必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspam
Jul 31 01:46:57 s64-1 sshd[30861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.102
Jul 31 01:46:59 s64-1 sshd[30861]: Failed password for invalid user usuario1 from 139.199.45.102 port 37772 ssh2
Jul 31 01:49:27 s64-1 sshd[30922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.102
...
2019-07-31 14:52:33
attackbotsspam
Jul  7 02:37:09 Ubuntu-1404-trusty-64-minimal sshd\[7191\]: Invalid user jenkins from 139.199.45.102
Jul  7 02:37:09 Ubuntu-1404-trusty-64-minimal sshd\[7191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.102
Jul  7 02:37:11 Ubuntu-1404-trusty-64-minimal sshd\[7191\]: Failed password for invalid user jenkins from 139.199.45.102 port 42676 ssh2
Jul  7 02:42:18 Ubuntu-1404-trusty-64-minimal sshd\[12274\]: Invalid user minecraft from 139.199.45.102
Jul  7 02:42:18 Ubuntu-1404-trusty-64-minimal sshd\[12274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.102
2019-07-07 08:57:21
attackspambots
Jun 28 10:24:41 [host] sshd[12104]: Invalid user shuan from 139.199.45.102
Jun 28 10:24:41 [host] sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.102
Jun 28 10:24:43 [host] sshd[12104]: Failed password for invalid user shuan from 139.199.45.102 port 39606 ssh2
2019-06-28 17:34:37
相同子网IP讨论:
IP 类型 评论内容 时间
139.199.45.83 attack
Oct 12 17:30:43 minden010 sshd[13193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
Oct 12 17:30:45 minden010 sshd[13193]: Failed password for invalid user celina from 139.199.45.83 port 45008 ssh2
Oct 12 17:35:20 minden010 sshd[14132]: Failed password for root from 139.199.45.83 port 39056 ssh2
...
2020-10-13 04:07:27
139.199.45.83 attack
$f2bV_matches
2020-10-12 19:44:20
139.199.45.83 attack
(sshd) Failed SSH login from 139.199.45.83 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 09:32:37 server4 sshd[28535]: Invalid user office from 139.199.45.83
Sep 24 09:32:37 server4 sshd[28535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 
Sep 24 09:32:39 server4 sshd[28535]: Failed password for invalid user office from 139.199.45.83 port 56518 ssh2
Sep 24 09:41:23 server4 sshd[1121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Sep 24 09:41:25 server4 sshd[1121]: Failed password for root from 139.199.45.83 port 50346 ssh2
2020-09-24 23:46:16
139.199.45.83 attackspam
Invalid user test from 139.199.45.83 port 43226
2020-09-24 15:32:43
139.199.45.83 attackspambots
(sshd) Failed SSH login from 139.199.45.83 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 15:37:10 server5 sshd[20109]: Invalid user apps from 139.199.45.83
Sep 23 15:37:10 server5 sshd[20109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 
Sep 23 15:37:12 server5 sshd[20109]: Failed password for invalid user apps from 139.199.45.83 port 51344 ssh2
Sep 23 15:49:28 server5 sshd[25497]: Invalid user ts3user from 139.199.45.83
Sep 23 15:49:28 server5 sshd[25497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
2020-09-24 06:58:39
139.199.45.83 attack
Aug 30 17:22:52 h2646465 sshd[22610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Aug 30 17:22:54 h2646465 sshd[22610]: Failed password for root from 139.199.45.83 port 40330 ssh2
Aug 30 17:49:21 h2646465 sshd[25856]: Invalid user hosts from 139.199.45.83
Aug 30 17:49:21 h2646465 sshd[25856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
Aug 30 17:49:21 h2646465 sshd[25856]: Invalid user hosts from 139.199.45.83
Aug 30 17:49:23 h2646465 sshd[25856]: Failed password for invalid user hosts from 139.199.45.83 port 45484 ssh2
Aug 30 17:53:23 h2646465 sshd[26459]: Invalid user user1 from 139.199.45.83
Aug 30 17:53:23 h2646465 sshd[26459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
Aug 30 17:53:23 h2646465 sshd[26459]: Invalid user user1 from 139.199.45.83
Aug 30 17:53:25 h2646465 sshd[26459]: Failed password for invalid user user1 fr
2020-08-31 00:25:06
139.199.45.83 attackbotsspam
Invalid user big from 139.199.45.83 port 52174
2020-08-19 13:01:32
139.199.45.83 attack
Aug 12 08:06:13 cosmoit sshd[9920]: Failed password for root from 139.199.45.83 port 55750 ssh2
2020-08-12 14:12:20
139.199.45.83 attack
Aug  5 23:14:00 dignus sshd[29884]: Failed password for root from 139.199.45.83 port 40906 ssh2
Aug  5 23:15:51 dignus sshd[30126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Aug  5 23:15:52 dignus sshd[30126]: Failed password for root from 139.199.45.83 port 59928 ssh2
Aug  5 23:17:32 dignus sshd[30351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Aug  5 23:17:34 dignus sshd[30351]: Failed password for root from 139.199.45.83 port 50740 ssh2
...
