必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.59.172.23 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-07-06 07:03:40
139.59.172.23 attack
Unauthorized connection attempt detected, IP banned.
2020-06-08 18:12:11
139.59.172.23 attackspam
139.59.172.23 - - [28/Apr/2020:08:03:48 +0200] "POST /wp-login.php HTTP/1.1" 200 3405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [28/Apr/2020:08:03:50 +0200] "POST /wp-login.php HTTP/1.1" 200 3404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-28 14:49:43
139.59.172.149 attackspambots
Automatic report - XMLRPC Attack
2020-04-24 22:32:09
139.59.172.23 attackbots
139.59.172.23 - - [19/Apr/2020:01:29:23 +0200] "GET /wp-login.php HTTP/1.1" 200 5821 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [19/Apr/2020:01:29:23 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [19/Apr/2020:01:29:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-19 07:33:09
139.59.172.23 attackbotsspam
139.59.172.23 - - [06/Apr/2020:06:56:25 +0300] "GET /wp-login.php HTTP/1.0" 404 371 "http://dogan.gen.tr/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [06/Apr/2020:06:56:25 +0300] "GET /wp-login.php HTTP/1.0" 404 371 "http://dogan.gen.tr/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [06/Apr/2020:06:56:26 +0300] "GET /wp-login.php HTTP/1.0" 404 371 "http://dogan.org/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [06/Apr/2020:06:56:26 +0300] "GET /wp-login.php HTTP/1.0" 404 371 "http://dogan.org/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [06/Apr/2020:06:56:26 +0300] "GET /wp-login.php HTTP/1.0" 404 371 "http://dogan.org/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-06 12:14:18
139.59.172.23 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-25 17:31:53
139.59.172.23 attackbots
139.59.172.23 - - [20/Mar/2020:08:08:25 +0100] "GET /wp-login.php HTTP/1.1" 200 5963 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [20/Mar/2020:08:08:26 +0100] "POST /wp-login.php HTTP/1.1" 200 6743 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [20/Mar/2020:08:08:27 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-20 19:15:37
139.59.172.23 attack
CMS (WordPress or Joomla) login attempt.
2020-03-14 12:18:26
139.59.172.23 attackspam
Automatic report - XMLRPC Attack
2020-03-09 15:52:04
139.59.172.23 attack
139.59.172.23 - - [19/Jan/2020:12:54:34 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - [19/Jan/2020:12:54:35 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-20 02:14:02
139.59.172.23 attackspam
139.59.172.23 - - \[06/Jan/2020:22:11:22 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - \[06/Jan/2020:22:11:23 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - \[06/Jan/2020:22:11:25 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-07 07:04:16
139.59.172.23 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-12-25 16:42:08
139.59.172.23 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-11-11 18:58:32
139.59.172.23 attackbots
Wordpress bruteforce
2019-11-05 01:12:37
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.172.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.172.6.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:35:43 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
6.172.59.139.in-addr.arpa domain name pointer jfdglobal.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.172.59.139.in-addr.arpa	name = jfdglobal.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.247.157.206 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/172.247.157.206/ 
 NL - 1H : (19)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN132839 
 
 IP : 172.247.157.206 
 
 CIDR : 172.247.157.0/24 
 
 PREFIX COUNT : 303 
 
 UNIQUE IP COUNT : 604160 
 
 
 WYKRYTE ATAKI Z ASN132839 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-10-14 21:53:29 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-15 07:46:55
113.188.84.14 attackspambots
Unauthorised access (Oct 15) SRC=113.188.84.14 LEN=52 TTL=118 ID=25449 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-15 12:10:29
98.143.145.30 attackspambots
[munged]::443 98.143.145.30 - - [15/Oct/2019:00:07:29 +0200] "POST /[munged]: HTTP/1.1" 200 5530 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 98.143.145.30 - - [15/Oct/2019:00:07:31 +0200] "POST /[munged]: HTTP/1.1" 200 5387 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 98.143.145.30 - - [15/Oct/2019:00:07:32 +0200] "POST /[munged]: HTTP/1.1" 200 5387 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 98.143.145.30 - - [15/Oct/2019:00:07:34 +0200] "POST /[munged]: HTTP/1.1" 200 5387 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 98.143.145.30 - - [15/Oct/2019:00:07:36 +0200] "POST /[munged]: HTTP/1.1" 200 5387 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 98.143.145.30 - - [15/Oct/2019:00:07:37
2019-10-15 07:46:25
125.162.227.100 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/125.162.227.100/ 
 ID - 1H : (38)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN7713 
 
