必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.110.42 attack
Unauthorised access (Aug 27) SRC=139.162.110.42 LEN=40 TTL=246 ID=54321 TCP DPT=3306 WINDOW=65535 SYN 
Unauthorised access (Aug 25) SRC=139.162.110.42 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=54321 TCP DPT=3306 WINDOW=65535 SYN 
Unauthorised access (Aug 23) SRC=139.162.110.42 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=54321 TCP DPT=3306 WINDOW=65535 SYN
2020-08-28 01:27:49
139.162.110.210 attack
1586789406 - 04/13/2020 16:50:06 Host: 139.162.110.210/139.162.110.210 Port: 513 TCP Blocked
2020-04-13 23:43:16
139.162.110.210 attackspam
trying to access non-authorized port
2020-04-13 16:23:39
139.162.110.42 attackspam
04/02/2020-08:40:57.046533 139.162.110.42 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2020-04-03 04:11:20
139.162.110.42 attackspambots
firewall-block, port(s): 3306/tcp
2020-03-06 05:49:35
139.162.110.42 attackbotsspam
suspicious action Fri, 21 Feb 2020 10:16:34 -0300
2020-02-22 00:54:40
139.162.110.42 attack
Dec 23 21:06:13 debian-2gb-nbg1-2 kernel: \[784316.837388\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.110.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=40043 DPT=3306 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-24 04:21:41
139.162.110.42 attack
Unauthorised access (Dec  4) SRC=139.162.110.42 LEN=40 TTL=240 ID=54321 TCP DPT=3306 WINDOW=65535 SYN
2019-12-04 16:31:55
139.162.110.42 attackbots
firewall-block, port(s): 3306/tcp
2019-11-22 16:47:28
139.162.110.42 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-19 18:44:08
139.162.110.42 attack
firewall-block, port(s): 3306/tcp
2019-11-17 05:20:44
139.162.110.42 attackbots
Unauthorized connection attempt from IP address 139.162.110.42 on Port 3306(MYSQL)
2019-10-16 01:10:00
139.162.110.42 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-17 19:34:29
139.162.110.42 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-14 17:27:34
139.162.110.42 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-07 04:06:29
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.110.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.110.130.		IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021200 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 12 16:29:49 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
130.110.162.139.in-addr.arpa domain name pointer 139-162-110-130.ip.linodeusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.110.162.139.in-addr.arpa	name = 139-162-110-130.ip.linodeusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.210.38.196 attack
[portscan] Port scan
2019-11-20 22:56:32
90.169.118.67 attackbotsspam
2019-11-20 14:52:56 H=([90.169.118.67]) [90.169.118.67]:14441 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=90.169.118.67)
2019-11-20 14:52:56 unexpected disconnection while reading SMTP command from ([90.169.118.67]) [90.169.118.67]:14441 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-11-20 15:30:15 H=([90.169.118.67]) [90.169.118.67]:24123 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=90.169.118.67)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=90.169.118.67
2019-11-20 23:12:46
223.205.236.58 attackbots
Unauthorized connection attempt from IP address 223.205.236.58 on Port 445(SMB)
2019-11-20 23:12:12
202.158.17.253 attackbots
Unauthorized connection attempt from IP address 202.158.17.253 on Port 445(SMB)
2019-11-20 23:05:11
1.29.109.212 attackspam
badbot
2019-11-20 22:42:49
45.234.193.43 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:29:08
171.249.117.20 attackbots
Unauthorized connection attempt from IP address 171.249.117.20 on Port 445(SMB)
2019-11-20 22:54:30
210.190.168.90 attackspam
webserver:80 [20/Nov/2019]  "GET /wp-login.php HTTP/1.1" 302 438 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
webserver:80 [20/Nov/2019]  "GET /wp-login.php HTTP/1.1" 302 448 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-20 23:02:56
187.68.197.25 attack
Unauthorized connection attempt from IP address 187.68.197.25 on Port 445(SMB)
2019-11-20 22:56:03
218.92.0.168 attack
detected by Fail2Ban
2019-11-20 22:45:08
106.59.35.151 attack
badbot
2019-11-20 22:40:20
117.216.15.104 attack
Automatic report - Port Scan Attack
2019-11-20 22:58:09
117.67.142.70 attack
badbot
2019-11-20 22:28:40
223.17.179.90 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:38:58
190.121.21.158 attack
Port Scan 1433
2019-11-20 22:48:36

最近上报的IP列表

138.117.79.200 134.209.192.30 139.59.64.239 139.59.11.78
138.128.59.248 14.142.94.216 14.231.138.198 14.161.24.141
139.162.15.39 14.237.102.129 14.207.151.94 138.197.107.50
145.239.66.137 144.172.74.104 144.22.251.63 144.22.226.64
150.158.149.14 15.204.129.182 146.56.111.26 142.93.240.39