必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.5.145.116 attack
May  5 03:52:04 home sshd[17236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.5.145.116
May  5 03:52:05 home sshd[17236]: Failed password for invalid user aureliano from 139.5.145.116 port 11576 ssh2
May  5 03:56:38 home sshd[17968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.5.145.116
...
2020-05-05 14:27:42
139.5.145.116 attack
(sshd) Failed SSH login from 139.5.145.116 (TH/Thailand/rev-dns-cloud-bkk-116-145-5-139-th.nipa.cloud): 5 in the last 3600 secs
2020-05-04 22:55:46
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.145.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.145.121.			IN	A

;; AUTHORITY SECTION:
.			308	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:31:34 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
121.145.5.139.in-addr.arpa domain name pointer rev-dns-cloud-pool-145.5.139-th.nipa.cloud.
121.145.5.139.in-addr.arpa domain name pointer rev-dns-cloud-bkk-121-145-5-139-th.nipa.cloud.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.145.5.139.in-addr.arpa	name = rev-dns-cloud-bkk-121-145-5-139-th.nipa.cloud.
121.145.5.139.in-addr.arpa	name = rev-dns-cloud-pool-145.5.139-th.nipa.cloud.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.147.216.19 attack
Invalid user izi from 211.147.216.19 port 45828
2020-05-22 22:53:09
84.39.247.228 attackbotsspam
1590148382 - 05/22/2020 13:53:02 Host: 84.39.247.228/84.39.247.228 Port: 445 TCP Blocked
2020-05-22 23:21:23
201.163.56.82 attackbots
"Unauthorized connection attempt on SSHD detected"
2020-05-22 23:36:46
46.229.173.68 attackspam
Fail2Ban Ban Triggered
2020-05-22 23:19:57
85.209.0.50 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-22 23:00:40
80.82.65.253 attackbots
May 22 17:07:17 debian-2gb-nbg1-2 kernel: \[12418853.719684\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.253 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19002 PROTO=TCP SPT=50436 DPT=4332 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-22 23:31:02
222.186.175.182 attackbots
2020-05-22T16:58:38.169825ns386461 sshd\[9330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-05-22T16:58:39.706587ns386461 sshd\[9330\]: Failed password for root from 222.186.175.182 port 16194 ssh2
2020-05-22T16:58:53.101816ns386461 sshd\[9460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-05-22T16:58:55.365914ns386461 sshd\[9460\]: Failed password for root from 222.186.175.182 port 3068 ssh2
2020-05-22T16:58:57.926455ns386461 sshd\[9460\]: Failed password for root from 222.186.175.182 port 3068 ssh2
...
2020-05-22 23:06:10
106.38.203.230 attack
May 22 09:39:52 NPSTNNYC01T sshd[14413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.203.230
May 22 09:39:54 NPSTNNYC01T sshd[14413]: Failed password for invalid user cck from 106.38.203.230 port 10425 ssh2
May 22 09:42:25 NPSTNNYC01T sshd[14622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.203.230
...
2020-05-22 23:13:15
222.186.180.6 attackbots
May 22 16:47:44 santamaria sshd\[4616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
May 22 16:47:46 santamaria sshd\[4616\]: Failed password for root from 222.186.180.6 port 53672 ssh2
May 22 16:48:00 santamaria sshd\[4616\]: Failed password for root from 222.186.180.6 port 53672 ssh2
...
2020-05-22 23:14:23
49.236.195.150 attackspambots
May 22 14:20:16 inter-technics sshd[19610]: Invalid user hata from 49.236.195.150 port 57056
May 22 14:20:16 inter-technics sshd[19610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.195.150
May 22 14:20:16 inter-technics sshd[19610]: Invalid user hata from 49.236.195.150 port 57056
May 22 14:20:18 inter-technics sshd[19610]: Failed password for invalid user hata from 49.236.195.150 port 57056 ssh2
May 22 14:25:46 inter-technics sshd[19943]: Invalid user ppf from 49.236.195.150 port 34112
...
2020-05-22 23:44:27
222.32.91.68 attack
May 22 11:53:23 ws26vmsma01 sshd[172214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.32.91.68
May 22 11:53:25 ws26vmsma01 sshd[172214]: Failed password for invalid user czp from 222.32.91.68 port 58984 ssh2
...
2020-05-22 22:56:24
85.209.0.102 attackspam
May 22 16:56:23 vps333114 sshd[12077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.102  user=root
May 22 16:56:25 vps333114 sshd[12077]: Failed password for root from 85.209.0.102 port 63338 ssh2
...
2020-05-22 23:07:48
49.88.112.75 attack
May 22 17:19:04 jane sshd[21591]: Failed password for root from 49.88.112.75 port 17172 ssh2
May 22 17:19:06 jane sshd[21591]: Failed password for root from 49.88.112.75 port 17172 ssh2
...
2020-05-22 23:24:16
129.213.95.149 attackspambots
May 22 15:28:03 jane sshd[32144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.95.149 
May 22 15:28:05 jane sshd[32144]: Failed password for invalid user admin from 129.213.95.149 port 25352 ssh2
...
2020-05-22 23:41:41
89.248.168.112 attackspambots
SMTP:25. 41 login attempts blocked over 430 days.
2020-05-22 22:54:13

最近上报的IP列表

139.5.145.105 118.254.141.106 139.5.145.236 139.5.135.37
139.5.145.26 139.5.145.41 139.5.145.20 139.5.145.46
139.5.146.175 139.5.146.137 139.5.147.161 139.5.146.57
139.5.147.144 118.254.141.108 139.5.147.41 139.5.146.210
139.5.147.189 139.5.148.13 139.5.147.45 118.254.141.111