必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): PT. First Media TBK

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspam
TCP src-port=18499   dst-port=25    abuseat-org barracuda zen-spamhaus         (758)
2019-09-15 10:39:04
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.201.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62798
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.193.201.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091401 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 15 10:38:58 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
53.201.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-201-53.fast.net.id.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
53.201.193.139.in-addr.arpa	name = fm-dyn-139-193-201-53.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
39.106.12.243 attackbots
[MK-VM4] Blocked by UFW
2020-08-31 08:57:57
49.233.199.240 attackbots
SSH bruteforce
2020-08-31 08:21:28
181.129.14.218 attack
Aug 30 17:36:24 ny01 sshd[25042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
Aug 30 17:36:25 ny01 sshd[25042]: Failed password for invalid user martina from 181.129.14.218 port 36216 ssh2
Aug 30 17:40:45 ny01 sshd[25570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
2020-08-31 08:57:22
85.204.246.240 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-31 08:26:48
71.76.140.36 attack
Unauthorized connection attempt from IP address 71.76.140.36 on Port 445(SMB)
2020-08-31 08:53:30
213.59.135.87 attack
2020-08-31T00:36:52.595571abusebot-7.cloudsearch.cf sshd[27619]: Invalid user ftp-user from 213.59.135.87 port 48294
2020-08-31T00:36:52.600115abusebot-7.cloudsearch.cf sshd[27619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87
2020-08-31T00:36:52.595571abusebot-7.cloudsearch.cf sshd[27619]: Invalid user ftp-user from 213.59.135.87 port 48294
2020-08-31T00:36:54.538835abusebot-7.cloudsearch.cf sshd[27619]: Failed password for invalid user ftp-user from 213.59.135.87 port 48294 ssh2
2020-08-31T00:40:30.746742abusebot-7.cloudsearch.cf sshd[27622]: Invalid user scj from 213.59.135.87 port 50688
2020-08-31T00:40:30.753677abusebot-7.cloudsearch.cf sshd[27622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87
2020-08-31T00:40:30.746742abusebot-7.cloudsearch.cf sshd[27622]: Invalid user scj from 213.59.135.87 port 50688
2020-08-31T00:40:32.953323abusebot-7.cloudsearch.cf sshd[27622]: F
...
2020-08-31 08:52:57
82.207.46.145 attack
 TCP (SYN) 82.207.46.145:53976 -> port 445, len 52
2020-08-31 08:56:51
167.99.93.5 attackspam
(sshd) Failed SSH login from 167.99.93.5 (GB/United Kingdom/-): 5 in the last 3600 secs
2020-08-31 08:48:29
185.32.46.176 attack
Unauthorized connection attempt from IP address 185.32.46.176 on Port 445(SMB)
2020-08-31 08:32:48
60.168.26.58 attack
SSH/22 MH Probe, BF, Hack -
2020-08-31 08:47:55
49.235.240.105 attack
Aug 30 22:39:56 jumpserver sshd[117383]: Failed password for invalid user filip from 49.235.240.105 port 38800 ssh2
Aug 30 22:45:07 jumpserver sshd[117413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.105  user=root
Aug 30 22:45:09 jumpserver sshd[117413]: Failed password for root from 49.235.240.105 port 42734 ssh2
...
2020-08-31 08:53:54
182.253.117.99 attackspam
Aug 30 20:31:50 *** sshd[15966]: User root from 182.253.117.99 not allowed because not listed in AllowUsers
2020-08-31 08:59:28
193.27.229.189 attack
[H1.VM2] Blocked by UFW
2020-08-31 08:35:54
88.250.91.139 attackbotsspam
Unauthorized connection attempt from IP address 88.250.91.139 on Port 445(SMB)
2020-08-31 08:25:38
189.173.113.84 attackspambots
Unauthorized connection attempt from IP address 189.173.113.84 on Port 445(SMB)
2020-08-31 08:37:06

最近上报的IP列表

145.1.179.237 42.125.129.48 89.22.201.221 191.55.13.169
113.233.192.63 13.126.77.184 187.227.208.156 159.203.201.61
144.79.133.251 46.135.224.255 190.145.78.66 200.194.182.142
113.236.69.149 114.43.108.35 159.65.12.52 14.184.66.79
213.233.48.134 2.230.70.149 112.231.198.38 175.119.210.74