必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.59.11.31 attackproxy
, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
2023-01-16 21:48:53
139.59.116.115 attackspam
Oct  9 19:17:58 vps-51d81928 sshd[692298]: Failed password for root from 139.59.116.115 port 36468 ssh2
Oct  9 19:22:22 vps-51d81928 sshd[692415]: Invalid user mysql from 139.59.116.115 port 41912
Oct  9 19:22:22 vps-51d81928 sshd[692415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.116.115 
Oct  9 19:22:22 vps-51d81928 sshd[692415]: Invalid user mysql from 139.59.116.115 port 41912
Oct  9 19:22:25 vps-51d81928 sshd[692415]: Failed password for invalid user mysql from 139.59.116.115 port 41912 ssh2
...
2020-10-10 06:05:43
139.59.116.115 attackbots
2020-10-09T15:36:12.025346ks3355764 sshd[13005]: Invalid user tf2 from 139.59.116.115 port 35304
2020-10-09T15:36:14.038962ks3355764 sshd[13005]: Failed password for invalid user tf2 from 139.59.116.115 port 35304 ssh2
...
2020-10-09 22:12:25
139.59.116.115 attackbotsspam
Port scan denied
2020-10-09 14:02:44
139.59.116.115 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-04 05:42:11
139.59.11.66 attackspambots
Scanned 67 times in the last 24 hours on port 22
2020-10-01 08:07:44
139.59.11.66 attack
Invalid user admin from 139.59.11.66 port 48246
2020-10-01 00:39:37
139.59.11.66 attackbots
 TCP (SYN) 139.59.11.66:47123 -> port 22, len 48
2020-09-30 09:50:50
139.59.11.66 attackspambots
 TCP (SYN) 139.59.11.66:29278 -> port 22, len 48
2020-09-30 02:42:17
139.59.11.66 attackspambots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-09-29 18:45:14
139.59.116.243 attack
Fail2Ban Ban Triggered
2020-09-29 03:03:54
139.59.11.66 attackbotsspam
Time:     Mon Sep 28 18:48:41 2020 +0000
IP:       139.59.11.66 (IN/India/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 28 18:47:48 29-1 sshd[18366]: Did not receive identification string from 139.59.11.66 port 37284
Sep 28 18:48:12 29-1 sshd[18444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.11.66  user=root
Sep 28 18:48:14 29-1 sshd[18444]: Failed password for root from 139.59.11.66 port 58320 ssh2
Sep 28 18:48:36 29-1 sshd[18481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.11.66  user=root
Sep 28 18:48:37 29-1 sshd[18481]: Failed password for root from 139.59.11.66 port 51980 ssh2
2020-09-29 02:53:19
139.59.116.243 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-28 19:13:00
139.59.11.66 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-28 19:00:55
139.59.116.243 attackbots
 TCP (SYN) 139.59.116.243:59711 -> port 22790, len 44
2020-09-10 12:23:41
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.11.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.11.135.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:52:18 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 135.11.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.11.59.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.53.237.121 attack
failed_logins
2020-09-19 02:09:36
187.109.34.205 attackbots
Sep 17 19:26:54 mail.srvfarm.net postfix/smtpd[178660]: warning: unknown[187.109.34.205]: SASL PLAIN authentication failed: 
Sep 17 19:26:54 mail.srvfarm.net postfix/smtpd[178660]: lost connection after AUTH from unknown[187.109.34.205]
Sep 17 19:29:10 mail.srvfarm.net postfix/smtps/smtpd[181882]: warning: unknown[187.109.34.205]: SASL PLAIN authentication failed: 
Sep 17 19:29:11 mail.srvfarm.net postfix/smtps/smtpd[181882]: lost connection after AUTH from unknown[187.109.34.205]
Sep 17 19:34:02 mail.srvfarm.net postfix/smtpd[179835]: warning: unknown[187.109.34.205]: SASL PLAIN authentication failed:
2020-09-19 02:09:58
172.82.239.22 attack
Sep 18 19:22:26 mail.srvfarm.net postfix/smtpd[869217]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Sep 18 19:24:10 mail.srvfarm.net postfix/smtpd[882425]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Sep 18 19:24:48 mail.srvfarm.net postfix/smtpd[882424]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Sep 18 19:28:17 mail.srvfarm.net postfix/smtpd[869290]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
Sep 18 19:30:10 mail.srvfarm.net postfix/smtpd[882424]: lost connection after STARTTLS from r22.news.eu.rvca.com[172.82.239.22]
2020-09-19 02:12:12
49.235.247.75 attackspam
DATE:2020-09-18 09:12:58,IP:49.235.247.75,MATCHES:10,PORT:ssh
2020-09-19 01:55:19
189.244.107.101 attackbots
1600361826 - 09/17/2020 18:57:06 Host: 189.244.107.101/189.244.107.101 Port: 445 TCP Blocked
2020-09-19 01:37:59
45.232.64.212 attack
Sep 17 18:39:53 mail.srvfarm.net postfix/smtpd[157365]: warning: unknown[45.232.64.212]: SASL PLAIN authentication failed: 
Sep 17 18:39:53 mail.srvfarm.net postfix/smtpd[157365]: lost connection after AUTH from unknown[45.232.64.212]
Sep 17 18:43:44 mail.srvfarm.net postfix/smtps/smtpd[159173]: warning: unknown[45.232.64.212]: SASL PLAIN authentication failed: 
