必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.180.137.163 attack
Registration form abuse
2020-06-30 23:56:29
139.180.137.38 attackbots
2020-02-01 15:30:38 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.137.38\]:63683 I=\[193.107.88.166\]:25 input="CONNECT 35.170.216.115:443 HTTP/"
2020-02-01 15:30:38 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.137.38\]:63707 I=\[193.107.88.166\]:25 input="\004\001\001�\#��s"
2020-02-01 15:30:38 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.137.38\]:63728 I=\[193.107.88.166\]:25 input="\005\001"
...
2020-02-05 01:09:06
139.180.137.254 attackbots
Invalid user tc from 139.180.137.254 port 39268
2020-01-10 23:07:33
139.180.137.254 attackbots
(sshd) Failed SSH login from 139.180.137.254 (SG/Singapore/139.180.137.254.vultr.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan  8 01:27:15 svr sshd[2962991]: Invalid user gameservers from 139.180.137.254 port 38980
Jan  8 01:27:17 svr sshd[2962991]: Failed password for invalid user gameservers from 139.180.137.254 port 38980 ssh2
Jan  8 01:44:44 svr sshd[3020581]: Invalid user server from 139.180.137.254 port 55294
Jan  8 01:44:46 svr sshd[3020581]: Failed password for invalid user server from 139.180.137.254 port 55294 ssh2
Jan  8 01:48:06 svr sshd[3031942]: Invalid user aiq from 139.180.137.254 port 59084
2020-01-08 18:19:01
139.180.137.254 attack
Dec  5 05:50:12 sbg01 sshd[10065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
Dec  5 05:50:14 sbg01 sshd[10065]: Failed password for invalid user admin from 139.180.137.254 port 33640 ssh2
Dec  5 05:56:42 sbg01 sshd[10126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
2019-12-05 13:49:28
139.180.137.254 attackbotsspam
Dec  5 01:11:55 vibhu-HP-Z238-Microtower-Workstation sshd\[5153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254  user=root
Dec  5 01:11:57 vibhu-HP-Z238-Microtower-Workstation sshd\[5153\]: Failed password for root from 139.180.137.254 port 41110 ssh2
Dec  5 01:20:10 vibhu-HP-Z238-Microtower-Workstation sshd\[5619\]: Invalid user stoklosa from 139.180.137.254
Dec  5 01:20:10 vibhu-HP-Z238-Microtower-Workstation sshd\[5619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
Dec  5 01:20:12 vibhu-HP-Z238-Microtower-Workstation sshd\[5619\]: Failed password for invalid user stoklosa from 139.180.137.254 port 52748 ssh2
...
2019-12-05 03:53:44
139.180.137.254 attack
detected by Fail2Ban
2019-12-04 00:54:10
139.180.137.254 attack
2019-12-01 07:00:33 server sshd[42235]: Failed password for invalid user test from 139.180.137.254 port 43538 ssh2
2019-12-02 00:25:11
139.180.137.254 attackspam
Lines containing failures of 139.180.137.254
Nov 25 20:27:58 shared07 sshd[15838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254  user=r.r
Nov 25 20:28:00 shared07 sshd[15838]: Failed password for r.r from 139.180.137.254 port 43568 ssh2
Nov 25 20:28:00 shared07 sshd[15838]: Received disconnect from 139.180.137.254 port 43568:11: Bye Bye [preauth]
Nov 25 20:28:00 shared07 sshd[15838]: Disconnected from authenticating user r.r 139.180.137.254 port 43568 [preauth]
Nov 25 20:57:50 shared07 sshd[25744]: Invalid user selamat from 139.180.137.254 port 49668
Nov 25 20:57:50 shared07 sshd[25744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
Nov 25 20:57:52 shared07 sshd[25744]: Failed password for invalid user selamat from 139.180.137.254 port 49668 ssh2
Nov 25 20:57:52 shared07 sshd[25744]: Received disconnect from 139.180.137.254 port 49668:11: Bye Bye [preauth]........
