必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): PT. First Media TBK

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Sun, 21 Jul 2019 07:36:07 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 22:47:45
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.99.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34942
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.193.99.133.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 22:47:23 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
133.99.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-99-133.fast.net.id.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
133.99.193.139.in-addr.arpa	name = fm-dyn-139-193-99-133.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.93.240.79 attack
2019-11-11T04:59:15.994282abusebot-8.cloudsearch.cf sshd\[23527\]: Invalid user magbee from 142.93.240.79 port 35310
2019-11-11 13:09:53
179.154.231.103 attackspambots
Nov 11 05:54:49 eventyay sshd[28101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.154.231.103
Nov 11 05:54:52 eventyay sshd[28101]: Failed password for invalid user ident from 179.154.231.103 port 34486 ssh2
Nov 11 05:59:13 eventyay sshd[28191]: Failed password for root from 179.154.231.103 port 57084 ssh2
...
2019-11-11 13:11:29
91.139.1.158 attack
Spamassassin_91.139.1.158
2019-11-11 09:05:54
129.250.206.86 attackspam
11.11.2019 00:00:05 Recursive DNS scan
2019-11-11 09:15:14
191.252.185.246 attackbotsspam
$f2bV_matches
2019-11-11 09:12:32
170.81.35.26 attackspambots
Spamassassin_170.81.35.26
2019-11-11 09:00:47
14.140.105.242 attack
Unauthorized connection attempt from IP address 14.140.105.242 on Port 445(SMB)
2019-11-11 09:07:04
200.92.226.26 attack
slow and persistent scanner
2019-11-11 08:55:41
140.143.241.251 attackspam
Nov 11 07:59:16 hosting sshd[14633]: Invalid user rakeim from 140.143.241.251 port 49636
...
2019-11-11 13:08:54
185.156.73.52 attack
11/10/2019-19:51:39.439191 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-11 08:52:52
212.200.101.22 attackspambots
postfix
2019-11-11 09:07:28
218.95.124.89 attack
Unauthorized connection attempt from IP address 218.95.124.89 on Port 445(SMB)
2019-11-11 08:50:53
183.103.35.202 attackbots
Nov 11 00:44:19 XXX sshd[34503]: Invalid user ky from 183.103.35.202 port 57626
2019-11-11 09:13:04
114.5.12.186 attackbotsspam
Nov 11 10:20:32 vibhu-HP-Z238-Microtower-Workstation sshd\[12913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.12.186  user=root
Nov 11 10:20:34 vibhu-HP-Z238-Microtower-Workstation sshd\[12913\]: Failed password for root from 114.5.12.186 port 60129 ssh2
Nov 11 10:24:56 vibhu-HP-Z238-Microtower-Workstation sshd\[13180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.12.186  user=root
Nov 11 10:24:58 vibhu-HP-Z238-Microtower-Workstation sshd\[13180\]: Failed password for root from 114.5.12.186 port 50129 ssh2
Nov 11 10:29:18 vibhu-HP-Z238-Microtower-Workstation sshd\[13422\]: Invalid user lisa from 114.5.12.186
Nov 11 10:29:18 vibhu-HP-Z238-Microtower-Workstation sshd\[13422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.12.186
...
2019-11-11 13:07:21
157.157.145.123 attackbotsspam
Nov 11 00:43:50 XXX sshd[34499]: Invalid user ofsaa from 157.157.145.123 port 39330
2019-11-11 09:14:03

最近上报的IP列表

42.119.145.40 200.56.86.147 180.245.194.54 97.156.79.124
2a01:598:990d:db49:2c84:cfa8:4ad8:ec2f 125.24.106.138 202.49.69.90 101.51.50.115
138.58.240.52 203.26.137.159 39.41.102.9 89.84.139.230
14.249.123.237 143.141.172.107 2600:1702:360:49a0:98c1:3e10:118b:18e9 76.227.220.210
156.227.113.238 5.62.60.31 9.146.51.180 215.192.238.226