Sep 17 18:43:44 mail.srvfarm.net postfix/smtps/smtpd[159173]: lost connection after AUTH from unknown[45.232.64.212]
Sep 17 18:49:02 mail.srvfarm.net postfix/smtpd[161687]: warning: unknown[45.232.64.212]: SASL PLAIN authentication failed:
2020-09-19 01:55:45
45.176.215.24 attack
Sep 17 18:50:15 mail.srvfarm.net postfix/smtpd[163729]: warning: unknown[45.176.215.24]: SASL PLAIN authentication failed: 
Sep 17 18:50:17 mail.srvfarm.net postfix/smtpd[163729]: lost connection after AUTH from unknown[45.176.215.24]
Sep 17 18:50:36 mail.srvfarm.net postfix/smtps/smtpd[161661]: warning: unknown[45.176.215.24]: SASL PLAIN authentication failed: 
Sep 17 18:50:37 mail.srvfarm.net postfix/smtps/smtpd[161661]: lost connection after AUTH from unknown[45.176.215.24]
Sep 17 18:55:52 mail.srvfarm.net postfix/smtpd[162891]: warning: unknown[45.176.215.24]: SASL PLAIN authentication failed:
2020-09-19 01:56:07
89.248.171.89 attack
Sep 18 19:14:17 web01.agentur-b-2.de postfix/smtps/smtpd[2513270]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:15:42 web01.agentur-b-2.de postfix/smtps/smtpd[2513270]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:16:49 web01.agentur-b-2.de postfix/smtps/smtpd[2513270]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:20:20 web01.agentur-b-2.de postfix/smtps/smtpd[2514493]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:21:11 web01.agentur-b-2.de postfix/smtps/smtpd[2514493]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-19 02:07:13
122.51.34.215 attackspam
2020-09-18T21:34:03.120280paragon sshd[164738]: Invalid user delnaz from 122.51.34.215 port 34924
2020-09-18T21:34:05.096419paragon sshd[164738]: Failed password for invalid user delnaz from 122.51.34.215 port 34924 ssh2
2020-09-18T21:35:54.405823paragon sshd[164827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.34.215  user=root
2020-09-18T21:35:56.949712paragon sshd[164827]: Failed password for root from 122.51.34.215 port 55216 ssh2
2020-09-18T21:37:41.492114paragon sshd[164902]: Invalid user bot from 122.51.34.215 port 47272
...
2020-09-19 01:41:44
148.203.151.248 attackbots
Sep 18 16:02:27 mail.srvfarm.net postfix/smtpd[819719]: NOQUEUE: reject: RCPT from mailrelay5.vw.com.mx[148.203.151.248]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Sep 18 16:02:27 mail.srvfarm.net postfix/smtpd[806927]: NOQUEUE: reject: RCPT from mailrelay5.vw.com.mx[148.203.151.248]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Sep 18 16:02:28 mail.srvfarm.net postfix/smtpd[819719]: NOQUEUE: reject: RCPT from mailrelay5.vw.com.mx[148.203.151.248]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Sep 18 16:02:28 mail.srvfarm.net postfix/smtpd[806927]: NOQUEUE
2020-09-19 01:51:39
45.142.120.53 attack
Sep 18 19:06:47 websrv1.derweidener.de postfix/smtpd[2134329]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:06:55 websrv1.derweidener.de postfix/smtpd[2134642]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:06:58 websrv1.derweidener.de postfix/smtpd[2134329]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:07:06 websrv1.derweidener.de postfix/smtpd[2134645]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:07:07 websrv1.derweidener.de postfix/smtpd[2134646]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-19 02:08:52
179.125.62.112 attackspambots
(BR/Brazil/-) SMTP Bruteforcing attempts
2020-09-19 02:01:26
45.142.120.74 attackbotsspam
Sep 18 19:51:41 web01.agentur-b-2.de postfix/smtpd[2518423]: warning: unknown[45.142.120.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:51:48 web01.agentur-b-2.de postfix/smtpd[2518790]: warning: unknown[45.142.120.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:51:50 web01.agentur-b-2.de postfix/smtpd[2518789]: warning: unknown[45.142.120.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:52:00 web01.agentur-b-2.de postfix/smtpd[2515447]: warning: unknown[45.142.120.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 18 19:52:01 web01.agentur-b-2.de postfix/smtpd[2518423]: warning: unknown[45.142.120.74]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-19 02:08:30
179.124.18.3 attackbots
Unauthorized connection attempt from IP address 179.124.18.3 on port 587
2020-09-19 02:11:11
79.120.54.174 attackspam
Sep 18 14:45:46 scw-tender-jepsen sshd[9372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.54.174
Sep 18 14:45:48 scw-tender-jepsen sshd[9372]: Failed password for invalid user root1 from 79.120.54.174 port 49518 ssh2
2020-09-19 02:07:51

最近上报的IP列表

171.96.30.41 31.58.222.179 223.87.228.125 187.162.133.116
111.85.196.184 182.121.84.78 36.72.212.60 116.98.164.5
101.249.60.84 125.161.110.92 223.102.95.6 122.186.248.198
177.11.16.126 110.167.169.76 112.95.10.141 70.55.115.78
223.67.37.242 45.162.244.121 194.104.10.83 93.124.16.16