必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): Choopa LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
Invalid user tc from 139.180.137.254 port 39268
2020-01-10 23:07:33
attackbots
(sshd) Failed SSH login from 139.180.137.254 (SG/Singapore/139.180.137.254.vultr.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan  8 01:27:15 svr sshd[2962991]: Invalid user gameservers from 139.180.137.254 port 38980
Jan  8 01:27:17 svr sshd[2962991]: Failed password for invalid user gameservers from 139.180.137.254 port 38980 ssh2
Jan  8 01:44:44 svr sshd[3020581]: Invalid user server from 139.180.137.254 port 55294
Jan  8 01:44:46 svr sshd[3020581]: Failed password for invalid user server from 139.180.137.254 port 55294 ssh2
Jan  8 01:48:06 svr sshd[3031942]: Invalid user aiq from 139.180.137.254 port 59084
2020-01-08 18:19:01
attack
Dec  5 05:50:12 sbg01 sshd[10065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
Dec  5 05:50:14 sbg01 sshd[10065]: Failed password for invalid user admin from 139.180.137.254 port 33640 ssh2
Dec  5 05:56:42 sbg01 sshd[10126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
2019-12-05 13:49:28
attackbotsspam
Dec  5 01:11:55 vibhu-HP-Z238-Microtower-Workstation sshd\[5153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254  user=root
Dec  5 01:11:57 vibhu-HP-Z238-Microtower-Workstation sshd\[5153\]: Failed password for root from 139.180.137.254 port 41110 ssh2
Dec  5 01:20:10 vibhu-HP-Z238-Microtower-Workstation sshd\[5619\]: Invalid user stoklosa from 139.180.137.254
Dec  5 01:20:10 vibhu-HP-Z238-Microtower-Workstation sshd\[5619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
Dec  5 01:20:12 vibhu-HP-Z238-Microtower-Workstation sshd\[5619\]: Failed password for invalid user stoklosa from 139.180.137.254 port 52748 ssh2
...
2019-12-05 03:53:44
attack
detected by Fail2Ban
2019-12-04 00:54:10
attack
2019-12-01 07:00:33 server sshd[42235]: Failed password for invalid user test from 139.180.137.254 port 43538 ssh2
2019-12-02 00:25:11
attackspam
Lines containing failures of 139.180.137.254
Nov 25 20:27:58 shared07 sshd[15838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254  user=r.r
Nov 25 20:28:00 shared07 sshd[15838]: Failed password for r.r from 139.180.137.254 port 43568 ssh2
Nov 25 20:28:00 shared07 sshd[15838]: Received disconnect from 139.180.137.254 port 43568:11: Bye Bye [preauth]
Nov 25 20:28:00 shared07 sshd[15838]: Disconnected from authenticating user r.r 139.180.137.254 port 43568 [preauth]
Nov 25 20:57:50 shared07 sshd[25744]: Invalid user selamat from 139.180.137.254 port 49668
Nov 25 20:57:50 shared07 sshd[25744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
Nov 25 20:57:52 shared07 sshd[25744]: Failed password for invalid user selamat from 139.180.137.254 port 49668 ssh2
Nov 25 20:57:52 shared07 sshd[25744]: Received disconnect from 139.180.137.254 port 49668:11: Bye Bye [preauth]........
------------------------------
2019-11-27 04:09:31
attack
Nov 23 13:28:19 debian sshd\[21531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254  user=root
Nov 23 13:28:20 debian sshd\[21531\]: Failed password for root from 139.180.137.254 port 58760 ssh2
Nov 23 13:34:54 debian sshd\[21939\]: Invalid user oooo from 139.180.137.254 port 51406
Nov 23 13:34:54 debian sshd\[21939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
...
2019-11-23 18:38:47
attackspambots
$f2bV_matches
2019-11-22 14:13:09
相同子网IP讨论:
IP 类型 评论内容 时间
139.180.137.163 attack
Registration form abuse
2020-06-30 23:56:29
139.180.137.38 attackbots
2020-02-01 15:30:38 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.137.38\]:63683 I=\[193.107.88.166\]:25 input="CONNECT 35.170.216.115:443 HTTP/"
2020-02-01 15:30:38 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.137.38\]:63707 I=\[193.107.88.166\]:25 input="\004\001\001�\#��s"
2020-02-01 15:30:38 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.137.38\]:63728 I=\[193.107.88.166\]:25 input="\005\001"
...
2020-02-05 01:09:06
139.180.137.216 attackbotsspam
2019-08-1522:17:51dovecot_plainauthenticatorfailedfor\(g6juv4vfbuu59gqmke3kyvmued6kn\)[14.225.3.16]:55054:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:11:59dovecot_plainauthenticatorfailedfor\(ikxtaqzpbvzha0h5pkxxrvvcaow9u613\)[14.225.3.16]:42385:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:10:53dovecot_plainauthenticatorfailedfor\(dv4orrvgfo0fhuvj0p0tjntekssvsz\)[139.180.137.216]:40118:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:58:52dovecot_plainauthenticatorfailedfor\([191.53.195.232]\)[191.53.195.232]:37092:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:44:41dovecot_plainauthenticatorfailedfor\([177.21.198.140]\)[177.21.198.140]:32780:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:29:56dovecot_plainauthenticatorfailedfor\([138.36.200.238]\)[138.36.200.238]:52220:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:12:19dovecot_plainauthenticatorfailedforip-192-169-216-124.ip.secureserver.net\(comgn6j34cvvnuxh64r090jhs1\)[192.169.216.124]:5
2019-08-16 07:38:42
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.137.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.180.137.254.		IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112101 1800 900 604800 86400