 IP : 125.162.227.100 
 
 CIDR : 125.162.224.0/22 
 
 PREFIX COUNT : 2255 
 
 UNIQUE IP COUNT : 2765312 
 
 
 WYKRYTE ATAKI Z ASN7713 :  
  1H - 1 
  3H - 1 
  6H - 4 
 12H - 8 
 24H - 9 
 
 DateTime : 2019-10-15 05:54:37 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 12:14:42
41.76.169.43 attack
Oct 14 17:44:53 hanapaa sshd\[5581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43  user=root
Oct 14 17:44:56 hanapaa sshd\[5581\]: Failed password for root from 41.76.169.43 port 58470 ssh2
Oct 14 17:49:47 hanapaa sshd\[5951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43  user=root
Oct 14 17:49:49 hanapaa sshd\[5951\]: Failed password for root from 41.76.169.43 port 42282 ssh2
Oct 14 17:54:42 hanapaa sshd\[6355\]: Invalid user dan from 41.76.169.43
Oct 14 17:54:42 hanapaa sshd\[6355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43
2019-10-15 12:11:39
188.166.208.131 attack
Oct 14 11:28:45 hanapaa sshd\[5612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131  user=root
Oct 14 11:28:48 hanapaa sshd\[5612\]: Failed password for root from 188.166.208.131 port 43138 ssh2
Oct 14 11:33:25 hanapaa sshd\[6026\]: Invalid user dice from 188.166.208.131
Oct 14 11:33:25 hanapaa sshd\[6026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131
Oct 14 11:33:27 hanapaa sshd\[6026\]: Failed password for invalid user dice from 188.166.208.131 port 54988 ssh2
2019-10-15 07:55:56
123.231.236.196 attack
*Port Scan* detected from 123.231.236.196 (ID/Indonesia/-). 4 hits in the last 100 seconds
2019-10-15 12:03:05
51.75.195.39 attack
Oct 15 06:55:15 tuotantolaitos sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.39
Oct 15 06:55:17 tuotantolaitos sshd[31416]: Failed password for invalid user admin1 from 51.75.195.39 port 37072 ssh2
...
2019-10-15 12:07:34
128.199.243.138 attackbotsspam
Oct 14 21:44:21 rotator sshd\[18809\]: Invalid user toor from 128.199.243.138Oct 14 21:44:23 rotator sshd\[18809\]: Failed password for invalid user toor from 128.199.243.138 port 56910 ssh2Oct 14 21:48:47 rotator sshd\[19609\]: Invalid user 2wsx\#EDC from 128.199.243.138Oct 14 21:48:49 rotator sshd\[19609\]: Failed password for invalid user 2wsx\#EDC from 128.199.243.138 port 40598 ssh2Oct 14 21:53:18 rotator sshd\[20399\]: Invalid user 123ASDasd$%\^ from 128.199.243.138Oct 14 21:53:19 rotator sshd\[20399\]: Failed password for invalid user 123ASDasd$%\^ from 128.199.243.138 port 52520 ssh2
...
2019-10-15 07:52:43
206.81.21.47 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-15 12:08:05
128.199.240.173 attack
*Port Scan* detected from 128.199.240.173 (SG/Singapore/-). 4 hits in the last 186 seconds
2019-10-15 12:01:03
89.110.48.143 attack
[munged]::443 89.110.48.143 - - [14/Oct/2019:23:40:34 +0200] "POST /[munged]: HTTP/1.1" 200 10072 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 89.110.48.143 - - [14/Oct/2019:23:40:34 +0200] "POST /[munged]: HTTP/1.1" 200 5396 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 89.110.48.143 - - [14/Oct/2019:23:40:35 +0200] "POST /[munged]: HTTP/1.1" 200 5396 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 89.110.48.143 - - [14/Oct/2019:23:40:35 +0200] "POST /[munged]: HTTP/1.1" 200 5396 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 89.110.48.143 - - [14/Oct/2019:23:40:36 +0200] "POST /[munged]: HTTP/1.1" 200 5396 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 89.110.48.143 - - [14/Oct/2019:23:40:37
2019-10-15 07:44:16
31.171.0.55 attackspambots
Oct 14 21:51:28 imap-login: Info: Disconnected \(auth failed, 1 attempts in 14 secs\): user=\, method=PLAIN, rip=31.171.0.55, lip=192.168.100.101, session=\\
Oct 14 21:51:36 imap-login: Info: Disconnected \(auth failed, 1 attempts in 14 secs\): user=\, method=PLAIN, rip=31.171.0.55, lip=192.168.100.101, session=\\
Oct 14 21:51:37 imap-login: Info: Disconnected \(no auth attempts in 0 secs\): user=\<\>, rip=31.171.0.55, lip=192.168.100.101, session=\\
Oct 14 21:51:38 imap-login: Info: Disconnected \(no auth attempts in 0 secs\): user=\<\>, rip=31.171.0.55, lip=192.168.100.101, session=\\
Oct 14 21:51:48 imap-login: Info: Disconnected \(no auth attempts in 0 secs\): user=\<\>, rip=31.171.0.55, lip=192.168.100.101, session=\\
Oct 14 21:51:51 imap-login: Info: Disconnected \(no auth attempts in 0 secs\): user=\<\>, rip=31.171.0.55, lip=192.168.100.101, session=\
2019-10-15 07:42:53
134.249.133.197 attackbotsspam
$f2bV_matches
2019-10-15 07:46:01
23.94.133.72 attack
Oct 15 05:54:52 srv206 sshd[31044]: Invalid user ij from 23.94.133.72
Oct 15 05:54:52 srv206 sshd[31044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.133.72
Oct 15 05:54:52 srv206 sshd[31044]: Invalid user ij from 23.94.133.72
Oct 15 05:54:54 srv206 sshd[31044]: Failed password for invalid user ij from 23.94.133.72 port 47746 ssh2
...
2019-10-15 12:06:56

最近上报的IP列表

139.59.172.121 118.254.157.63 139.59.171.66 139.59.172.159
139.59.170.36 139.59.173.151 139.59.173.192 139.59.173.206
139.59.173.234 118.254.157.7 139.59.173.5 139.59.174.253
139.59.173.21 139.59.173.75 139.59.173.58 139.59.173.7
139.59.174.244 139.59.174.41 139.59.175.192 139.59.175.219