2020-08-06 14:20:32
139.199.45.83 attack
Aug  2 19:00:49 ns382633 sshd\[24403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Aug  2 19:00:51 ns382633 sshd\[24403\]: Failed password for root from 139.199.45.83 port 35718 ssh2
Aug  2 19:14:46 ns382633 sshd\[27434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Aug  2 19:14:48 ns382633 sshd\[27434\]: Failed password for root from 139.199.45.83 port 39696 ssh2
Aug  2 19:19:35 ns382633 sshd\[28325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
2020-08-03 03:08:15
139.199.45.83 attackbots
Jul 29 07:57:56 * sshd[27400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
Jul 29 07:57:58 * sshd[27400]: Failed password for invalid user shifeng from 139.199.45.83 port 37558 ssh2
2020-07-29 17:43:26
139.199.45.83 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-28 16:58:54
139.199.45.83 attack
Invalid user qxl from 139.199.45.83 port 34370
2020-07-25 13:01:03
139.199.45.83 attackbots
Jul 17 14:33:44 ns382633 sshd\[5772\]: Invalid user tm from 139.199.45.83 port 54098
Jul 17 14:33:44 ns382633 sshd\[5772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
Jul 17 14:33:46 ns382633 sshd\[5772\]: Failed password for invalid user tm from 139.199.45.83 port 54098 ssh2
Jul 17 14:47:27 ns382633 sshd\[8401\]: Invalid user alibaba from 139.199.45.83 port 59346
Jul 17 14:47:27 ns382633 sshd\[8401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
2020-07-18 00:10:19
139.199.45.83 attackbotsspam
$f2bV_matches
2020-07-17 01:00:13
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.45.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6161
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.199.45.102.			IN	A

;; AUTHORITY SECTION:
.			1843	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032900 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Mar 29 15:56:02 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 102.45.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 102.45.199.139.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.173.180 attackbots
Jan  2 00:30:49 webhost01 sshd[2250]: Failed password for root from 222.186.173.180 port 2552 ssh2
Jan  2 00:31:02 webhost01 sshd[2250]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 2552 ssh2 [preauth]
...
2020-01-02 01:32:46
77.232.128.87 attackbotsspam
Jan  1 20:20:15 areeb-Workstation sshd[10761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.128.87 
Jan  1 20:20:18 areeb-Workstation sshd[10761]: Failed password for invalid user nandita from 77.232.128.87 port 42793 ssh2
...