------------------------------
2019-11-27 04:09:31
139.180.137.254 attack
Nov 23 13:28:19 debian sshd\[21531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254  user=root
Nov 23 13:28:20 debian sshd\[21531\]: Failed password for root from 139.180.137.254 port 58760 ssh2
Nov 23 13:34:54 debian sshd\[21939\]: Invalid user oooo from 139.180.137.254 port 51406
Nov 23 13:34:54 debian sshd\[21939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.137.254
...
2019-11-23 18:38:47
139.180.137.254 attackspambots
$f2bV_matches
2019-11-22 14:13:09
139.180.137.216 attackbotsspam
2019-08-1522:17:51dovecot_plainauthenticatorfailedfor\(g6juv4vfbuu59gqmke3kyvmued6kn\)[14.225.3.16]:55054:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:11:59dovecot_plainauthenticatorfailedfor\(ikxtaqzpbvzha0h5pkxxrvvcaow9u613\)[14.225.3.16]:42385:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:10:53dovecot_plainauthenticatorfailedfor\(dv4orrvgfo0fhuvj0p0tjntekssvsz\)[139.180.137.216]:40118:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:58:52dovecot_plainauthenticatorfailedfor\([191.53.195.232]\)[191.53.195.232]:37092:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:44:41dovecot_plainauthenticatorfailedfor\([177.21.198.140]\)[177.21.198.140]:32780:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:29:56dovecot_plainauthenticatorfailedfor\([138.36.200.238]\)[138.36.200.238]:52220:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:12:19dovecot_plainauthenticatorfailedforip-192-169-216-124.ip.secureserver.net\(comgn6j34cvvnuxh64r090jhs1\)[192.169.216.124]:5
2019-08-16 07:38:42
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.137.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64231
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.137.69.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:11:56 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
69.137.180.139.in-addr.arpa domain name pointer 139.180.137.69.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.137.180.139.in-addr.arpa	name = 139.180.137.69.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.143.155.139 attackbots
" "
2020-06-24 23:34:13
188.226.167.212 attackbotsspam
Jun 24 17:15:58 minden010 sshd[17535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.167.212
Jun 24 17:16:00 minden010 sshd[17535]: Failed password for invalid user jonas from 188.226.167.212 port 38814 ssh2
Jun 24 17:21:37 minden010 sshd[19455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.167.212
...
2020-06-25 00:07:40
45.145.66.10 attackspambots
06/24/2020-11:26:40.463779 45.145.66.10 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-24 23:59:45
62.99.54.90 attackbotsspam
Failed password for invalid user hms from 62.99.54.90 port 16107 ssh2
2020-06-25 00:10:21
51.83.193.246 attackspam
Jun 24 16:09:19 ns382633 sshd\[22098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.193.246  user=root
Jun 24 16:09:21 ns382633 sshd\[22098\]: Failed password for root from 51.83.193.246 port 44332 ssh2
Jun 24 16:12:56 ns382633 sshd\[23212\]: Invalid user admin from 51.83.193.246 port 38526
Jun 24 16:12:56 ns382633 sshd\[23212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.193.246
Jun 24 16:12:58 ns382633 sshd\[23212\]: Failed password for invalid user admin from 51.83.193.246 port 38526 ssh2
2020-06-25 00:14:02
222.186.30.167 attackspambots
Jun 24 17:28:08 v22018053744266470 sshd[26955]: Failed password for root from 222.186.30.167 port 51818 ssh2
Jun 24 17:28:17 v22018053744266470 sshd[26967]: Failed password for root from 222.186.30.167 port 20420 ssh2
...
2020-06-24 23:40:24
157.245.207.198 attackbots
Jun 24 17:36:34 mail sshd[18228]: Failed password for root from 157.245.207.198 port 52414 ssh2
Jun 24 17:44:39 mail sshd[19279]: Failed password for invalid user ss3server from 157.245.207.198 port 57710 ssh2
...
