必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Shenzhen Tencent Computer Systems Company Limited

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.199.5.50 attackspambots
Oct 12 12:46:29 lanister sshd[30633]: Invalid user kazuhisa from 139.199.5.50
Oct 12 12:46:29 lanister sshd[30633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50
Oct 12 12:46:29 lanister sshd[30633]: Invalid user kazuhisa from 139.199.5.50
Oct 12 12:46:31 lanister sshd[30633]: Failed password for invalid user kazuhisa from 139.199.5.50 port 60894 ssh2
2020-10-13 00:50:20
139.199.5.50 attackspam
Oct 11 20:17:17 mockhub sshd[1232386]: Invalid user julie from 139.199.5.50 port 47312
Oct 11 20:17:19 mockhub sshd[1232386]: Failed password for invalid user julie from 139.199.5.50 port 47312 ssh2
Oct 11 20:20:33 mockhub sshd[1232501]: Invalid user ih from 139.199.5.50 port 40938
...
2020-10-12 16:14:24
139.199.5.50 attackspambots
139.199.5.50 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  6 16:17:19 server2 sshd[5279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42  user=root
Oct  6 16:17:21 server2 sshd[5279]: Failed password for root from 117.35.118.42 port 54764 ssh2
Oct  6 16:19:31 server2 sshd[5675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.98.124.86  user=root
Oct  6 16:19:32 server2 sshd[5671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50  user=root
Oct  6 16:19:14 server2 sshd[5636]: Failed password for root from 60.220.185.64 port 36822 ssh2
Oct  6 16:19:11 server2 sshd[5636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.185.64  user=root

IP Addresses Blocked:

