的IP列表

139.0.178.217 139.0.18.250 139.0.178.162 139.0.178.28
139.0.161.154 139.0.168.221 139.0.175.188 118.208.236.77
139.0.192.198 139.0.187.132 139.0.193.239 139.0.193.136
139.0.193.197 139.0.20.235 139.0.204.77 139.0.195.112
139.0.204.255 139.0.20.114 139.0.205.19 139.0.21.58