2020-06-25 00:15:21
180.182.47.132 attack
SSH Brute-Forcing (server2)
2020-06-25 00:08:04
200.88.48.99 attackspambots
Jun 24 15:31:20 ip-172-31-62-245 sshd\[29552\]: Invalid user jan from 200.88.48.99\
Jun 24 15:31:22 ip-172-31-62-245 sshd\[29552\]: Failed password for invalid user jan from 200.88.48.99 port 58434 ssh2\
Jun 24 15:34:43 ip-172-31-62-245 sshd\[29602\]: Invalid user broadcast from 200.88.48.99\
Jun 24 15:34:45 ip-172-31-62-245 sshd\[29602\]: Failed password for invalid user broadcast from 200.88.48.99 port 56382 ssh2\
Jun 24 15:38:15 ip-172-31-62-245 sshd\[29627\]: Invalid user team1 from 200.88.48.99\
2020-06-25 00:18:58
191.209.82.106 attack
2020-06-24T07:06:11.247895morrigan.ad5gb.com sshd[1754313]: Invalid user jpa from 191.209.82.106 port 37390
2020-06-24T07:06:13.092007morrigan.ad5gb.com sshd[1754313]: Failed password for invalid user jpa from 191.209.82.106 port 37390 ssh2
2020-06-24 23:51:44
58.27.238.10 attackbots
Dovecot Invalid User Login Attempt.
2020-06-24 23:49:31
36.89.163.178 attack
Jun 24 19:02:12 pkdns2 sshd\[1675\]: Invalid user cat from 36.89.163.178Jun 24 19:02:15 pkdns2 sshd\[1675\]: Failed password for invalid user cat from 36.89.163.178 port 57046 ssh2Jun 24 19:05:26 pkdns2 sshd\[1825\]: Invalid user nexus from 36.89.163.178Jun 24 19:05:27 pkdns2 sshd\[1825\]: Failed password for invalid user nexus from 36.89.163.178 port 49232 ssh2Jun 24 19:08:38 pkdns2 sshd\[1931\]: Invalid user wur from 36.89.163.178Jun 24 19:08:40 pkdns2 sshd\[1931\]: Failed password for invalid user wur from 36.89.163.178 port 41420 ssh2
...
2020-06-25 00:18:28
222.186.175.154 attackbots
Jun 24 17:58:54 home sshd[16828]: Failed password for root from 222.186.175.154 port 50166 ssh2
Jun 24 17:59:11 home sshd[16828]: Failed password for root from 222.186.175.154 port 50166 ssh2
Jun 24 17:59:11 home sshd[16828]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 50166 ssh2 [preauth]
...
2020-06-25 00:04:25
104.131.189.4 attackbots
Scanned 300 unique addresses for 2 unique TCP ports in 24 hours (ports 1363,28605)
2020-06-25 00:17:27
104.211.204.150 attackspam
Jun 24 15:37:25 ssh2 sshd[69323]: User root from 104.211.204.150 not allowed because not listed in AllowUsers
Jun 24 15:37:25 ssh2 sshd[69323]: Failed password for invalid user root from 104.211.204.150 port 11013 ssh2
Jun 24 15:37:26 ssh2 sshd[69323]: Disconnected from invalid user root 104.211.204.150 port 11013 [preauth]
...
2020-06-25 00:00:31

最近上报的IP列表

139.180.138.177 118.233.195.96 139.180.138.184 139.180.138.211
139.180.138.186 139.180.138.64 139.180.139.111 139.180.139.144
139.180.139.176 139.180.139.112 139.180.139.192 139.180.139.150
139.180.139.221 118.233.212.27 139.180.139.187 139.180.139.232
139.180.139.235 139.180.139.237 139.180.139.253 139.180.139.243