必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.252.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.252.105.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 22:16:03 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
105.252.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-252-105.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.252.193.139.in-addr.arpa	name = fm-dyn-139-193-252-105.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.43.178.220 attack
:
2019-08-26 05:06:17
106.12.190.217 attack
firewall-block, port(s): 23/tcp
2019-08-26 05:07:22
45.55.184.78 attackbots
Aug 25 22:53:48 eventyay sshd[12322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78
Aug 25 22:53:50 eventyay sshd[12322]: Failed password for invalid user jking from 45.55.184.78 port 57830 ssh2
Aug 25 22:58:43 eventyay sshd[12415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.184.78
...
2019-08-26 05:05:58
185.94.111.1 attack
Scanning random ports - tries to find possible vulnerable services
2019-08-26 05:00:13
35.194.223.105 attack
Aug 25 23:13:31 root sshd[21267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.223.105 
Aug 25 23:13:33 root sshd[21267]: Failed password for invalid user master123 from 35.194.223.105 port 46196 ssh2
Aug 25 23:17:54 root sshd[21320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.223.105 
...
2019-08-26 05:37:01
51.38.178.74 attack
Aug 25 23:18:20 SilenceServices sshd[14736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.178.74
Aug 25 23:18:22 SilenceServices sshd[14736]: Failed password for invalid user test from 51.38.178.74 port 33802 ssh2
Aug 25 23:23:06 SilenceServices sshd[16654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.178.74
2019-08-26 05:27:50
37.228.138.150 attackbotsspam
firewall-block, port(s): 139/tcp, 445/tcp
2019-08-26 05:13:35
217.218.21.242 attackbots
Aug 25 21:03:49 mail sshd\[10092\]: Failed password for invalid user csgoserver from 217.218.21.242 port 1036 ssh2
Aug 25 21:08:10 mail sshd\[10648\]: Invalid user stan from 217.218.21.242 port 1640
Aug 25 21:08:10 mail sshd\[10648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.21.242
Aug 25 21:08:12 mail sshd\[10648\]: Failed password for invalid user stan from 217.218.21.242 port 1640 ssh2
Aug 25 21:12:18 mail sshd\[11262\]: Invalid user mrtinluther from 217.218.21.242 port 4928
2019-08-26 05:32:56
178.182.254.51 attackbotsspam
ssh intrusion attempt
2019-08-26 05:09:38
47.100.205.231 attackspam
firewall-block, port(s): 80/tcp, 8080/tcp
2019-08-26 05:12:51
121.244.90.18 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 17:29:42,296 INFO [amun_request_handler] PortScan Detected on Port: 445 (121.244.90.18)
2019-08-26 05:34:23
134.209.253.126 attackbotsspam
Aug 25 20:57:52 hb sshd\[10998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.253.126  user=root
Aug 25 20:57:54 hb sshd\[10998\]: Failed password for root from 134.209.253.126 port 40082 ssh2
Aug 25 21:02:04 hb sshd\[11412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.253.126  user=root
Aug 25 21:02:06 hb sshd\[11412\]: Failed password for root from 134.209.253.126 port 57820 ssh2
Aug 25 21:06:11 hb sshd\[11787\]: Invalid user power from 134.209.253.126
Aug 25 21:06:11 hb sshd\[11787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.253.126
2019-08-26 05:17:37
186.128.76.13 attackbotsspam
Aug 25 08:49:29 tdfoods sshd\[25086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.128.76.13  user=root
Aug 25 08:49:32 tdfoods sshd\[25086\]: Failed password for root from 186.128.76.13 port 44704 ssh2
Aug 25 08:49:33 tdfoods sshd\[25086\]: Failed password for root from 186.128.76.13 port 44704 ssh2
Aug 25 08:49:36 tdfoods sshd\[25086\]: Failed password for root from 186.128.76.13 port 44704 ssh2
Aug 25 08:49:39 tdfoods sshd\[25086\]: Failed password for root from 186.128.76.13 port 44704 ssh2
2019-08-26 05:32:23
51.91.251.20 attackspam
Aug 25 10:57:55 tdfoods sshd\[4500\]: Invalid user watson from 51.91.251.20
Aug 25 10:57:55 tdfoods sshd\[4500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-91-251.eu
Aug 25 10:57:57 tdfoods sshd\[4500\]: Failed password for invalid user watson from 51.91.251.20 port 58690 ssh2
Aug 25 11:02:07 tdfoods sshd\[4912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-91-251.eu  user=www-data
Aug 25 11:02:09 tdfoods sshd\[4912\]: Failed password for www-data from 51.91.251.20 port 49264 ssh2
2019-08-26 05:10:14
221.226.48.78 attackspambots
Aug 25 14:49:37 Tower sshd[38903]: Connection from 221.226.48.78 port 36964 on 192.168.10.220 port 22
Aug 25 14:49:38 Tower sshd[38903]: Invalid user permlink from 221.226.48.78 port 36964
Aug 25 14:49:38 Tower sshd[38903]: error: Could not get shadow information for NOUSER
Aug 25 14:49:38 Tower sshd[38903]: Failed password for invalid user permlink from 221.226.48.78 port 36964 ssh2
Aug 25 14:49:39 Tower sshd[38903]: Received disconnect from 221.226.48.78 port 36964:11: Bye Bye [preauth]
Aug 25 14:49:39 Tower sshd[38903]: Disconnected from invalid user permlink 221.226.48.78 port 36964 [preauth]
2019-08-26 05:29:39

最近上报的IP列表

161.99.214.119 133.151.161.71 255.87.177.236 174.172.129.29
12.120.221.9 127.46.100.47 40.80.133.16 60.61.146.140
43.236.159.231 197.159.220.209 232.196.108.87 204.44.104.21
27.68.8.97 95.46.176.107 161.131.148.176 54.188.139.185
83.131.168.85 235.163.254.159 200.204.71.223 120.31.157.220