必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): PT. First Media TBK

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspam
IP: 139.0.233.220
ASN: AS23700 Linknet-Fastnet ASN
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 28/07/2019 1:13:42 AM UTC
2019-07-28 11:30:12
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.233.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21438
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.0.233.220.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 11:30:04 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
220.233.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-233-220.fast.net.id.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
220.233.0.139.in-addr.arpa	name = fm-dyn-139-0-233-220.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.52.43.110 attackspambots
Automatic report - Banned IP Access
2020-07-31 06:11:14
159.89.174.224 attackbotsspam
SSH Invalid Login
2020-07-31 06:31:29
60.13.230.199 attackspam
Jul 30 17:50:49 NPSTNNYC01T sshd[6566]: Failed password for root from 60.13.230.199 port 48498 ssh2
Jul 30 17:55:20 NPSTNNYC01T sshd[6947]: Failed password for root from 60.13.230.199 port 55996 ssh2
...
2020-07-31 06:12:17
159.65.128.182 attackspambots
SSH Invalid Login
2020-07-31 06:25:47
78.36.2.160 attackspam
1596140507 - 07/30/2020 22:21:47 Host: 78.36.2.160/78.36.2.160 Port: 445 TCP Blocked
2020-07-31 06:10:28
122.51.169.118 attackspam
2020-07-30T23:20:19+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-07-31 06:12:54
164.90.208.214 attack
xmlrpc attack
2020-07-31 06:25:32
128.199.121.32 attackbotsspam
SSH Invalid Login
2020-07-31 06:08:59
106.75.231.107 attackbotsspam
Jul 31 00:24:03 vps647732 sshd[23077]: Failed password for root from 106.75.231.107 port 52458 ssh2
...
2020-07-31 06:29:58
116.239.253.57 attack
Jul 30 09:07:21 georgia postfix/smtpd[64194]: connect from unknown[116.239.253.57]
Jul 30 09:07:22 georgia postfix/smtpd[64194]: warning: unknown[116.239.253.57]: SASL LOGIN authentication failed: authentication failure
Jul 30 09:07:22 georgia postfix/smtpd[64194]: lost connection after AUTH from unknown[116.239.253.57]
Jul 30 09:07:22 georgia postfix/smtpd[64194]: disconnect from unknown[116.239.253.57] ehlo=1 auth=0/1 commands=1/2
Jul 30 09:07:26 georgia postfix/smtpd[64194]: connect from unknown[116.239.253.57]
Jul 30 09:07:27 georgia postfix/smtpd[64194]: warning: unknown[116.239.253.57]: SASL LOGIN authentication failed: authentication failure
Jul 30 09:07:27 georgia postfix/smtpd[64194]: lost connection after AUTH from unknown[116.239.253.57]
Jul 30 09:07:27 georgia postfix/smtpd[64194]: disconnect from unknown[116.239.253.57] ehlo=1 auth=0/1 commands=1/2
Jul 30 09:07:27 georgia postfix/smtpd[64194]: connect from unknown[116.239.253.57]
Jul 30 09:24:14 georgia pos........
-------------------------------
2020-07-31 06:16:56
211.43.13.243 attack
SSH Invalid Login
2020-07-31 06:17:30
106.13.60.222 attackbotsspam
SSH Invalid Login
2020-07-31 06:13:09
129.204.253.6 attackbots
Jul 28 06:50:33 rudra sshd[18396]: Invalid user maxuefeng from 129.204.253.6
Jul 28 06:50:33 rudra sshd[18396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.253.6 
Jul 28 06:50:35 rudra sshd[18396]: Failed password for invalid user maxuefeng from 129.204.253.6 port 41846 ssh2
Jul 28 06:50:35 rudra sshd[18396]: Received disconnect from 129.204.253.6: 11: Bye Bye [preauth]
Jul 28 06:55:15 rudra sshd[19392]: Invalid user lizhipeng from 129.204.253.6
Jul 28 06:55:15 rudra sshd[19392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.253.6 
Jul 28 06:55:17 rudra sshd[19392]: Failed password for invalid user lizhipeng from 129.204.253.6 port 60708 ssh2
Jul 28 06:55:17 rudra sshd[19392]: Received disconnect from 129.204.253.6: 11: Bye Bye [preauth]
Jul 28 06:58:07 rudra sshd[19719]: Invalid user zlg from 129.204.253.6
Jul 28 06:58:07 rudra sshd[19719]: pam_unix(sshd:auth): authent........
-------------------------------
2020-07-31 06:35:43
203.162.54.246 attack
Jul 30 22:19:29 game-panel sshd[13121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.54.246
Jul 30 22:19:30 game-panel sshd[13121]: Failed password for invalid user mgarcia from 203.162.54.246 port 34108 ssh2
Jul 30 22:24:03 game-panel sshd[13311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.54.246
2020-07-31 06:31:00
106.13.37.170 attack
Jul 30 17:12:54 ws24vmsma01 sshd[201876]: Failed password for root from 106.13.37.170 port 47676 ssh2
Jul 30 17:21:16 ws24vmsma01 sshd[240674]: Failed password for root from 106.13.37.170 port 59420 ssh2
...
2020-07-31 06:33:31

最近上报的IP列表

69.124.141.61 177.85.92.222 125.119.34.107 124.253.242.68
64.185.155.81 129.205.112.228 123.17.145.158 123.16.61.222
172.217.8.1 168.196.96.62 123.125.218.66 171.228.25.227
49.67.164.174 121.231.43.89 46.1.46.211 121.124.21.72
23.236.18.3 39.57.192.23 87.120.36.232 51.7.227.107