必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.116.133 attack
Malicious brute force vulnerability hacking attacks
2020-10-14 07:39:12
139.162.116.22 attackbotsspam
 TCP (SYN) 139.162.116.22:35955 -> port 1755, len 44
2020-09-26 06:20:18
139.162.116.22 attackspam
TCP port : 1755
2020-09-25 23:22:16
139.162.116.22 attackspam
Found on   Alienvault    / proto=6  .  srcport=45465  .  dstport=1755  .     (3629)
2020-09-25 15:00:43
139.162.116.133 attackspambots
Automatic report - Banned IP Access
2020-09-08 04:27:28
139.162.116.133 attackspam
srvr2: (mod_security) mod_security (id:920350) triggered by 139.162.116.133 (JP/-/scan-66.security.ipip.net): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/06 18:45:21 [error] 75202#0: *153186 [client 139.162.116.133] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159941072171.478932"] [ref "o0,14v21,14"], client: 139.162.116.133, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-09-07 20:06:17
139.162.116.133 attack
srvr1: (mod_security) mod_security (id:920350) triggered by 139.162.116.133 (JP/-/scan-66.security.ipip.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/29 15:49:44 [error] 27704#0: *112472 [client 139.162.116.133] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "15987161847.535630"] [ref "o0,13v21,13"], client: 139.162.116.133, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-08-30 03:07:41
139.162.116.230 attack
Unauthorized connection attempt detected from IP address 139.162.116.230 to port 8443 [T]
2020-08-29 21:15:35
139.162.116.230 attack
Hit honeypot r.
2020-08-16 18:21:09
139.162.116.22 attack
firewall-block, port(s): 1755/tcp
2020-08-15 03:38:20
139.162.116.133 attackspambots
Automatic report - Banned IP Access
2020-07-24 15:27:46
139.162.116.22 attack
Jul 19 05:55:52 debian-2gb-nbg1-2 kernel: \[17389498.532185\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.116.22 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=50139 DPT=1755 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-19 14:59:10
139.162.116.230 attackbotsspam
Tried our host z.
2020-07-19 07:21:42
139.162.116.22 attackspam
firewall-block, port(s): 1755/tcp
2020-05-01 06:55:12
139.162.116.22 attackbotsspam
Apr 26 13:58:33 debian-2gb-nbg1-2 kernel: \[10161249.278369\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.116.22 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=33767 DPT=1755 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-27 04:17:32
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.116.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.116.127.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:05:21 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
127.116.162.139.in-addr.arpa domain name pointer li1600-127.members.linode.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
127.116.162.139.in-addr.arpa	name = li1600-127.members.linode.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.100.155.93 attack
Attempted connection to port 80.
2020-05-13 03:46:20
95.239.74.51 attackbots
Unauthorized connection attempt detected from IP address 95.239.74.51 to port 83
2020-05-13 03:29:04
73.194.116.117 attackbotsspam
Unauthorized connection attempt detected from IP address 73.194.116.117 to port 23
2020-05-13 03:39:27
162.158.187.108 attack
$f2bV_matches
2020-05-13 04:01:46
100.1.63.89 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-13 04:06:04
111.10.19.16 attackbots
Unauthorized connection attempt detected from IP address 111.10.19.16 to port 7002
2020-05-13 04:03:39
93.51.28.228 attack
Unauthorized connection attempt detected from IP address 93.51.28.228 to port 9000
2020-05-13 03:30:37
103.91.232.18 attack
Unauthorized connection attempt detected from IP address 103.91.232.18 to port 445
2020-05-13 04:05:47
82.60.87.227 attackspam
Unauthorized connection attempt detected from IP address 82.60.87.227 to port 80
2020-05-13 03:34:10
79.46.48.204 attackspambots
Unauthorized connection attempt detected from IP address 79.46.48.204 to port 23
2020-05-13 04:11:09
181.49.197.173 attackspam
Unauthorized connection attempt detected from IP address 181.49.197.173 to port 445
2020-05-13 03:58:52
79.40.181.150 attackspambots
Unauthorized connection attempt detected from IP address 79.40.181.150 to port 9000
2020-05-13 03:35:30
148.63.254.118 attackbots
Unauthorized connection attempt detected from IP address 148.63.254.118 to port 81
2020-05-13 04:02:40
99.48.176.109 attackspambots
Unauthorized connection attempt detected from IP address 99.48.176.109 to port 81
2020-05-13 04:06:23
179.176.106.236 attackspambots
Unauthorized connection attempt detected from IP address 179.176.106.236 to port 23
2020-05-13 03:59:57

最近上报的IP列表

139.15.248.215 139.162.12.181 25.188.196.102 139.162.126.87
139.162.14.44 139.162.132.21 139.162.133.107 139.162.132.71
139.162.140.224 139.162.139.197 139.162.140.253 139.162.142.230
139.162.144.186 139.162.144.28 139.162.147.253 139.162.145.110
139.162.15.146 139.162.150.111 139.162.149.166 139.162.149.107