必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): PT. First Media TBK

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Honeypot attack, port: 445, PTR: ln-static-139-255-94-139.link.net.id.
2020-04-30 15:34:08
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.94.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.255.94.139.			IN	A

;; AUTHORITY SECTION:
.			591	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020043000 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 15:34:04 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
139.94.255.139.in-addr.arpa domain name pointer ln-static-139-255-94-139.link.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.94.255.139.in-addr.arpa	name = ln-static-139-255-94-139.link.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.27.228.158 attack
Threat Management Alert 2: Attempted Information Leak. Signature ET SCAN MS Terminal Server Traffic on Non-standard Port. From: 193.27.228.158:1438, to: xxx.xxx.x.xx:xx, protocol: TCP
2020-06-29 23:30:50
159.89.180.30 attackspambots
21 attempts against mh-ssh on echoip
2020-06-29 23:13:04
111.231.119.141 attack
Jun 29 14:21:31 eventyay sshd[567]: Failed password for root from 111.231.119.141 port 34670 ssh2
Jun 29 14:23:26 eventyay sshd[595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.119.141
Jun 29 14:23:28 eventyay sshd[595]: Failed password for invalid user hadoop from 111.231.119.141 port 56370 ssh2
...
2020-06-29 22:58:27
68.183.203.187 attackbots
 TCP (SYN) 68.183.203.187:51976 -> port 8867, len 44
2020-06-29 23:14:50
194.26.29.215 attackbotsspam
MH/MP Probe, Scan, Hack -
2020-06-29 23:11:23
118.25.142.138 attackbots
Jun 29 13:52:48 gestao sshd[21221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.142.138 
Jun 29 13:52:50 gestao sshd[21221]: Failed password for invalid user ks from 118.25.142.138 port 52422 ssh2
Jun 29 13:56:13 gestao sshd[21340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.142.138 
...
2020-06-29 23:08:52
179.97.57.43 attackspambots
From send-julio-1618-alkosa.com.br-8@opered.com.br Mon Jun 29 08:10:54 2020
Received: from mm57-43.opered.com.br ([179.97.57.43]:60656)
2020-06-29 22:57:48
157.230.153.75 attack
...
2020-06-29 23:41:21
14.98.213.14 attackspambots
Jun 29 17:22:31 plex sshd[22168]: Invalid user weblogic from 14.98.213.14 port 50754
2020-06-29 23:25:37
212.70.149.2 attackspam
Jun 29 15:18:50 marvibiene postfix/smtpd[25114]: warning: unknown[212.70.149.2]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Jun 29 15:20:50 marvibiene postfix/smtpd[25271]: warning: unknown[212.70.149.2]: SASL LOGIN authentication failed: VXNlcm5hbWU6
...
2020-06-29 23:22:13
222.186.30.76 attackspam
Jun 29 16:55:51 vps639187 sshd\[11666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jun 29 16:55:53 vps639187 sshd\[11666\]: Failed password for root from 222.186.30.76 port 39902 ssh2
Jun 29 16:55:55 vps639187 sshd\[11666\]: Failed password for root from 222.186.30.76 port 39902 ssh2
...
2020-06-29 22:56:38
106.13.26.67 attack
Invalid user vicente from 106.13.26.67 port 44694
2020-06-29 23:28:03
78.106.46.8 attackspam
Unauthorized connection attempt: SRC=78.106.46.8
...
2020-06-29 23:09:17
64.227.67.106 attackbotsspam
Brute-force attempt banned
2020-06-29 23:35:10
1.53.156.5 attack
Port probing on unauthorized port 445
2020-06-29 23:34:23

最近上报的IP列表

69.188.62.118 179.125.18.2 87.251.75.254 192.141.247.12
177.220.172.252 68.78.120.131 159.65.39.68 195.181.166.141
222.5.34.145 51.38.69.227 46.193.65.234 45.184.96.32
191.253.0.146 36.90.59.15 62.171.150.133 81.128.171.59
200.37.171.85 72.13.134.3 89.252.165.62 160.204.130.124