必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.59.203 attackbotsspam
/wp-login.php
2020-08-03 16:48:35
139.162.55.80 attackspam
TCP Port Scanning
2020-01-31 22:37:11
139.162.53.139 attack
Host Scan
2019-12-18 19:31:35
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.5.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.5.68.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:10:20 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
68.5.162.139.in-addr.arpa domain name pointer dqzx.us.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.5.162.139.in-addr.arpa	name = dqzx.us.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.186.77.118 attack
Tried sshing with brute force.
2019-09-07 13:44:54
103.225.58.46 attackspam
Sep  6 18:48:36 lcprod sshd\[9709\]: Invalid user 1q2w3e4r from 103.225.58.46
Sep  6 18:48:36 lcprod sshd\[9709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.58.46
Sep  6 18:48:38 lcprod sshd\[9709\]: Failed password for invalid user 1q2w3e4r from 103.225.58.46 port 59782 ssh2
Sep  6 18:53:32 lcprod sshd\[10147\]: Invalid user passw0rd from 103.225.58.46
Sep  6 18:53:32 lcprod sshd\[10147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.58.46
2019-09-07 13:07:04
46.101.41.162 attack
Sep  6 19:06:51 sachi sshd\[6181\]: Invalid user 666 from 46.101.41.162
Sep  6 19:06:51 sachi sshd\[6181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.41.162
Sep  6 19:06:52 sachi sshd\[6181\]: Failed password for invalid user 666 from 46.101.41.162 port 55418 ssh2
Sep  6 19:11:30 sachi sshd\[6660\]: Invalid user CumulusLinux! from 46.101.41.162
Sep  6 19:11:30 sachi sshd\[6660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.41.162
2019-09-07 13:28:40
37.49.231.130 attackbotsspam
firewall-block, port(s): 5038/tcp
2019-09-07 12:55:37
177.100.50.182 attackspam
Sep  7 02:32:50 v22019058497090703 sshd[1117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.100.50.182
Sep  7 02:32:52 v22019058497090703 sshd[1117]: Failed password for invalid user weblogic from 177.100.50.182 port 35030 ssh2
Sep  7 02:38:22 v22019058497090703 sshd[1546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.100.50.182
...
2019-09-07 13:49:12
107.172.46.82 attack
Sep  7 04:00:34 lnxweb61 sshd[431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.46.82
2019-09-07 13:29:51
106.12.132.3 attackbots
Sep  7 05:44:33 mail sshd\[15960\]: Invalid user mine from 106.12.132.3 port 52056
Sep  7 05:44:33 mail sshd\[15960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.3
Sep  7 05:44:35 mail sshd\[15960\]: Failed password for invalid user mine from 106.12.132.3 port 52056 ssh2
Sep  7 05:50:07 mail sshd\[16468\]: Invalid user 123456 from 106.12.132.3 port 36244
Sep  7 05:50:07 mail sshd\[16468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.3
2019-09-07 13:12:31
45.82.153.34 attackbotsspam
firewall-block, port(s): 5056/tcp, 5059/tcp, 5353/tcp
2019-09-07 13:55:38
222.186.52.78 attackspam
Sep  7 06:38:19 vmi181237 sshd\[19724\]: refused connect from 222.186.52.78 \(222.186.52.78\)
Sep  7 06:39:19 vmi181237 sshd\[19792\]: refused connect from 222.186.52.78 \(222.186.52.78\)
Sep  7 06:40:02 vmi181237 sshd\[19802\]: refused connect from 222.186.52.78 \(222.186.52.78\)
Sep  7 06:40:18 vmi181237 sshd\[19810\]: refused connect from 222.186.52.78 \(222.186.52.78\)
Sep  7 06:41:09 vmi181237 sshd\[19820\]: refused connect from 222.186.52.78 \(222.186.52.78\)
2019-09-07 13:50:25
156.213.98.147 attackbotsspam
Sep  7 02:40:12 vps647732 sshd[26634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.213.98.147
Sep  7 02:40:15 vps647732 sshd[26634]: Failed password for invalid user admin from 156.213.98.147 port 36510 ssh2
...
2019-09-07 13:05:18
106.12.89.190 attack
Sep  7 07:13:16 SilenceServices sshd[22278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.190
Sep  7 07:13:17 SilenceServices sshd[22278]: Failed password for invalid user ubuntu from 106.12.89.190 port 39196 ssh2
Sep  7 07:18:43 SilenceServices sshd[24284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.190
2019-09-07 13:24:03
51.158.114.246 attackbotsspam
Sep  7 07:54:33 taivassalofi sshd[17859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.114.246
Sep  7 07:54:35 taivassalofi sshd[17859]: Failed password for invalid user sinus from 51.158.114.246 port 35598 ssh2
...
2019-09-07 13:08:12
81.130.234.235 attackbotsspam
Sep  6 19:40:45 eddieflores sshd\[3052\]: Invalid user ts3 from 81.130.234.235
Sep  6 19:40:45 eddieflores sshd\[3052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host81-130-234-235.in-addr.btopenworld.com
Sep  6 19:40:47 eddieflores sshd\[3052\]: Failed password for invalid user ts3 from 81.130.234.235 port 58738 ssh2
Sep  6 19:47:55 eddieflores sshd\[3598\]: Invalid user teamspeak3 from 81.130.234.235
Sep  6 19:47:55 eddieflores sshd\[3598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host81-130-234-235.in-addr.btopenworld.com
2019-09-07 13:53:36
180.190.43.66 attackspambots
Acount hack
2019-09-07 13:41:48
193.112.219.228 attackspam
Sep  7 05:44:10 ArkNodeAT sshd\[21762\]: Invalid user deploy from 193.112.219.228
Sep  7 05:44:10 ArkNodeAT sshd\[21762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.219.228
Sep  7 05:44:11 ArkNodeAT sshd\[21762\]: Failed password for invalid user deploy from 193.112.219.228 port 47042 ssh2
2019-09-07 13:40:10

最近上报的IP列表

139.162.50.213 139.162.50.153 139.162.50.166 139.162.5.81
139.162.53.33 139.162.52.231 139.162.53.90 139.162.5.85
139.162.52.82 139.162.5.236 139.162.53.94 139.162.54.179
139.162.54.56 139.162.55.252 139.162.54.98 139.162.54.99
139.162.55.66 139.162.55.13 139.162.56.222 139.162.57.146