必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.199.248.199 attackbots
Oct 13 14:50:57 abendstille sshd\[20155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199  user=root
Oct 13 14:51:00 abendstille sshd\[20155\]: Failed password for root from 139.199.248.199 port 10883 ssh2
Oct 13 14:54:34 abendstille sshd\[24210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199  user=root
Oct 13 14:54:36 abendstille sshd\[24210\]: Failed password for root from 139.199.248.199 port 10883 ssh2
Oct 13 14:58:19 abendstille sshd\[28604\]: Invalid user kjayroe from 139.199.248.199
Oct 13 14:58:19 abendstille sshd\[28604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199
...
2020-10-13 22:05:33
139.199.248.199 attack
Invalid user stef from 139.199.248.199 port 59134
2020-10-13 13:31:11
139.199.248.199 attack
Oct 13 00:06:01 OPSO sshd\[22015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199  user=root
Oct 13 00:06:04 OPSO sshd\[22015\]: Failed password for root from 139.199.248.199 port 36686 ssh2
Oct 13 00:07:55 OPSO sshd\[22416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199  user=root
Oct 13 00:07:57 OPSO sshd\[22416\]: Failed password for root from 139.199.248.199 port 36686 ssh2
Oct 13 00:09:53 OPSO sshd\[22793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199  user=root
2020-10-13 06:15:49
139.199.248.199 attack
Oct  9 21:07:24 icinga sshd[26025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199 
Oct  9 21:07:26 icinga sshd[26025]: Failed password for invalid user info from 139.199.248.199 port 41399 ssh2
Oct  9 21:18:38 icinga sshd[43665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199 
...
2020-10-10 05:35:53
139.199.248.199 attack
SSH invalid-user multiple login try
2020-10-09 21:40:33
139.199.248.199 attackbots
2020-10-09T08:13:01.269383lavrinenko.info sshd[5012]: Failed password for root from 139.199.248.199 port 11669 ssh2
2020-10-09T08:15:19.592081lavrinenko.info sshd[5161]: Invalid user admin from 139.199.248.199 port 11669
2020-10-09T08:15:19.603000lavrinenko.info sshd[5161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199
2020-10-09T08:15:19.592081lavrinenko.info sshd[5161]: Invalid user admin from 139.199.248.199 port 11669
2020-10-09T08:15:20.846107lavrinenko.info sshd[5161]: Failed password for invalid user admin from 139.199.248.199 port 11669 ssh2
...
2020-10-09 13:30:02
139.199.248.57 attackspambots
Invalid user user10 from 139.199.248.57 port 57380
2020-09-09 21:30:22
139.199.248.57 attack
2020-09-09T01:22:02.1726641495-001 sshd[61593]: Invalid user ftpuser from 139.199.248.57 port 55488
2020-09-09T01:22:02.1759241495-001 sshd[61593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.57
2020-09-09T01:22:02.1726641495-001 sshd[61593]: Invalid user ftpuser from 139.199.248.57 port 55488
2020-09-09T01:22:03.9567861495-001 sshd[61593]: Failed password for invalid user ftpuser from 139.199.248.57 port 55488 ssh2
2020-09-09T01:24:33.8676091495-001 sshd[61709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.57  user=root
2020-09-09T01:24:35.3778291495-001 sshd[61709]: Failed password for root from 139.199.248.57 port 47838 ssh2
...
2020-09-09 15:21:22
139.199.248.57 attackbots
2020-09-09T00:24:43.414395hostname sshd[70539]: Failed password for root from 139.199.248.57 port 34846 ssh2
...
2020-09-09 07:30:35
139.199.248.199 attackbotsspam
SSH Bruteforce attack
2020-09-04 20:32:56
139.199.248.199 attackspam
Sep  4 01:59:26 mavik sshd[12489]: Failed password for invalid user testtest from 139.199.248.199 port 25660 ssh2
Sep  4 02:02:50 mavik sshd[12732]: Invalid user marcia from 139.199.248.199
Sep  4 02:02:50 mavik sshd[12732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199
Sep  4 02:02:52 mavik sshd[12732]: Failed password for invalid user marcia from 139.199.248.199 port 18322 ssh2
Sep  4 02:06:12 mavik sshd[12972]: Invalid user cst from 139.199.248.199
...
2020-09-04 12:12:07
139.199.248.199 attack
Sep  3 21:04:50 plg sshd[10150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199 
Sep  3 21:04:52 plg sshd[10150]: Failed password for invalid user ali from 139.199.248.199 port 19447 ssh2
Sep  3 21:05:46 plg sshd[10168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199 
Sep  3 21:05:48 plg sshd[10168]: Failed password for invalid user ajay from 139.199.248.199 port 52262 ssh2
Sep  3 21:06:49 plg sshd[10176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199  user=root
Sep  3 21:06:51 plg sshd[10176]: Failed password for invalid user root from 139.199.248.199 port 63075 ssh2
...
2020-09-04 04:43:56
139.199.248.199 attackspam
2020-08-18T03:55:23.499891randservbullet-proofcloud-66.localdomain sshd[31656]: Invalid user bodhi from 139.199.248.199 port 42154
2020-08-18T03:55:23.503882randservbullet-proofcloud-66.localdomain sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.199
2020-08-18T03:55:23.499891randservbullet-proofcloud-66.localdomain sshd[31656]: Invalid user bodhi from 139.199.248.199 port 42154
2020-08-18T03:55:25.819504randservbullet-proofcloud-66.localdomain sshd[31656]: Failed password for invalid user bodhi from 139.199.248.199 port 42154 ssh2
...
2020-08-18 14:06:53
