必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.180.129.196 attackspambots
Unauthorized connection attempt detected from IP address 139.180.129.196 to port 1433
2020-01-01 02:51:56
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.129.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.129.130.		IN	A

;; AUTHORITY SECTION:
.			500	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:11:41 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
130.129.180.139.in-addr.arpa domain name pointer 139.180.129.130.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.129.180.139.in-addr.arpa	name = 139.180.129.130.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.173.142 attackbots
detected by Fail2Ban
2019-11-16 08:28:09
190.38.238.67 attack
43 failed attempt(s) in the last 24h
2019-11-16 08:40:43
138.197.213.185 attack
Nov 16 00:49:53 MK-Soft-Root1 sshd[19808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.213.185 
Nov 16 00:49:54 MK-Soft-Root1 sshd[19808]: Failed password for invalid user oracle from 138.197.213.185 port 58388 ssh2
...
2019-11-16 08:41:30
192.254.73.218 attackbotsspam
Nov 14 06:54:52 itv-usvr-01 sshd[17663]: Invalid user www from 192.254.73.218
Nov 14 06:54:52 itv-usvr-01 sshd[17663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.254.73.218
Nov 14 06:54:52 itv-usvr-01 sshd[17663]: Invalid user www from 192.254.73.218
Nov 14 06:54:54 itv-usvr-01 sshd[17663]: Failed password for invalid user www from 192.254.73.218 port 47540 ssh2
Nov 14 06:58:28 itv-usvr-01 sshd[17816]: Invalid user parzych from 192.254.73.218
2019-11-16 08:26:47
189.27.86.53 attackbotsspam
Nov 14 11:58:10 itv-usvr-01 sshd[30115]: Invalid user server from 189.27.86.53
Nov 14 11:58:10 itv-usvr-01 sshd[30115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.27.86.53
Nov 14 11:58:10 itv-usvr-01 sshd[30115]: Invalid user server from 189.27.86.53
Nov 14 11:58:12 itv-usvr-01 sshd[30115]: Failed password for invalid user server from 189.27.86.53 port 51393 ssh2
Nov 14 12:07:01 itv-usvr-01 sshd[30628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.27.86.53  user=root
Nov 14 12:07:03 itv-usvr-01 sshd[30628]: Failed password for root from 189.27.86.53 port 46700 ssh2
2019-11-16 08:43:56
51.38.234.224 attack
Nov 16 00:12:51 web8 sshd\[12613\]: Invalid user fuquay from 51.38.234.224
Nov 16 00:12:51 web8 sshd\[12613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.224
Nov 16 00:12:53 web8 sshd\[12613\]: Failed password for invalid user fuquay from 51.38.234.224 port 40756 ssh2
Nov 16 00:16:29 web8 sshd\[14507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.224  user=games
Nov 16 00:16:32 web8 sshd\[14507\]: Failed password for games from 51.38.234.224 port 50154 ssh2
2019-11-16 08:43:18
192.99.245.135 attackbotsspam
Invalid user seneschi from 192.99.245.135 port 51724
2019-11-16 08:25:08
113.173.139.47 attack
Nov 15 17:58:59 web1 postfix/smtpd[26177]: warning: unknown[113.173.139.47]: SASL PLAIN authentication failed: authentication failure
...
2019-11-16 08:17:05
213.149.61.251 attackspambots
Malicious/Probing: /xmlrpc.php
2019-11-16 08:24:45
138.122.20.5 attackbots
1433/tcp 1433/tcp 445/tcp
[2019-10-09/11-15]3pkt
2019-11-16 08:30:49
191.243.143.170 attack
Invalid user gilleron from 191.243.143.170 port 59014
2019-11-16 08:36:43
188.131.130.44 attackspam
Invalid user safholm from 188.131.130.44 port 44750
2019-11-16 08:54:37
193.194.69.99 attackspambots
2019-11-16T00:27:06.734669  sshd[16549]: Invalid user ep from 193.194.69.99 port 53030
2019-11-16T00:27:06.748512  sshd[16549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.69.99
2019-11-16T00:27:06.734669  sshd[16549]: Invalid user ep from 193.194.69.99 port 53030
2019-11-16T00:27:08.496513  sshd[16549]: Failed password for invalid user ep from 193.194.69.99 port 53030 ssh2
2019-11-16T00:30:43.349489  sshd[16679]: Invalid user oshikiri from 193.194.69.99 port 33506
...
2019-11-16 08:20:06
194.170.189.226 attackbotsspam
1433/tcp 445/tcp...
[2019-10-11/11-15]14pkt,2pt.(tcp)
2019-11-16 08:36:25
192.81.211.152 attackbotsspam
Invalid user jaziel from 192.81.211.152 port 36808
2019-11-16 08:27:14

最近上报的IP列表

139.180.129.126 139.180.129.137 118.232.66.208 139.180.129.139
118.233.131.118 118.233.131.33 118.233.164.145 118.233.167.70
139.180.138.159 139.180.137.52 139.180.137.46 139.180.137.96
139.180.138.157 139.180.138.129 139.180.137.228 139.180.138.163
139.180.137.27 139.180.137.66 139.180.138.177 139.180.137.69