2020-01-02 01:31:49
162.243.98.66 attackspam
Jan  1 17:36:18 server sshd[25471]: Failed password for invalid user lavon from 162.243.98.66 port 35899 ssh2
Jan  1 17:42:33 server sshd[25920]: User www-data from 162.243.98.66 not allowed because not listed in AllowUsers
Jan  1 17:42:35 server sshd[25920]: Failed password for invalid user www-data from 162.243.98.66 port 60567 ssh2
2020-01-02 01:52:41
182.92.65.4 attackspam
firewall-block, port(s): 8545/tcp
2020-01-02 01:28:46
42.236.10.110 attackbotsspam
Automatic report - Banned IP Access
2020-01-02 01:22:45
45.136.108.124 attack
Fail2Ban Ban Triggered
2020-01-02 01:38:44
132.145.173.64 attack
Jan  1 18:11:54 mout sshd[13317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.173.64  user=root
Jan  1 18:11:55 mout sshd[13317]: Failed password for root from 132.145.173.64 port 34150 ssh2
2020-01-02 01:53:03
222.186.52.178 attackbotsspam
Jan  1 09:05:59 XXX sshd[30890]: User r.r from 222.186.52.178 not allowed because none of user's groups are listed in AllowGroups
Jan  1 09:05:59 XXX sshd[30890]: Received disconnect from 222.186.52.178: 11:  [preauth]
Jan  1 09:06:00 XXX sshd[30888]: User r.r from 222.186.52.178 not allowed because none of user's groups are listed in AllowGroups
Jan  1 09:06:00 XXX sshd[30888]: Received disconnect from 222.186.52.178: 11:  [preauth]
Jan  1 09:06:00 XXX sshd[30892]: User r.r from 222.186.52.178 not allowed because none of user's groups are listed in AllowGroups
Jan  1 09:06:00 XXX sshd[30892]: Received disconnect from 222.186.52.178: 11:  [preauth]
Jan  1 09:06:02 XXX sshd[30894]: User r.r from 222.186.52.178 not allowed because none of user's groups are listed in AllowGroups
Jan  1 09:06:03 XXX sshd[30900]: User r.r from 222.186.52.178 not allowed because none of user's groups are listed in AllowGroups
Jan  1 09:06:04 XXX sshd[30900]: Received disconnect from 222.186.5........
-------------------------------
2020-01-02 01:25:41
151.80.254.74 attack
2020-01-01T14:40:33.468363abusebot-2.cloudsearch.cf sshd[25810]: Invalid user tomoko from 151.80.254.74 port 39118
2020-01-01T14:40:33.476765abusebot-2.cloudsearch.cf sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.74
2020-01-01T14:40:33.468363abusebot-2.cloudsearch.cf sshd[25810]: Invalid user tomoko from 151.80.254.74 port 39118
2020-01-01T14:40:35.839419abusebot-2.cloudsearch.cf sshd[25810]: Failed password for invalid user tomoko from 151.80.254.74 port 39118 ssh2
2020-01-01T14:49:42.505505abusebot-2.cloudsearch.cf sshd[26356]: Invalid user guest from 151.80.254.74 port 41962
2020-01-01T14:49:42.511312abusebot-2.cloudsearch.cf sshd[26356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.74
2020-01-01T14:49:42.505505abusebot-2.cloudsearch.cf sshd[26356]: Invalid user guest from 151.80.254.74 port 41962
2020-01-01T14:49:44.573079abusebot-2.cloudsearch.cf sshd[26356]: Fai
...
2020-01-02 01:53:19
218.92.0.201 attack
Jan  1 18:14:01 silence02 sshd[23324]: Failed password for root from 218.92.0.201 port 58153 ssh2
Jan  1 18:14:03 silence02 sshd[23324]: Failed password for root from 218.92.0.201 port 58153 ssh2
Jan  1 18:14:06 silence02 sshd[23324]: Failed password for root from 218.92.0.201 port 58153 ssh2
2020-01-02 01:39:04
65.39.215.151 attack
Logged: 1/01/2020 2:14:49 PM UTC
AS13768 Cogeco Peer 1
Port: 25 Protocol: tcp
Service Name: smtp
Description: Simple Mail Transfer
2020-01-02 01:13:52
51.254.102.212 attack
SSH Brute-Force reported by Fail2Ban
2020-01-02 01:48:43
82.64.57.172 attack
3x Failed Password
2020-01-02 01:19:37
222.186.30.218 attack
2020-01-01 08:37:18,761 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 222.186.30.218
2020-01-01 09:38:22,393 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 222.186.30.218
2020-01-01 15:44:32,283 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 222.186.30.218
2020-01-01 16:32:59,989 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 222.186.30.218
2020-01-01 18:22:28,023 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 222.186.30.218
...
2020-01-02 01:31:03
80.244.179.6 attackspam
Jan  1 10:38:49 plusreed sshd[18688]: Invalid user test777 from 80.244.179.6
...
2020-01-02 01:16:42

最近上报的IP列表

207.154.215.236 206.189.145.152 201.17.130.197 181.129.14.218
165.227.150.158 142.93.74.45 140.143.25.35 132.248.52.241
129.204.108.143 128.134.30.40 122.166.14.59 119.254.100.209
114.255.211.1 111.230.110.87 104.236.78.228 104.131.93.33
103.10.30.224 71.6.142.80 223.197.153.106 213.190.194.227