必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta

国家(country): Indonesia

运营商(isp): PT. First Media TBK

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspam
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2019-11-08 13:57:19
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.35.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.193.35.30.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110800 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 08 13:57:15 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
30.35.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-35-30.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.35.193.139.in-addr.arpa	name = fm-dyn-139-193-35-30.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.229.233.50 attackbots
TCP Port Scanning
2020-07-03 20:15:44
170.82.194.163 attackbots
SMB Server BruteForce Attack
2020-07-03 20:27:14
180.166.114.14 attack
Jul  3 04:15:08 piServer sshd[21874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.114.14 
Jul  3 04:15:10 piServer sshd[21874]: Failed password for invalid user fw from 180.166.114.14 port 46055 ssh2
Jul  3 04:18:59 piServer sshd[22244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.114.14 
...
2020-07-03 20:28:00
171.242.70.46 attack
1593742756 - 07/03/2020 04:19:16 Host: 171.242.70.46/171.242.70.46 Port: 445 TCP Blocked
2020-07-03 20:18:53
159.65.30.66 attackspam
Jul  3 04:14:08 OPSO sshd\[18429\]: Invalid user ftpuser from 159.65.30.66 port 58830
Jul  3 04:14:08 OPSO sshd\[18429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66
Jul  3 04:14:10 OPSO sshd\[18429\]: Failed password for invalid user ftpuser from 159.65.30.66 port 58830 ssh2
Jul  3 04:17:31 OPSO sshd\[19139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66  user=root
Jul  3 04:17:33 OPSO sshd\[19139\]: Failed password for root from 159.65.30.66 port 56586 ssh2
2020-07-03 20:35:51
212.102.33.88 attackspam
(From robeson.sidney@outlook.com) Stem cell therapy has proven itself to be one of the most effective treatments for Parkinson's Disease. IMC is the leader in stem cell therapies in Mexico. For more information on how we can treat Parkinson's Disease please visit:
https://bit.ly/parkinson-integramedicalcenter
2020-07-03 20:23:32
106.13.93.60 attackbots
Jul  2 20:09:02 server1 sshd\[12287\]: Failed password for invalid user admin from 106.13.93.60 port 52160 ssh2
Jul  2 20:12:06 server1 sshd\[13377\]: Invalid user iot from 106.13.93.60
Jul  2 20:12:06 server1 sshd\[13377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.60 
Jul  2 20:12:08 server1 sshd\[13377\]: Failed password for invalid user iot from 106.13.93.60 port 41622 ssh2
Jul  2 20:15:08 server1 sshd\[14331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.60  user=root
...
2020-07-03 20:31:26
206.189.188.218 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-07-03 20:38:12
200.143.184.150 attackproxy
Last failed login: Wed Jul  1 14:05:29 CEST 2020 from 200.143.184.150 on ssh:notty
There were 3 failed login attempts since the last successful login.
2020-07-03 15:01:02
37.236.235.52 attack
My iPhone's IP has been blocked
2020-07-02 22:38:27
45.175.182.245 attackbots
[SPAM] Let's try to get to know each other?
2020-07-03 20:43:24
144.21.95.231 attackbotsspam
400 BAD REQUEST
2020-07-03 20:12:30
103.112.191.100 attack
prod11
...
2020-07-03 20:32:08
218.92.0.249 attackbotsspam
2020-07-03T08:26:29.006382uwu-server sshd[51807]: Failed password for root from 218.92.0.249 port 48236 ssh2
2020-07-03T08:26:32.492153uwu-server sshd[51807]: Failed password for root from 218.92.0.249 port 48236 ssh2
2020-07-03T08:26:37.971372uwu-server sshd[51807]: Failed password for root from 218.92.0.249 port 48236 ssh2
2020-07-03T08:26:42.186715uwu-server sshd[51807]: Failed password for root from 218.92.0.249 port 48236 ssh2
2020-07-03T08:26:47.299240uwu-server sshd[51807]: Failed password for root from 218.92.0.249 port 48236 ssh2
...
2020-07-03 20:31:55
159.203.36.107 attackspambots
[munged]::443 159.203.36.107 - - [03/Jul/2020:04:19:10 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.36.107 - - [03/Jul/2020:04:19:22 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.36.107 - - [03/Jul/2020:04:19:29 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.36.107 - - [03/Jul/2020:04:19:30 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.36.107 - - [03/Jul/2020:04:19:32 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.36.107 - - [03/Jul/2020:04:19:44 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11
2020-07-03 20:12:08

最近上报的IP列表

176.226.219.42 91.160.113.133 37.135.117.97 185.17.128.158
173.249.21.119 165.22.61.114 175.214.231.224 111.150.90.182
84.117.163.220 52.157.250.71 138.128.1.142 83.99.2.32
117.86.95.165 42.125.183.185 159.147.36.23 188.191.201.174
217.99.227.88 188.227.119.254 173.212.229.216 81.28.107.54