必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.211.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.211.249.		IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:14:03 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
249.211.180.139.in-addr.arpa domain name pointer 139.180.211.249.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.211.180.139.in-addr.arpa	name = 139.180.211.249.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.72.212.161 attackbots
Failed password for invalid user texdir from 148.72.212.161 port 48502 ssh2
Invalid user teste1 from 148.72.212.161 port 45858
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.212.161
Failed password for invalid user teste1 from 148.72.212.161 port 45858 ssh2
Invalid user insurgency from 148.72.212.161 port 43222
2019-07-06 10:25:09
91.227.28.120 attackbotsspam
DATE:2019-07-05_20:29:45, IP:91.227.28.120, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-06 09:55:54
121.194.2.247 attackspam
firewall-block, port(s): 22/tcp
2019-07-06 10:28:29
180.250.108.133 attackspam
DATE:2019-07-06 01:46:44, IP:180.250.108.133, PORT:ssh brute force auth on SSH service (patata)
2019-07-06 09:59:37
36.7.140.77 attack
Jul  5 20:37:52 core01 sshd\[27722\]: Invalid user ph from 36.7.140.77 port 48455
Jul  5 20:37:52 core01 sshd\[27722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.7.140.77
...
2019-07-06 10:19:15
197.50.239.28 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:08:07,936 INFO [amun_request_handler] PortScan Detected on Port: 445 (197.50.239.28)
2019-07-06 10:15:48
122.114.249.229 attackspam
fail2ban honeypot
2019-07-06 10:04:27
125.27.56.107 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 15:59:15,714 INFO [shellcode_manager] (125.27.56.107) no match, writing hexdump (47b94d6d332b48690a815d8a69fe4d11 :2018342) - SMB (Unknown)
2019-07-06 10:13:58
1.172.53.79 attack
firewall-block, port(s): 23/tcp
2019-07-06 10:33:52
117.3.66.244 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 23:03:17,670 INFO [shellcode_manager] (117.3.66.244) no match, writing hexdump (86755ecbcf8f9c714526602b995b1f37 :2050560) - MS17010 (EternalBlue)
2019-07-06 10:00:11
169.1.176.60 attack
23/tcp
[2019-07-05]1pkt
2019-07-06 10:24:53
79.7.217.174 attackbotsspam
2019-07-05T18:19:07.693300abusebot-4.cloudsearch.cf sshd\[13491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host174-217-static.7-79-b.business.telecomitalia.it  user=root
2019-07-06 10:18:44
5.62.19.38 attackbotsspam
\[2019-07-06 02:49:56\] NOTICE\[4808\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '5.62.19.38:2702' \(callid: 59946983-989280420-61650758\) - Failed to authenticate
\[2019-07-06 02:49:56\] SECURITY\[3671\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-06T02:49:56.731+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="59946983-989280420-61650758",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/5.62.19.38/2702",Challenge="1562374196/857e2e27fcdb8852784ced63e76e975f",Response="5d8819a7df1623fef932d52f20e0b9b7",ExpectedResponse=""
\[2019-07-06 02:49:56\] NOTICE\[13863\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '5.62.19.38:2702' \(callid: 59946983-989280420-61650758\) - Failed to authenticate
\[2019-07-06 02:49:56\] SECURITY\[3671\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-
2019-07-06 09:52:11
187.94.80.227 attackspambots
SASL PLAIN auth failed: ruser=...
2019-07-06 10:14:54
104.206.128.42 attackbots
proto=tcp  .  spt=57246  .  dpt=3389  .  src=104.206.128.42  .  dst=xx.xx.4.1  .     (listed on CINS badguys  Jul 05)     (26)
2019-07-06 09:53:36

最近上报的IP列表

139.180.211.247 139.180.211.29 139.180.211.44 118.238.6.102
139.180.211.61 139.180.211.45 139.180.211.37 139.180.211.40
139.180.212.120 139.180.211.67 139.180.212.113 139.180.212.13
139.180.212.133 139.180.212.208 139.180.212.249 139.180.212.215
139.180.212.235 139.180.212.253 139.180.212.34 139.180.212.76