必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.180.142.5 attack
Unauthorized connection attempt detected from IP address 139.180.142.5 to port 445 [T]
2020-07-22 01:09:30
139.180.142.152 attackspambots
2019-07-25T08:00:21.580792abusebot-6.cloudsearch.cf sshd\[14092\]: Invalid user Tech\$123 from 139.180.142.152 port 55358
2019-07-25 18:34:42
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.142.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.142.252.		IN	A

;; AUTHORITY SECTION:
.			416	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:12:15 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
252.142.180.139.in-addr.arpa domain name pointer 139.180.142.252.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.142.180.139.in-addr.arpa	name = 139.180.142.252.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.70.94 attackspambots
$f2bV_matches
2019-08-27 15:13:50
124.149.253.83 attackbotsspam
Aug 27 04:01:09 ks10 sshd[29535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.149.253.83 
Aug 27 04:01:12 ks10 sshd[29535]: Failed password for invalid user test9 from 124.149.253.83 port 35652 ssh2
...
2019-08-27 14:27:33
217.112.128.197 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-08-27 14:46:58
51.254.131.137 attack
Aug 27 07:55:55 debian sshd\[25812\]: Invalid user test2 from 51.254.131.137 port 43250
Aug 27 07:55:55 debian sshd\[25812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.131.137
...
2019-08-27 15:06:06
189.79.72.225 attackbots
Unauthorized connection attempt from IP address 189.79.72.225 on Port 445(SMB)
2019-08-27 15:05:34
165.227.124.229 attackbots
Invalid user elton from 165.227.124.229 port 47934
2019-08-27 15:14:42
166.111.80.44 attack
Aug 27 01:33:55 vps01 sshd[25343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.80.44
Aug 27 01:33:57 vps01 sshd[25343]: Failed password for invalid user clon from 166.111.80.44 port 54640 ssh2
2019-08-27 14:46:04
178.62.127.32 attackbotsspam
Aug 26 17:34:40 lcprod sshd\[8443\]: Invalid user kara from 178.62.127.32
Aug 26 17:34:40 lcprod sshd\[8443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.127.32
Aug 26 17:34:42 lcprod sshd\[8443\]: Failed password for invalid user kara from 178.62.127.32 port 47286 ssh2
Aug 26 17:42:19 lcprod sshd\[9227\]: Invalid user geng from 178.62.127.32
Aug 26 17:42:19 lcprod sshd\[9227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.127.32
2019-08-27 14:59:29
167.71.203.155 attackbotsspam
Aug 27 07:00:29 MK-Soft-VM7 sshd\[7357\]: Invalid user owen from 167.71.203.155 port 57162
Aug 27 07:00:29 MK-Soft-VM7 sshd\[7357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.203.155
Aug 27 07:00:31 MK-Soft-VM7 sshd\[7357\]: Failed password for invalid user owen from 167.71.203.155 port 57162 ssh2
...
2019-08-27 15:01:39
109.73.180.220 attackspambots
Automatic report - Port Scan Attack
2019-08-27 14:19:36
51.254.220.20 attackbotsspam
" "
2019-08-27 14:41:10
95.106.111.193 attack
Unauthorized connection attempt from IP address 95.106.111.193 on Port 445(SMB)
2019-08-27 15:02:06
178.62.194.63 attackspam
Aug 26 15:20:25 eddieflores sshd\[10317\]: Invalid user tl from 178.62.194.63
Aug 26 15:20:25 eddieflores sshd\[10317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.194.63
Aug 26 15:20:27 eddieflores sshd\[10317\]: Failed password for invalid user tl from 178.62.194.63 port 41318 ssh2
Aug 26 15:24:27 eddieflores sshd\[10672\]: Invalid user vacation from 178.62.194.63
Aug 26 15:24:27 eddieflores sshd\[10672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.194.63
2019-08-27 15:00:29
139.59.59.187 attack
" "
2019-08-27 14:21:22
150.95.184.153 attackspambots
Aug 26 19:08:08 web9 sshd\[16374\]: Invalid user center from 150.95.184.153
Aug 26 19:08:08 web9 sshd\[16374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.184.153
Aug 26 19:08:10 web9 sshd\[16374\]: Failed password for invalid user center from 150.95.184.153 port 56478 ssh2
Aug 26 19:12:47 web9 sshd\[17239\]: Invalid user gerencia from 150.95.184.153
Aug 26 19:12:47 web9 sshd\[17239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.184.153
2019-08-27 14:40:49

最近上报的IP列表

118.233.52.2 139.180.142.40 139.180.142.58 139.180.142.70
139.180.143.218 139.180.143.160 139.180.143.214 139.180.143.206
139.180.143.115 139.180.143.245 139.180.143.161 139.180.143.20
139.180.143.37 118.233.57.44 139.180.143.89 139.180.144.126
139.180.144.122 139.180.143.39 139.180.144.102 139.180.144.157