必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.162.72.191 attackbots
 TCP (SYN) 139.162.72.191:52410 -> port 3127, len 44
2020-07-14 03:27:34
139.162.72.191 attackbotsspam
SmallBizIT.US 1 packets to tcp(3127)
2020-06-14 08:28:53
139.162.72.191 attack
Apr 25 22:27:43 debian-2gb-nbg1-2 kernel: \[10105401.497099\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.72.191 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=46186 DPT=3127 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-26 05:02:27
139.162.72.191 attackspam
trying to access non-authorized port
2020-04-04 19:02:53
139.162.72.191 attackspambots
firewall-block, port(s): 3127/tcp
2020-03-08 06:33:11
139.162.72.191 attackbotsspam
Feb 18 14:27:14 debian-2gb-nbg1-2 kernel: \[4291649.872543\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.72.191 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=59762 DPT=3127 WINDOW=65535 RES=0x00 SYN URGP=0
2020-02-18 21:45:32
139.162.72.191 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-06 03:20:37
139.162.72.191 attackspam
unauthorized connection attempt
2020-02-04 17:34:28
139.162.72.202 attack
Honeypot attack, port: 445, PTR: li1552-202.members.linode.com.
2020-02-02 04:13:32
139.162.72.191 attackspam
SIP/5060 Probe, BF, Hack -
2020-01-22 22:00:18
139.162.72.191 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-01-15 01:47:21
139.162.72.191 attack
Fail2Ban Ban Triggered
2020-01-09 21:08:33
139.162.72.191 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-24 04:36:14
139.162.72.191 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 03:07:24
139.162.72.191 attackspambots
Port scan: Attack repeated for 24 hours
2019-12-04 16:35:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.72.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.72.104.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:35:13 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
104.72.162.139.in-addr.arpa domain name pointer li1552-104.members.linode.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.72.162.139.in-addr.arpa	name = li1552-104.members.linode.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.14.133.58 attack
Port scan denied
2020-08-13 19:32:45
13.231.19.131 attack
(sshd) Failed SSH login from 13.231.19.131 (JP/Japan/ec2-13-231-19-131.ap-northeast-1.compute.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 13 06:31:20 s1 sshd[22540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.231.19.131  user=root
Aug 13 06:31:22 s1 sshd[22540]: Failed password for root from 13.231.19.131 port 59478 ssh2
Aug 13 06:42:00 s1 sshd[22856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.231.19.131  user=root
Aug 13 06:42:01 s1 sshd[22856]: Failed password for root from 13.231.19.131 port 59124 ssh2
Aug 13 06:46:27 s1 sshd[23020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.231.19.131  user=root
2020-08-13 20:04:13
117.254.136.122 attackspam
Unauthorized connection attempt from IP address 117.254.136.122 on Port 445(SMB)
2020-08-13 20:03:54
112.215.237.249 attackspambots
1597290421 - 08/13/2020 05:47:01 Host: 112.215.237.249/112.215.237.249 Port: 445 TCP Blocked
2020-08-13 19:30:32
123.205.137.223 attack
Unauthorized connection attempt from IP address 123.205.137.223 on Port 445(SMB)
2020-08-13 19:53:57
191.31.104.17 attackbotsspam
Aug 13 07:47:55 ift sshd\[16314\]: Invalid user abcd1234!@\#$ from 191.31.104.17Aug 13 07:47:57 ift sshd\[16314\]: Failed password for invalid user abcd1234!@\#$ from 191.31.104.17 port 9893 ssh2Aug 13 07:52:40 ift sshd\[16984\]: Invalid user passwordpassword!@\# from 191.31.104.17Aug 13 07:52:42 ift sshd\[16984\]: Failed password for invalid user passwordpassword!@\# from 191.31.104.17 port 31078 ssh2Aug 13 07:57:25 ift sshd\[17605\]: Invalid user htidc@111 from 191.31.104.17
...
2020-08-13 19:36:02
145.239.82.87 attack
$f2bV_matches
2020-08-13 19:34:53
101.231.135.146 attackbotsspam
Unauthorized SSH login attempts
2020-08-13 20:09:52
118.101.192.62 attack
Aug 13 06:36:26 vps647732 sshd[18390]: Failed password for root from 118.101.192.62 port 56008 ssh2
...
2020-08-13 20:01:02
171.250.122.167 attack
Unauthorized connection attempt from IP address 171.250.122.167 on Port 445(SMB)
2020-08-13 19:50:54
117.7.184.125 attackbotsspam
Unauthorized connection attempt from IP address 117.7.184.125 on Port 445(SMB)
2020-08-13 19:48:30
122.170.14.17 attackspambots
Unauthorized connection attempt from IP address 122.170.14.17 on Port 445(SMB)
2020-08-13 20:06:04
180.252.22.24 attackspam
 TCP (SYN) 180.252.22.24:64139 -> port 445, len 52
2020-08-13 19:40:11
110.136.217.16 attackspambots
20/8/12@23:46:54: FAIL: Alarm-Intrusion address from=110.136.217.16
...
2020-08-13 19:35:27
27.65.107.177 attackspam
Attempted connection to port 88.
2020-08-13 19:33:25

最近上报的IP列表

139.162.7.46 139.162.76.120 139.162.75.103 139.162.78.18
139.162.75.159 139.162.82.142 139.162.84.169 139.162.85.191
139.162.77.186 139.162.84.93 139.162.88.232 12.73.44.132
139.162.89.56 139.162.89.232 139.162.9.170 139.177.205.249
139.180.131.166 139.162.96.213 139.177.178.119 142.60.171.247