必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Frankfurt am Main

省份(region): Hesse

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.135.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.135.42.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:06:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
42.135.162.139.in-addr.arpa domain name pointer c7099.cloudnet.cloud.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.135.162.139.in-addr.arpa	name = c7099.cloudnet.cloud.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.255.126.198 attack
DATE:2020-06-27 22:43:45, IP:178.255.126.198, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-06-28 08:23:54
216.126.59.61 attackspambots
Invalid user xxx from 216.126.59.61 port 59162
2020-06-28 12:02:14
50.62.177.116 attackspam
Automatic report - XMLRPC Attack
2020-06-28 08:42:16
163.44.150.59 attackbots
Invalid user ucc from 163.44.150.59 port 48877
2020-06-28 08:42:46
181.31.101.35 attackspambots
Ssh brute force
2020-06-28 08:21:08
128.0.129.192 attack
2020-06-27T23:38:17.692791afi-git.jinr.ru sshd[15884]: Failed password for invalid user julien from 128.0.129.192 port 36810 ssh2
2020-06-27T23:43:16.238245afi-git.jinr.ru sshd[17180]: Invalid user kitti from 128.0.129.192 port 34730
2020-06-27T23:43:16.241810afi-git.jinr.ru sshd[17180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.129.192
2020-06-27T23:43:16.238245afi-git.jinr.ru sshd[17180]: Invalid user kitti from 128.0.129.192 port 34730
2020-06-27T23:43:18.588980afi-git.jinr.ru sshd[17180]: Failed password for invalid user kitti from 128.0.129.192 port 34730 ssh2
...
2020-06-28 08:46:07
177.200.2.241 attack
Unauthorized connection attempt: SRC=177.200.2.241
...
2020-06-28 08:23:24
18.181.241.86 attackbotsspam
Invalid user jack from 18.181.241.86 port 53076
2020-06-28 08:13:33
106.55.152.22 attack
Jun 28 02:01:28 inter-technics sshd[20770]: Invalid user appserver from 106.55.152.22 port 42228
Jun 28 02:01:28 inter-technics sshd[20770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.152.22
Jun 28 02:01:28 inter-technics sshd[20770]: Invalid user appserver from 106.55.152.22 port 42228
Jun 28 02:01:30 inter-technics sshd[20770]: Failed password for invalid user appserver from 106.55.152.22 port 42228 ssh2
Jun 28 02:09:17 inter-technics sshd[21326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.152.22  user=root
Jun 28 02:09:18 inter-technics sshd[21326]: Failed password for root from 106.55.152.22 port 47910 ssh2
...
2020-06-28 08:16:40
80.82.77.245 attack
80.82.77.245 was recorded 8 times by 6 hosts attempting to connect to the following ports: 1054,1064,1059. Incident counter (4h, 24h, all-time): 8, 39, 24607
2020-06-28 08:20:41
159.89.47.131 attackspam
159.89.47.131 - - [27/Jun/2020:21:43:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.47.131 - - [27/Jun/2020:21:43:44 +0100] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.47.131 - - [27/Jun/2020:21:43:44 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-28 08:25:00
218.92.0.215 attack
Jun 28 02:31:52 v22018053744266470 sshd[23739]: Failed password for root from 218.92.0.215 port 22039 ssh2
Jun 28 02:32:01 v22018053744266470 sshd[23752]: Failed password for root from 218.92.0.215 port 14271 ssh2
...
2020-06-28 08:37:47
118.25.21.176 attackbotsspam
Invalid user nib from 118.25.21.176 port 53318
2020-06-28 08:12:42
181.123.9.3 attackspambots
Jun 28 02:29:34 [host] sshd[1239]: Invalid user al
Jun 28 02:29:34 [host] sshd[1239]: pam_unix(sshd:a
Jun 28 02:29:36 [host] sshd[1239]: Failed password
2020-06-28 08:44:53
49.234.207.226 attack
B: Abusive ssh attack
2020-06-28 08:24:33

最近上报的IP列表

139.162.135.194 139.162.134.138 118.212.106.120 139.162.136.226
139.162.136.119 139.162.136.75 139.162.136.204 118.212.106.123
139.162.137.31 139.162.136.238 139.162.138.118 139.162.137.103
139.162.137.126 139.162.138.100 139.162.139.220 139.162.138.14
139.162.137.55 139.162.138.96 139.162.139.50 139.162.139.78