必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bekasi

省份(region): West Java

国家(country): Indonesia

运营商(isp): Esia

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.178.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.178.28.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:07 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
28.178.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-178-28.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.178.0.139.in-addr.arpa	name = fm-dyn-139-0-178-28.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.7.233.185 attack
Sep 20 20:03:38 havingfunrightnow sshd[3918]: Failed password for root from 157.7.233.185 port 62540 ssh2
Sep 20 20:08:10 havingfunrightnow sshd[4273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.233.185 
Sep 20 20:08:11 havingfunrightnow sshd[4273]: Failed password for invalid user test from 157.7.233.185 port 61019 ssh2
...
2020-09-21 02:44:19
117.254.63.154 attackbotsspam
1600534725 - 09/19/2020 18:58:45 Host: 117.254.63.154/117.254.63.154 Port: 445 TCP Blocked
...
2020-09-21 02:46:42
74.82.47.52 attack
Port scan denied
2020-09-21 02:57:27
110.171.139.220 attackspam
Port probing on unauthorized port 23
2020-09-21 03:10:37
2a01:cb09:8012:3a8d:3cae:7c43:e1:2367 attackspambots
ece-12 : Blocage des caractères return, carriage return, ...=>/%3C?php%20echo%20$item-%3Ethumb;%20?%3E(>)
2020-09-21 03:07:28
78.96.155.108 attackbotsspam
Automatic report - Port Scan Attack
2020-09-21 03:08:14
46.121.94.85 attackspambots
Found on   Alienvault    / proto=6  .  srcport=7021  .  dstport=5555  .     (2276)
2020-09-21 03:03:30
178.16.174.0 attack
Sep 20 20:20:41 s2 sshd[16096]: Failed password for root from 178.16.174.0 port 9491 ssh2
Sep 20 20:25:38 s2 sshd[16392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.16.174.0 
Sep 20 20:25:40 s2 sshd[16392]: Failed password for invalid user oracle from 178.16.174.0 port 33508 ssh2
2020-09-21 02:52:41
185.220.102.6 attackbots
Sep 20 12:09:16 ws26vmsma01 sshd[205835]: Failed password for root from 185.220.102.6 port 33301 ssh2
Sep 20 12:09:30 ws26vmsma01 sshd[205835]: error: maximum authentication attempts exceeded for root from 185.220.102.6 port 33301 ssh2 [preauth]
...
2020-09-21 02:50:33
5.196.217.178 attack
$f2bV_matches
2020-09-21 03:14:29
59.46.169.194 attackbots
20 attempts against mh-ssh on cloud
2020-09-21 03:04:02
46.182.21.248 attack
(sshd) Failed SSH login from 46.182.21.248 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 02:59:34 server5 sshd[17237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.21.248  user=root
Sep 20 02:59:37 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
Sep 20 02:59:39 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
Sep 20 02:59:42 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
Sep 20 02:59:43 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2
2020-09-21 03:13:34
103.254.209.201 attack
Sep 20 18:44:55 localhost sshd[4133790]: Failed password for root from 103.254.209.201 port 59179 ssh2
Sep 20 18:49:01 localhost sshd[4142518]: Invalid user admin from 103.254.209.201 port 36101
Sep 20 18:49:01 localhost sshd[4142518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.209.201 
Sep 20 18:49:01 localhost sshd[4142518]: Invalid user admin from 103.254.209.201 port 36101
Sep 20 18:49:02 localhost sshd[4142518]: Failed password for invalid user admin from 103.254.209.201 port 36101 ssh2
...
2020-09-21 03:12:57
184.105.247.222 attackspambots
 TCP (SYN) 184.105.247.222:60972 -> port 30005, len 44
2020-09-21 02:51:39
69.163.194.151 attack
[SatSep1918:58:20.9168192020][:error][pid2756:tid47838991030016][client69.163.194.151:48072][client69.163.194.151]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(wp-\)\?config\\\\\\\\.\(php\)\?\\\\\\\\.\(\?:bac\?k\|o\(\?:ld\|rig\)\|copy\|tmp\|s\(\?:ave\|wp\)\|vim\?\\\\\\\\.\|~\)"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"][line"1254"][id"390597"][rev"2"][msg"Atomicorp.comWAFRules:AttackBlocked-DataLeakage-attempttoaccessbackupsystem/applicationconfigfile\(disablethisruleonlyifyouwanttoallowanyoneaccesstothesebackupfiles\)"][severity"CRITICAL"][hostname"lacasadeitesori.com"][uri"/wp-config.php.bak"][unique_id"X2Y4rOnpg3w7ehOys6ZhKAAAAAc"][SatSep1918:58:27.8303522020][:error][pid3072:tid47838986827520][client69.163.194.151:48190][client69.163.194.151]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(wp-\)\?config\\\\\\\\.\(php\)\?\\\\\\\\.\(\?:bac\?k\|o\(\?:ld\|rig\)\|copy\|tmp\|s\(\?:ave\|wp\)\|vim\?\\\\\\\\.\|~\)"atREQUEST_FILENAME
2020-09-21 03:00:50

最近上报的IP列表

139.0.178.162 139.0.161.154 139.0.168.221 139.0.175.188
118.208.236.77 139.0.192.198 139.0.187.132 139.0.193.239
139.0.193.136 139.0.193.197 139.0.20.235 139.0.204.77
139.0.195.112 139.0.204.255 139.0.20.114 139.0.205.19
139.0.21.58 118.209.249.14 139.0.22.178 139.0.199.141