117.35.118.42 (CN/China/-)
66.98.124.86 (US/United States/-)
2020-10-07 05:01:01
139.199.5.50 attackspambots
Oct  6 08:02:29 firewall sshd[6834]: Failed password for root from 139.199.5.50 port 51790 ssh2
Oct  6 08:06:14 firewall sshd[6912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50  user=root
Oct  6 08:06:16 firewall sshd[6912]: Failed password for root from 139.199.5.50 port 45618 ssh2
...
2020-10-06 21:08:11
139.199.5.50 attackspambots
Oct 6 02:46:56 *hidden* sshd[29517]: Failed password for *hidden* from 139.199.5.50 port 54982 ssh2 Oct 6 02:50:42 *hidden* sshd[30971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 user=root Oct 6 02:50:45 *hidden* sshd[30971]: Failed password for *hidden* from 139.199.5.50 port 56904 ssh2 Oct 6 02:54:23 *hidden* sshd[32323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 user=root Oct 6 02:54:24 *hidden* sshd[32323]: Failed password for *hidden* from 139.199.5.50 port 58804 ssh2
2020-10-06 12:48:58
139.199.5.50 attackbotsspam
Invalid user support3 from 139.199.5.50 port 54350
2020-10-02 08:01:32
139.199.5.50 attackspambots
Invalid user support3 from 139.199.5.50 port 54350
2020-10-02 00:37:47
139.199.5.50 attackbotsspam
fail2ban -- 139.199.5.50
...
2020-10-01 16:42:39
139.199.5.50 attack
frenzy
2020-09-13 01:58:14
139.199.5.50 attackspambots
frenzy
2020-09-12 17:58:10
139.199.5.50 attack
Aug 30 13:51:48 gamehost-one sshd[5925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 
Aug 30 13:51:50 gamehost-one sshd[5925]: Failed password for invalid user tester from 139.199.5.50 port 58266 ssh2
Aug 30 14:16:11 gamehost-one sshd[8694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 
...
2020-08-30 20:46:51
139.199.5.50 attack
Aug 28 16:18:51 ws22vmsma01 sshd[27380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50
Aug 28 16:18:54 ws22vmsma01 sshd[27380]: Failed password for invalid user postgres from 139.199.5.50 port 43594 ssh2
...
2020-08-29 03:49:52
139.199.5.50 attackbotsspam
Aug 25 15:20:05 george sshd[5010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 
Aug 25 15:20:07 george sshd[5010]: Failed password for invalid user test10 from 139.199.5.50 port 58590 ssh2
Aug 25 15:23:53 george sshd[5063]: Invalid user prueba1 from 139.199.5.50 port 56318
Aug 25 15:23:53 george sshd[5063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 
Aug 25 15:23:55 george sshd[5063]: Failed password for invalid user prueba1 from 139.199.5.50 port 56318 ssh2
...
2020-08-26 03:43:54
139.199.5.50 attackspambots
Aug 13 07:00:34 piServer sshd[1876]: Failed password for root from 139.199.5.50 port 48472 ssh2
Aug 13 07:03:43 piServer sshd[2297]: Failed password for root from 139.199.5.50 port 59670 ssh2
...
2020-08-13 13:24:02
139.199.5.50 attackbotsspam
Aug 11 20:11:17 lunarastro sshd[23349]: Failed password for root from 139.199.5.50 port 33716 ssh2
Aug 11 20:25:31 lunarastro sshd[23576]: Failed password for root from 139.199.5.50 port 50524 ssh2
2020-08-12 03:57:07
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.5.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45273
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.199.5.115.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 16:23:08 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 115.5.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 115.5.199.139.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.31.19.206 attackbotsspam
Jul 30 08:24:23 prox sshd[11467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.31.19.206 
Jul 30 08:24:25 prox sshd[11467]: Failed password for invalid user wangmengyao from 200.31.19.206 port 38037 ssh2
2020-07-30 15:08:19
49.88.112.69 attackspam
SSH Brute Force
2020-07-30 15:27:50
186.38.26.5 attackspambots
Invalid user user03 from 186.38.26.5 port 54730
2020-07-30 15:36:09
84.33.103.247 attack
Automatic report - Port Scan Attack
2020-07-30 15:21:35
157.245.139.32 attackbots
157.245.139.32 - - [30/Jul/2020:05:39:31 +0100] "POST /wp-login.php HTTP/1.1" 200 2261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.139.32 - - [30/Jul/2020:05:39:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2234 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.139.32 - - [30/Jul/2020:05:39:34 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-30 15:25:03
222.186.169.192 attackbotsspam
Jul 30 08:56:05 pve1 sshd[10789]: Failed password for root from 222.186.169.192 port 8016 ssh2
Jul 30 08:56:10 pve1 sshd[10789]: Failed password for root from 222.186.169.192 port 8016 ssh2
...
2020-07-30 14:57:29
60.219.171.134 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 58 - port: 1127 proto: tcp cat: Misc Attackbytes: 60
2020-07-30 15:37:30
165.227.225.195 attackspambots
Jul 30 12:22:04 dhoomketu sshd[2023718]: Invalid user tdgtmp from 165.227.225.195 port 37924
Jul 30 12:22:04 dhoomketu sshd[2023718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195 
Jul 30 12:22:04 dhoomketu sshd[2023718]: Invalid user tdgtmp from 165.227.225.195 port 37924
Jul 30 12:22:07 dhoomketu sshd[2023718]: Failed password for invalid user tdgtmp from 165.227.225.195 port 37924 ssh2
Jul 30 12:26:29 dhoomketu sshd[2023760]: Invalid user koike from 165.227.225.195 port 48942
...
2020-07-30 15:15:01
162.220.165.158 attackspam
Trolling for resource vulnerabilities
2020-07-30 15:19:14
103.53.169.40 attack
Trolling for resource vulnerabilities
2020-07-30 15:38:51
45.88.12.72 attack
2020-07-30 00:56:52.798923-0500  localhost sshd[14391]: Failed password for invalid user nagatalab from 45.88.12.72 port 58568 ssh2
2020-07-30 15:11:26
43.243.214.42 attack
Triggered by Fail2Ban at Ares web server
2020-07-30 15:02:48
54.38.71.22 attackbotsspam
SSH Brute Force
2020-07-30 15:38:03
200.54.51.124 attackspam
Invalid user cuijiaxu from 200.54.51.124 port 59484
2020-07-30 15:00:13
49.234.52.176 attackbots
Invalid user mengzhen from 49.234.52.176 port 37458
2020-07-30 15:03:36

最近上报的IP列表

139.199.38.139 204.226.241.113 139.199.27.222 63.31.225.3
72.246.249.222 51.159.5.225 102.117.38.114 201.180.230.239
195.68.191.80 53.69.33.158 139.199.248.123 220.141.164.226
61.194.248.170 169.144.82.12 112.16.252.183 203.60.144.165
94.89.92.15 189.112.182.244 128.8.108.225 188.219.9.104