必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.111.98 spamattack
Unauthorized connection attempt detected from IP address 139.162.111.98 to port 8080
2020-11-19 17:15:48
139.162.116.133 attack
Malicious brute force vulnerability hacking attacks
2020-10-14 07:39:12
139.162.122.110 attackbots
Oct 12 19:13:22 ssh2 sshd[79460]: Connection from 139.162.122.110 port 52476 on 192.240.101.3 port 22
Oct 12 19:13:23 ssh2 sshd[79460]: Invalid user  from 139.162.122.110 port 52476
Oct 12 19:13:23 ssh2 sshd[79460]: Failed none for invalid user  from 139.162.122.110 port 52476 ssh2
...
2020-10-13 03:35:33
139.162.122.110 attack
Oct 12 09:33:08 nopemail auth.info sshd[1766]: Invalid user  from 139.162.122.110 port 35870
...
2020-10-12 19:07:41
139.162.147.137 attack
Unauthorized connection attempt detected from IP address 139.162.147.137 to port 139
2020-10-12 06:11:53
139.162.147.137 attackspam
Unauthorized connection attempt detected from IP address 139.162.147.137 to port 139
2020-10-11 22:21:03
139.162.147.137 attackspambots
Use Brute-Force
2020-10-11 14:17:25
139.162.147.137 attack
Use Brute-Force
2020-10-11 07:40:30
139.162.122.110 attackbots
Oct  7 19:35:03 nopemail auth.info sshd[3958]: Invalid user  from 139.162.122.110 port 47128
...
2020-10-08 01:50:52
139.162.122.110 attackbots
SSH login attempts.
2020-10-07 17:59:19
139.162.112.248 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-06 04:15:47
139.162.114.154 attackbots
 TCP (SYN) 139.162.114.154:55866 -> port 80, len 40
2020-10-06 03:23:05
139.162.121.165 attack
 TCP (SYN) 139.162.121.165:60337 -> port 8080, len 44
2020-10-06 02:06:39
139.162.112.248 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 8080 8080
2020-10-05 20:15:14
139.162.114.154 attackbots
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=45266  .  dstport=80 HTTP  .     (890)
2020-10-05 19:16:07
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.1.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.1.108.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:05:50 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
108.1.162.139.in-addr.arpa domain name pointer mf-magento-web03.singapore.linode.mobilefun.co.uk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.1.162.139.in-addr.arpa	name = mf-magento-web03.singapore.linode.mobilefun.co.uk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.245.204.153 attack
Invalid user murai from 157.245.204.153 port 7556
2020-06-24 07:48:28
98.5.240.187 attackbots
Jun 23 23:27:32 buvik sshd[17768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.5.240.187
Jun 23 23:27:34 buvik sshd[17768]: Failed password for invalid user git from 98.5.240.187 port 51874 ssh2
Jun 23 23:33:11 buvik sshd[18547]: Invalid user frontend from 98.5.240.187
...
2020-06-24 07:49:11
43.243.75.87 attackbots
Unauthorized connection attempt from IP address 43.243.75.87 on Port 445(SMB)
2020-06-24 08:09:30
106.13.203.62 attack
Jun 23 17:29:26 firewall sshd[22715]: Invalid user user from 106.13.203.62
Jun 23 17:29:28 firewall sshd[22715]: Failed password for invalid user user from 106.13.203.62 port 60568 ssh2
Jun 23 17:31:30 firewall sshd[22783]: Invalid user zimbra from 106.13.203.62
...
2020-06-24 08:09:14
172.69.70.195 attackspam
Apache - FakeGoogleBot
2020-06-24 08:01:30
125.127.10.186 attackspam
Unauthorized connection attempt from IP address 125.127.10.186 on Port 445(SMB)
2020-06-24 08:05:26
180.215.223.174 attackbots
Invalid user kodi from 180.215.223.174 port 60300
2020-06-24 07:52:28
98.181.208.51 attack
Unauthorized connection attempt: SRC=98.181.208.51
...
2020-06-24 07:45:28
201.24.3.66 attackspam
20/6/23@17:23:22: FAIL: Alarm-Network address from=201.24.3.66
20/6/23@17:23:22: FAIL: Alarm-Network address from=201.24.3.66
...
2020-06-24 07:55:40
144.172.73.39 attackspambots
Jun 24 00:59:50 master sshd[1692336]: Invalid user honey from 144.172.73.39 port 58418
Jun 24 00:59:54 master sshd[1692353]: Invalid user admin from 144.172.73.39 port 59528
...
2020-06-24 07:57:43
139.213.220.70 attackbots
2020-06-23T23:43:08.824559shield sshd\[17415\]: Invalid user es from 139.213.220.70 port 24950
2020-06-23T23:43:08.829015shield sshd\[17415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.213.220.70
2020-06-23T23:43:11.202130shield sshd\[17415\]: Failed password for invalid user es from 139.213.220.70 port 24950 ssh2
2020-06-23T23:44:00.703223shield sshd\[17478\]: Invalid user demo from 139.213.220.70 port 30650
2020-06-23T23:44:00.713257shield sshd\[17478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.213.220.70
2020-06-24 07:44:33
45.148.10.222 attack
2020-06-23T23:41:06.438750abusebot-2.cloudsearch.cf sshd[16448]: Invalid user fake from 45.148.10.222 port 36322
2020-06-23T23:41:06.449930abusebot-2.cloudsearch.cf sshd[16448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.222
2020-06-23T23:41:06.438750abusebot-2.cloudsearch.cf sshd[16448]: Invalid user fake from 45.148.10.222 port 36322
2020-06-23T23:41:08.406849abusebot-2.cloudsearch.cf sshd[16448]: Failed password for invalid user fake from 45.148.10.222 port 36322 ssh2
2020-06-23T23:41:08.561690abusebot-2.cloudsearch.cf sshd[16450]: Invalid user admin from 45.148.10.222 port 42712
2020-06-23T23:41:08.568046abusebot-2.cloudsearch.cf sshd[16450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.222
2020-06-23T23:41:08.561690abusebot-2.cloudsearch.cf sshd[16450]: Invalid user admin from 45.148.10.222 port 42712
2020-06-23T23:41:11.136730abusebot-2.cloudsearch.cf sshd[16450]: Failed pa
...
2020-06-24 08:02:18
112.85.42.180 attack
Scanned 2 times in the last 24 hours on port 22
2020-06-24 08:08:51
199.59.62.236 attackbots
 TCP (SYN) 199.59.62.236:61000 -> port 22, len 44
2020-06-24 08:03:43
195.70.59.121 attackspambots
Jun 23 23:34:36 jumpserver sshd[193731]: Invalid user lij from 195.70.59.121 port 34158
Jun 23 23:34:38 jumpserver sshd[193731]: Failed password for invalid user lij from 195.70.59.121 port 34158 ssh2
Jun 23 23:42:44 jumpserver sshd[193815]: Invalid user postgres from 195.70.59.121 port 34376
...
2020-06-24 08:06:45

最近上报的IP列表

118.212.105.88 139.162.1.209 139.159.99.34 139.162.1.237
139.162.1.4 139.162.1.73 139.162.10.121 139.162.1.43
139.162.10.125 139.162.10.128 139.162.10.153 118.212.105.9
139.162.10.170 139.162.10.174 139.162.10.182 139.162.10.199
139.162.10.231 139.162.10.22 139.162.10.68 139.162.10.72