139.199.248.199 attackspam
Aug 11 12:10:48 *** sshd[22499]: User root from 139.199.248.199 not allowed because not listed in AllowUsers
2020-08-11 23:33:07
139.199.248.199 attack
SSH Brute Force
2020-08-05 05:53:09
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.24.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.199.24.242.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:21:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 242.24.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.24.199.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.15.76.119 attackbots
k+ssh-bruteforce
2020-04-04 22:32:14
51.91.101.100 attack
Apr  4 16:32:18 OPSO sshd\[8982\]: Invalid user mzm from 51.91.101.100 port 58792
Apr  4 16:32:18 OPSO sshd\[8982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.101.100
Apr  4 16:32:20 OPSO sshd\[8982\]: Failed password for invalid user mzm from 51.91.101.100 port 58792 ssh2
Apr  4 16:36:43 OPSO sshd\[9993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.101.100  user=root
Apr  4 16:36:45 OPSO sshd\[9993\]: Failed password for root from 51.91.101.100 port 34060 ssh2
2020-04-04 22:45:36
119.23.58.56 attack
Apr413:43:47server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[data]Apr413:55:52server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[ftp]Apr413:55:58server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[ftp]Apr413:56:04server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[ftp]Apr413:56:09server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[ftp]Apr413:56:17server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[ftp]Apr413:56:20server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[ftp]Apr413:56:27server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[administrator]Apr413:56:33server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[administrator]Apr413:56:38server6pure-ftpd:\(\?@119.23.58.56\)[WARNING]Authenticationfailedforuser[administrator]
2020-04-04 22:29:03
222.186.15.158 attack
Apr  4 10:26:39 plusreed sshd[26916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Apr  4 10:26:41 plusreed sshd[26916]: Failed password for root from 222.186.15.158 port 49016 ssh2
...
2020-04-04 22:27:23
51.75.16.138 attackspambots
Apr  4 20:37:09 itv-usvr-01 sshd[3102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.16.138  user=root
Apr  4 20:37:12 itv-usvr-01 sshd[3102]: Failed password for root from 51.75.16.138 port 52673 ssh2
Apr  4 20:41:09 itv-usvr-01 sshd[3376]: Invalid user sa from 51.75.16.138
2020-04-04 22:41:04
222.186.30.248 attackspambots
Apr  4 10:13:53 plusreed sshd[23867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.248  user=root
Apr  4 10:13:54 plusreed sshd[23867]: Failed password for root from 222.186.30.248 port 39285 ssh2
...
2020-04-04 22:18:07
222.186.42.137 attackspambots
Apr  4 16:26:47 markkoudstaal sshd[1865]: Failed password for root from 222.186.42.137 port 42833 ssh2
Apr  4 16:26:49 markkoudstaal sshd[1865]: Failed password for root from 222.186.42.137 port 42833 ssh2
Apr  4 16:26:51 markkoudstaal sshd[1865]: Failed password for root from 222.186.42.137 port 42833 ssh2
2020-04-04 22:38:59
222.186.175.182 attackbots
Apr  4 16:13:54 minden010 sshd[32485]: Failed password for root from 222.186.175.182 port 12876 ssh2
Apr  4 16:13:58 minden010 sshd[32485]: Failed password for root from 222.186.175.182 port 12876 ssh2
Apr  4 16:14:01 minden010 sshd[32485]: Failed password for root from 222.186.175.182 port 12876 ssh2
Apr  4 16:14:05 minden010 sshd[32485]: Failed password for root from 222.186.175.182 port 12876 ssh2
...
2020-04-04 22:20:04
14.232.71.69 attackbotsspam
Automatic report - Port Scan Attack
2020-04-04 23:00:56
180.104.175.191 attackbotsspam
Email rejected due to spam filtering
2020-04-04 23:19:52
125.117.248.53 attackbotsspam
2020-04-04 15:24:56 H=(tophancy.net) [125.117.248.53]:49268 I=[10.100.18.25]:25 sender verify fail for : Unrouteable address
2020-04-04 x@x
2020-04-04 15:24:56 unexpected disconnection while reading SMTP command from (tophancy.net) [125.117.248.53]:49268 I=[10.100.18.25]:25

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.117.248.53
2020-04-04 22:40:35
113.88.4.74 attack
Brute force attempt
2020-04-04 23:20:27
104.248.235.24 attackbots
port scan and connect, tcp 3128 (squid-http)
2020-04-04 23:03:42
185.164.138.21 attack
Automatic report - SSH Brute-Force Attack
2020-04-04 22:20:39
68.183.146.178 attackbotsspam
2020-04-04T15:37:35.134344rocketchat.forhosting.nl sshd[27939]: Failed password for root from 68.183.146.178 port 47948 ssh2
2020-04-04T15:41:21.831135rocketchat.forhosting.nl sshd[28039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.146.178  user=root
2020-04-04T15:41:23.791520rocketchat.forhosting.nl sshd[28039]: Failed password for root from 68.183.146.178 port 56940 ssh2
...
2020-04-04 22:23:43

最近上报的IP列表

139.199.227.74 118.249.178.35 139.199.240.85 139.199.250.226
139.199.4.212 139.199.29.216 139.199.34.217 139.199.33.248
139.199.5.214 139.199.6.137 139.199.59.145 139.199.72.111
118.249.179.73 139.199.62.240 139.199.79.251 139.199.80.135
139.199.85.151 139.199.77.59 139.200.106.31 139.199.94.65