必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.106.178 attack
Auto Detect Rule!
proto TCP (SYN), 139.162.106.178:45138->gjan.info:23, len 40
2020-10-02 03:26:11
139.162.106.178 attackbots
 TCP (SYN) 139.162.106.178:57555 -> port 23, len 44
2020-10-01 19:38:32
139.162.106.181 attackbotsspam
srvr3: (mod_security) mod_security (id:920350) triggered by 139.162.106.181 (US/United States/scan-67.security.ipip.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/10 02:24:05 [error] 277189#0: *1327 [client 139.162.106.181] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159969744587.159482"] [ref "o0,11v21,11"], client: 139.162.106.181, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-09-10 14:07:53
139.162.106.181 attackbotsspam
139.162.106.181 - - [09/Sep/2020:19:35:24 +0200] "GET / HTTP/1.1" 301 670 "-" "HTTP Banner Detection (https://security.ipip.net)"
...
2020-09-10 04:49:14
139.162.109.43 attackbotsspam
Port scan denied
2020-09-04 21:11:34
139.162.109.43 attackspam
 TCP (SYN) 139.162.109.43:58886 -> port 111, len 44
2020-09-04 12:51:14
139.162.109.43 attackspambots
firewall-block, port(s): 111/tcp
2020-09-04 05:21:16
139.162.108.129 attackbots
Icarus honeypot on github
2020-09-01 07:48:04
139.162.108.62 attack
Port scan denied
2020-08-31 18:04:19
139.162.102.46 attackspambots
Unauthorized connection attempt detected from IP address 139.162.102.46 to port 1755 [T]
2020-08-29 20:23:51
139.162.108.129 attackbotsspam
Tried our host z.
2020-08-29 08:30:25
139.162.108.53 attackspam
firewall-block, port(s): 80/tcp
2020-08-20 01:45:23
139.162.106.181 attack
port scan and connect, tcp 80 (http)
2020-08-19 19:56:14
139.162.102.46 attackbotsspam
Unauthorized connection attempt detected from IP address 139.162.102.46 to port 1723 [T]
2020-08-16 01:39:57
139.162.104.208 attack
 TCP (SYN) 139.162.104.208:46074 -> port 21, len 44
2020-08-13 17:28:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.10.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47883
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.10.121.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:05:51 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
121.10.162.139.in-addr.arpa domain name pointer 139-162-10-121.ip.linodeusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.10.162.139.in-addr.arpa	name = 139-162-10-121.ip.linodeusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.192.240.88 attack
Automatic report - Port Scan Attack
2020-05-09 04:27:24
183.78.206.68 attack
Unauthorized connection attempt detected from IP address 183.78.206.68 to port 81 [T]
2020-05-09 03:54:31
83.97.20.196 attackspam
Unauthorized connection attempt detected from IP address 83.97.20.196 to port 444 [T]
2020-05-09 04:14:04
81.88.221.227 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-05-09 04:14:35
123.195.59.45 attackspambots
Unauthorized connection attempt detected from IP address 123.195.59.45 to port 23 [T]
2020-05-09 04:01:33
5.8.18.88 attackspam
5.8.18.88:64149 is connecting...
   Exception normal: Tried to send data to a client after losing connection

(on my terraria server)
2020-05-09 03:50:36
116.226.248.167 attackspambots
Unauthorized connection attempt detected from IP address 116.226.248.167 to port 9139 [T]
2020-05-09 04:06:16
182.106.223.195 attack
1588945463 - 05/08/2020 20:44:23 Host: 182.106.223.195/182.106.223.195 Port: 23 TCP Blocked
...
2020-05-09 03:55:41
113.231.104.36 attackbotsspam
Unauthorized connection attempt detected from IP address 113.231.104.36 to port 23 [T]
2020-05-09 04:07:31
46.63.70.109 attackbots
Unauthorized connection attempt detected from IP address 46.63.70.109 to port 1433 [T]
2020-05-09 04:22:48
202.182.109.182 attackspambots
Unauthorized connection attempt detected from IP address 202.182.109.182 to port 8080 [T]
2020-05-09 03:52:40
41.72.108.82 attack
Unauthorized connection attempt detected from IP address 41.72.108.82 to port 21 [T]
2020-05-09 04:24:28
61.153.203.82 attackbotsspam
Unauthorized connection attempt from IP address 61.153.203.82 on Port 445(SMB)
2020-05-09 04:16:32
110.172.104.23 attack
Unauthorized connection attempt detected from IP address 110.172.104.23 to port 445 [T]
2020-05-09 04:09:56
139.219.6.50 attackspam
Unauthorized connection attempt detected from IP address 139.219.6.50 to port 2838 [T]
2020-05-09 03:59:22

最近上报的IP列表

139.162.1.73 139.162.1.43 139.162.10.125 139.162.10.128
139.162.10.153 118.212.105.9 139.162.10.170 139.162.10.174
139.162.10.182 139.162.10.199 139.162.10.231 139.162.10.22
139.162.10.68 139.162.10.72 139.162.10.78 118.212.105.90
139.162.10.96 139.162.101.34 139.162.10.94 139.162.102.192