必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.147.137 attack
Unauthorized connection attempt detected from IP address 139.162.147.137 to port 139
2020-10-12 06:11:53
139.162.147.137 attackspam
Unauthorized connection attempt detected from IP address 139.162.147.137 to port 139
2020-10-11 22:21:03
139.162.147.137 attackspambots
Use Brute-Force
2020-10-11 14:17:25
139.162.147.137 attack
Use Brute-Force
2020-10-11 07:40:30
139.162.146.148 attackbots
 UDP 139.162.146.148:37702 -> port 53, len 59
2020-09-21 01:46:43
139.162.146.148 attack
 UDP 139.162.146.148:51121 -> port 53, len 59
2020-09-20 17:45:34
139.162.148.195 attackspambots
Lines containing failures of 139.162.148.195
May 15 16:55:33 shared03 sshd[9416]: Invalid user watanabe from 139.162.148.195 port 55874
May 15 16:55:33 shared03 sshd[9416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.148.195
May 15 16:55:36 shared03 sshd[9416]: Failed password for invalid user watanabe from 139.162.148.195 port 55874 ssh2
May 15 16:55:36 shared03 sshd[9416]: Received disconnect from 139.162.148.195 port 55874:11: Bye Bye [preauth]
May 15 16:55:36 shared03 sshd[9416]: Disconnected from invalid user watanabe 139.162.148.195 port 55874 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.162.148.195
2020-05-15 23:21:41
139.162.144.244 attackbotsspam
Unauthorized connection attempt detected from IP address 139.162.144.244 to port 102 [J]
2020-01-31 00:40:10
139.162.144.113 attackspambots
spam
2020-01-28 15:28:31
139.162.144.15 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 04:06:20
139.162.144.244 attackbots
Honeypot hit.
2019-09-03 05:12:49
139.162.146.15 attackbots
GET /api/v1/pods HTTP/1.1
2019-07-28 16:15:52
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.14.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.14.9.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:07:34 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
9.14.162.139.in-addr.arpa domain name pointer 139-162-14-9.ip.linodeusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.14.162.139.in-addr.arpa	name = 139-162-14-9.ip.linodeusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.37 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 3322 43906 resulting in total of 32 scans from 185.175.93.0/24 block.
2020-05-29 21:37:36
107.6.183.166 attackspam
Port Scan
2020-05-29 21:46:07
167.172.174.132 attackspam
Port Scan
2020-05-29 21:42:43
85.209.0.100 attackbotsspam
Port Scan
2020-05-29 21:15:14
188.232.188.126 attackbots
Lines containing failures of 188.232.188.126
May 29 14:18:29 shared11 sshd[21873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.232.188.126  user=r.r
May 29 14:18:30 shared11 sshd[21873]: Failed password for r.r from 188.232.188.126 port 38466 ssh2
May 29 14:18:33 shared11 sshd[21873]: Failed password for r.r from 188.232.188.126 port 38466 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.232.188.126
2020-05-29 21:20:10
177.93.64.222 attackspambots
Port Scan
2020-05-29 21:40:29
198.108.67.50 attackbotsspam
Port Scan
2020-05-29 21:30:51
190.234.184.65 attackspambots
Port Scan
2020-05-29 21:35:08
36.82.106.238 attackspambots
May 29 14:41:20 piServer sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.82.106.238 
May 29 14:41:22 piServer sshd[25306]: Failed password for invalid user eachbytr from 36.82.106.238 port 47296 ssh2
May 29 14:46:26 piServer sshd[25735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.82.106.238 
...
2020-05-29 21:21:11
223.247.206.180 attackbots
May 29 14:45:19 abendstille sshd\[19217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.206.180  user=root
May 29 14:45:20 abendstille sshd\[19217\]: Failed password for root from 223.247.206.180 port 44674 ssh2
May 29 14:48:07 abendstille sshd\[21921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.206.180  user=root
May 29 14:48:08 abendstille sshd\[21921\]: Failed password for root from 223.247.206.180 port 33592 ssh2
May 29 14:50:51 abendstille sshd\[24431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.206.180  user=root
...
2020-05-29 21:22:08
213.217.0.205 attack
scans once in preceeding hours on the ports (in chronological order) 3368 resulting in total of 11 scans from 213.217.0.0/23 block.
2020-05-29 21:28:25
162.243.141.249 attackspambots
Port Scan
2020-05-29 21:43:06
123.207.99.189 attackbots
Unauthorized SSH login attempts
2020-05-29 21:10:17
89.219.179.116 attackbotsspam
Port probing on unauthorized port 445
2020-05-29 21:12:01
185.176.27.190 attack
Port Scan
2020-05-29 21:23:36

最近上报的IP列表

139.159.231.160 139.162.174.210 139.162.72.64 139.170.10.249
139.162.231.136 139.170.232.73 139.177.197.165 139.178.70.214
139.189.208.167 139.180.208.18 139.189.209.106 139.190.145.198
139.190.149.57 139.190.239.181 139.190.138.86 139.190.239.76
139.190.239.77 139.190.239.9 139.190.239.245 139.192.251.79