;; Query time: 973 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 14:13:03 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
254.137.180.139.in-addr.arpa domain name pointer 139.180.137.254.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.137.180.139.in-addr.arpa	name = 139.180.137.254.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.99.237.183 attackspambots
Jul 15 01:40:42 Invalid user fake from 139.99.237.183 port 46960
2020-07-15 08:34:53
187.130.108.101 attack
Honeypot attack, port: 445, PTR: 187-130-108-101.uninet-ide.com.mx.
2020-07-15 08:33:21
220.247.201.109 attackspambots
Jul 15 00:18:12 marvibiene sshd[9354]: Invalid user mathilde from 220.247.201.109 port 37682
Jul 15 00:18:12 marvibiene sshd[9354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.201.109
Jul 15 00:18:12 marvibiene sshd[9354]: Invalid user mathilde from 220.247.201.109 port 37682
Jul 15 00:18:14 marvibiene sshd[9354]: Failed password for invalid user mathilde from 220.247.201.109 port 37682 ssh2
...
2020-07-15 08:43:21
168.194.207.58 attackbotsspam
Jun 25 18:05:19 server sshd[14308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.207.58
Jun 25 18:05:22 server sshd[14308]: Failed password for invalid user gabriela from 168.194.207.58 port 35481 ssh2
Jun 25 18:16:56 server sshd[15102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.207.58  user=root
Jun 25 18:16:59 server sshd[15102]: Failed password for invalid user root from 168.194.207.58 port 37313 ssh2
2020-07-15 08:41:06
1.197.137.162 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-15 08:40:19
134.122.76.222 attackspambots
Invalid user luyi from 134.122.76.222 port 53446
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.76.222
Invalid user luyi from 134.122.76.222 port 53446
Failed password for invalid user luyi from 134.122.76.222 port 53446 ssh2
Invalid user ahti from 134.122.76.222 port 38432
2020-07-15 08:46:34
114.34.176.25 attack
Honeypot attack, port: 81, PTR: 114-34-176-25.HINET-IP.hinet.net.
2020-07-15 08:55:27
103.235.170.195 attackbotsspam
SSH Invalid Login
2020-07-15 08:35:19
189.90.66.5 attackspambots
Jul 14 21:24:26 vpn01 sshd[25243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.66.5
Jul 14 21:24:28 vpn01 sshd[25243]: Failed password for invalid user sftp from 189.90.66.5 port 45416 ssh2
...
2020-07-15 08:52:47
193.169.252.21 attackbotsspam
firewall-block, port(s): 5683/udp, 30718/udp, 41794/udp
2020-07-15 08:51:10
61.177.172.142 attackspam
Scanned 16 times in the last 24 hours on port 22
2020-07-15 08:30:26
185.93.98.37 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-15 08:28:56
185.143.73.48 attack
2020-07-15 02:33:15 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrect authentication data \(set_id=citi@no-server.de\)
2020-07-15 02:33:28 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrect authentication data \(set_id=cdn01@no-server.de\)
2020-07-15 02:33:31 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrect authentication data \(set_id=cdn01@no-server.de\)
2020-07-15 02:33:45 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrect authentication data \(set_id=cdn01@no-server.de\)
2020-07-15 02:33:48 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrect authentication data \(set_id=eid@no-server.de\)
2020-07-15 02:34:00 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrect authentication data \(set_id=eid@no-server.de\)
2020-07-15 02:34:10 dovecot_login authenticator failed for \(User\) \[185.143.73.48\]: 535 Incorrec
...
2020-07-15 08:41:52
188.2.98.78 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-15 08:51:43
165.22.54.171 attack
Jul 15 01:27:53 ajax sshd[11114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.54.171 
Jul 15 01:27:55 ajax sshd[11114]: Failed password for invalid user ihor from 165.22.54.171 port 55992 ssh2
2020-07-15 08:33:36

最近上报的IP列表

121.230.191.152 117.91.249.69 14.248.66.38 49.89.86.233
60.187.32.29 223.240.248.247 183.166.99.13 128.14.181.162
106.57.22.127 200.98.69.114 117.65.50.219 114.64.255.197
114.105.169.222 183.163.37.83 123.206.129.36 103.199.144.65
123.129.3.36 123.162.174.65 39.189.42.238 201.43.22.107