必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.212.71.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.212.71.125.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:22:41 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
125.71.212.139.in-addr.arpa domain name pointer 125.71.212.139.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.71.212.139.in-addr.arpa	name = 125.71.212.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.153.54 attack
Sep 16 17:42:25 xtremcommunity sshd\[157558\]: Invalid user Valpuri from 159.89.153.54 port 54982
Sep 16 17:42:25 xtremcommunity sshd\[157558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54
Sep 16 17:42:27 xtremcommunity sshd\[157558\]: Failed password for invalid user Valpuri from 159.89.153.54 port 54982 ssh2
Sep 16 17:46:50 xtremcommunity sshd\[157661\]: Invalid user ax400 from 159.89.153.54 port 42182
Sep 16 17:46:50 xtremcommunity sshd\[157661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54
...
2019-09-17 07:22:14
113.161.72.117 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:29:01,266 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.161.72.117)
2019-09-17 06:48:33
178.128.100.95 attack
Sep 16 20:19:15 this_host sshd[21127]: Invalid user ajai from 178.128.100.95
Sep 16 20:19:15 this_host sshd[21127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.95 
Sep 16 20:19:17 this_host sshd[21127]: Failed password for invalid user ajai from 178.128.100.95 port 40040 ssh2
Sep 16 20:19:17 this_host sshd[21127]: Received disconnect from 178.128.100.95: 11: Bye Bye [preauth]
Sep 16 20:35:41 this_host sshd[21292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.95  user=r.r
Sep 16 20:35:44 this_host sshd[21292]: Failed password for r.r from 178.128.100.95 port 36074 ssh2
Sep 16 20:35:44 this_host sshd[21292]: Received disconnect from 178.128.100.95: 11: Bye Bye [preauth]
Sep 16 20:39:58 this_host sshd[21328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.95  user=list
Sep 16 20:40:00 this_host sshd[21328]: Fail........
-------------------------------
2019-09-17 06:58:47
190.74.98.131 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:57:24,772 INFO [shellcode_manager] (190.74.98.131) no match, writing hexdump (62fac287814c195fd321eaba9c13180c :6283) - SMB (Unknown)
2019-09-17 06:55:15
115.75.2.189 attackspam
Sep 16 18:44:23 ny01 sshd[22274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.75.2.189
Sep 16 18:44:25 ny01 sshd[22274]: Failed password for invalid user abrahan from 115.75.2.189 port 56420 ssh2
Sep 16 18:48:53 ny01 sshd[23146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.75.2.189
2019-09-17 06:50:23
49.88.112.80 attack
Sep 17 01:23:17 cvbnet sshd[3227]: Failed password for root from 49.88.112.80 port 36362 ssh2
Sep 17 01:23:20 cvbnet sshd[3227]: Failed password for root from 49.88.112.80 port 36362 ssh2
2019-09-17 07:25:12
104.236.2.45 attackbotsspam
Sep 17 00:12:45 bouncer sshd\[22170\]: Invalid user testcf from 104.236.2.45 port 45056
Sep 17 00:12:45 bouncer sshd\[22170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.2.45 
Sep 17 00:12:48 bouncer sshd\[22170\]: Failed password for invalid user testcf from 104.236.2.45 port 45056 ssh2
...
2019-09-17 07:04:42
138.197.188.101 attack
Sep 16 23:49:47 mail sshd\[15961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.188.101
Sep 16 23:49:48 mail sshd\[15961\]: Failed password for invalid user nm-openconnect from 138.197.188.101 port 45027 ssh2
Sep 16 23:53:53 mail sshd\[16516\]: Invalid user spier from 138.197.188.101 port 40050
Sep 16 23:53:53 mail sshd\[16516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.188.101
Sep 16 23:53:55 mail sshd\[16516\]: Failed password for invalid user spier from 138.197.188.101 port 40050 ssh2
2019-09-17 07:30:52
81.45.139.249 attackbotsspam
SSH bruteforce
2019-09-17 07:06:07
105.225.62.204 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:17:15,791 INFO [amun_request_handler] PortScan Detected on Port: 445 (105.225.62.204)
2019-09-17 07:20:57
139.59.238.39 attack
xmlrpc attack
2019-09-17 06:59:09
77.247.181.165 attackspambots
0,50-01/03 [bc01/m19] concatform PostRequest-Spammer scoring: Durban01
2019-09-17 07:13:54
197.210.52.84 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:17:34,529 INFO [amun_request_handler] PortScan Detected on Port: 445 (197.210.52.84)
2019-09-17 07:18:59
177.74.126.188 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:22:18,767 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.74.126.188)
2019-09-17 07:09:20
121.69.130.2 attackspambots
Sep 16 10:05:03 lcdev sshd\[13067\]: Invalid user q from 121.69.130.2
Sep 16 10:05:03 lcdev sshd\[13067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.130.2
Sep 16 10:05:06 lcdev sshd\[13067\]: Failed password for invalid user q from 121.69.130.2 port 2170 ssh2
Sep 16 10:07:07 lcdev sshd\[13213\]: Invalid user jy from 121.69.130.2
Sep 16 10:07:07 lcdev sshd\[13213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.130.2
2019-09-17 07:28:02

最近上报的IP列表

139.213.120.22 139.212.98.215 139.213.124.107 139.213.124.160
139.213.108.218 139.213.124.215 139.213.124.236 118.25.183.14
139.213.124.166 139.213.125.118 139.213.125.245 139.213.125.243
139.213.125.29 139.213.125.92 139.213.124.230 139.213.126.184
139.213.127.139 139.213.126.88 139.213.127.234 139.213.127.236