必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): London

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.221.245 attackspambots
Excessive Port-Scanning
2019-11-09 14:03:25
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.221.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.221.49.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:08:58 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
49.221.162.139.in-addr.arpa domain name pointer li1384-49.members.linode.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.221.162.139.in-addr.arpa	name = li1384-49.members.linode.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.235.128.37 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-14/07-05]6pkt,1pt.(tcp)
2019-07-05 15:45:51
172.105.219.236 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-07-05 15:16:17
180.244.141.184 attack
firewall-block, port(s): 23/tcp
2019-07-05 15:44:39
148.70.11.143 attackbotsspam
SSH Brute Force
2019-07-05 15:26:03
102.139.21.123 attackbots
2019-07-05 00:38:04 unexpected disconnection while reading SMTP command from ([102.139.21.123]) [102.139.21.123]:24074 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-05 00:38:21 unexpected disconnection while reading SMTP command from ([102.139.21.123]) [102.139.21.123]:25544 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-05 00:38:35 unexpected disconnection while reading SMTP command from ([102.139.21.123]) [102.139.21.123]:6887 I=[10.100.18.21]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.139.21.123
2019-07-05 15:17:31
201.216.193.65 attackbots
Jul  5 08:46:14 tuxlinux sshd[49988]: Invalid user amon from 201.216.193.65 port 56129
Jul  5 08:46:14 tuxlinux sshd[49988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.193.65 
Jul  5 08:46:14 tuxlinux sshd[49988]: Invalid user amon from 201.216.193.65 port 56129
Jul  5 08:46:14 tuxlinux sshd[49988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.193.65 
Jul  5 08:46:14 tuxlinux sshd[49988]: Invalid user amon from 201.216.193.65 port 56129
Jul  5 08:46:14 tuxlinux sshd[49988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.193.65 
Jul  5 08:46:16 tuxlinux sshd[49988]: Failed password for invalid user amon from 201.216.193.65 port 56129 ssh2
...
2019-07-05 15:06:44
125.77.72.197 attackspambots
Brute force attempt
2019-07-05 15:26:32
111.253.217.195 attackspambots
23/tcp
[2019-07-04]1pkt
2019-07-05 15:44:09
180.249.41.175 attackbots
firewall-block, port(s): 22/tcp
2019-07-05 15:43:48
54.38.82.14 attackbots
Jul  5 01:53:39 vps200512 sshd\[24786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jul  5 01:53:41 vps200512 sshd\[24786\]: Failed password for root from 54.38.82.14 port 45201 ssh2
Jul  5 01:53:41 vps200512 sshd\[24788\]: Invalid user admin from 54.38.82.14
Jul  5 01:53:41 vps200512 sshd\[24788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Jul  5 01:53:44 vps200512 sshd\[24788\]: Failed password for invalid user admin from 54.38.82.14 port 42133 ssh2
2019-07-05 15:33:30
83.142.136.233 attackspambots
firewall-block, port(s): 445/tcp
2019-07-05 15:21:34
164.132.57.16 attack
Jul  5 05:14:42 lnxmail61 sshd[16257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
2019-07-05 15:49:48
195.158.31.181 attackspam
firewall-block, port(s): 445/tcp
2019-07-05 15:42:57
37.59.104.76 attackspam
Jul  5 09:29:11 rpi sshd[24791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.104.76 
Jul  5 09:29:13 rpi sshd[24791]: Failed password for invalid user lisa from 37.59.104.76 port 34872 ssh2
2019-07-05 15:32:19
192.241.204.70 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-05 15:28:09

最近上报的IP列表

139.162.220.46 139.162.220.72 139.162.222.118 139.162.222.155
139.162.221.57 118.212.107.203 139.162.222.231 139.162.223.208
139.162.223.156 139.162.223.6 139.162.223.163 118.212.107.204
139.162.222.66 139.162.224.42 139.162.223.78 139.162.224.54
139.162.224.191 139.162.224.105 139.162.224.50 139.162.224.83