必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Montreal

省份(region): Quebec

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): M247 Ltd

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.28.218.34 attack
22/tcp 27017/tcp 5900/tcp...
[2020-05-05/07-05]41pkt,14pt.(tcp),3pt.(udp)
2020-07-06 01:59:22
139.28.218.34 attack
" "
2020-06-07 23:09:09
139.28.218.34 attack
 TCP (SYN) 139.28.218.34:57239 -> port 11211, len 44
2020-05-24 18:34:57
139.28.218.77 attack
Brute force attack against VPN service
2020-04-18 14:09:10
139.28.218.34 attack
Honeypot hit.
2020-04-17 06:58:59
139.28.218.34 attackbotsspam
Honeypot hit.
2020-02-18 23:28:51
139.28.218.34 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 18:29:58
139.28.218.34 attackbotsspam
" "
2020-02-04 17:02:15
139.28.218.34 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-11 08:28:43
139.28.218.34 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-15 05:38:57
139.28.218.28 attackbots
TCP Port Scanning
2019-11-18 21:04:33
139.28.218.34 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:56:18
139.28.218.34 attackbotsspam
VN - 1H : (90)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VN 
 NAME ASN : ASN9009 
 
 IP : 139.28.218.34 
 
 CIDR : 139.28.218.0/24 
 
 PREFIX COUNT : 1708 
 
 UNIQUE IP COUNT : 749056 
 
 
 WYKRYTE ATAKI Z ASN9009 :  
  1H - 1 
  3H - 3 
  6H - 5 
 12H - 7 
 24H - 9 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-11 23:33:40
139.28.218.130 attackspambots
Postfix DNSBL listed. Trying to send SPAM.
2019-07-08 02:56:39
139.28.218.137 attackbotsspam
Postfix DNSBL listed. Trying to send SPAM.
2019-06-27 22:09:25
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.28.218.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51085
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.28.218.13.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat May 04 20:58:38 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 13.218.28.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 13.218.28.139.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.50.223.112 attackbots
Aug  6 08:51:05 [host] sshd[10903]: pam_unix(sshd:
Aug  6 08:51:07 [host] sshd[10903]: Failed passwor
Aug  6 08:55:54 [host] sshd[11071]: pam_unix(sshd:
2020-08-06 16:36:19
116.108.38.229 attackspambots
Automatic report - Port Scan Attack
2020-08-06 16:45:10
181.55.188.218 attackbots
Failed password for root from 181.55.188.218 port 53402 ssh2
2020-08-06 16:29:45
51.68.198.113 attack
Aug  6 10:03:51 vps sshd[22254]: Failed password for root from 51.68.198.113 port 55470 ssh2
Aug  6 10:09:58 vps sshd[22788]: Failed password for root from 51.68.198.113 port 53534 ssh2
...
2020-08-06 16:19:49
221.122.108.33 attack
Aug  5 22:23:42 web1 sshd\[14419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.108.33  user=root
Aug  5 22:23:44 web1 sshd\[14419\]: Failed password for root from 221.122.108.33 port 46926 ssh2
Aug  5 22:27:32 web1 sshd\[14761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.108.33  user=root
Aug  5 22:27:34 web1 sshd\[14761\]: Failed password for root from 221.122.108.33 port 36578 ssh2
Aug  5 22:31:36 web1 sshd\[15109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.108.33  user=root
2020-08-06 16:43:05
187.58.132.251 attack
SSH invalid-user multiple login try
2020-08-06 16:28:51
220.135.223.234 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-06 16:39:35
137.74.132.171 attack
SSH Brute Force
2020-08-06 16:09:45
122.152.196.222 attackbots
SSH Brute Force
2020-08-06 16:31:18
180.76.249.74 attack
IP blocked
2020-08-06 16:09:02
124.128.158.37 attackbotsspam
Aug  6 08:27:50 cosmoit sshd[15010]: Failed password for root from 124.128.158.37 port 12067 ssh2
2020-08-06 16:46:39
78.187.15.104 attack
Automatic report - Port Scan Attack
2020-08-06 16:37:31
125.132.73.14 attackbots
SSH Brute Force
2020-08-06 16:41:03
125.65.79.72 attackspambots
Aug  6 09:00:50 vmd36147 sshd[25276]: Failed password for root from 125.65.79.72 port 43856 ssh2
Aug  6 09:06:17 vmd36147 sshd[4822]: Failed password for root from 125.65.79.72 port 46712 ssh2
...
2020-08-06 16:41:46
110.144.11.30 attack
Aug  6 08:59:28 sip sshd[1208986]: Invalid user <stddef.h> from 110.144.11.30 port 34128
Aug  6 08:59:30 sip sshd[1208986]: Failed password for invalid user <stddef.h> from 110.144.11.30 port 34128 ssh2
Aug  6 09:04:39 sip sshd[1209016]: Invalid user hcidc123654 from 110.144.11.30 port 40058
...
2020-08-06 16:13:19

最近上报的IP列表

165.161.48.53 227.124.161.45 93.90.75.180 46.185.17.123
70.0.115.114 212.37.167.170 38.176.223.214 178.150.138.102
146.242.56.45 5.196.52.173 197.48.108.207 44.177.115.17
95.9.40.199 49.32.58.228 36.82.97.130 14.186.33.214
199.188.235.83 183.172.165.35 46.66.2.34 212.64.11.188