必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.59.66.101 attackbotsspam
Sep 14 17:54:38 nextcloud sshd\[7451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101  user=root
Sep 14 17:54:41 nextcloud sshd\[7451\]: Failed password for root from 139.59.66.101 port 53686 ssh2
Sep 14 18:01:59 nextcloud sshd\[15774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101  user=root
2020-09-15 02:54:33
139.59.66.101 attackspam
Sep 14 08:39:07 h2779839 sshd[26572]: Invalid user admin from 139.59.66.101 port 48480
Sep 14 08:39:07 h2779839 sshd[26572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Sep 14 08:39:07 h2779839 sshd[26572]: Invalid user admin from 139.59.66.101 port 48480
Sep 14 08:39:09 h2779839 sshd[26572]: Failed password for invalid user admin from 139.59.66.101 port 48480 ssh2
Sep 14 08:43:47 h2779839 sshd[26687]: Invalid user laurentiu from 139.59.66.101 port 33774
Sep 14 08:43:47 h2779839 sshd[26687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Sep 14 08:43:47 h2779839 sshd[26687]: Invalid user laurentiu from 139.59.66.101 port 33774
Sep 14 08:43:49 h2779839 sshd[26687]: Failed password for invalid user laurentiu from 139.59.66.101 port 33774 ssh2
Sep 14 08:48:23 h2779839 sshd[26738]: Invalid user centos from 139.59.66.101 port 47408
...
2020-09-14 18:43:56
139.59.66.101 attackbots
<6 unauthorized SSH connections
2020-08-31 16:28:46
139.59.66.101 attack
Aug 21 09:28:18 Invalid user testuser from 139.59.66.101 port 47420
2020-08-21 19:40:30
139.59.66.101 attackspambots
2020-08-16T14:23:23.208573+02:00  sshd[22869]: Failed password for invalid user docker from 139.59.66.101 port 41284 ssh2
2020-08-16 23:21:31
139.59.66.101 attackbots
Jul 31 06:14:36 buvik sshd[16204]: Failed password for root from 139.59.66.101 port 54776 ssh2
Jul 31 06:18:59 buvik sshd[16867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101  user=root
Jul 31 06:19:02 buvik sshd[16867]: Failed password for root from 139.59.66.101 port 37632 ssh2
...
2020-07-31 12:29:05
139.59.66.101 attack
Invalid user fe from 139.59.66.101 port 49268
2020-07-28 06:09:58
139.59.66.101 attackspam
Jul 25 11:45:39 haigwepa sshd[27169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101 
Jul 25 11:45:41 haigwepa sshd[27169]: Failed password for invalid user chun from 139.59.66.101 port 52988 ssh2
...
2020-07-25 18:02:15
139.59.66.101 attackspam
2020-07-15T21:10:54.391611sd-86998 sshd[2574]: Invalid user ts3server from 139.59.66.101 port 35094
2020-07-15T21:10:54.394974sd-86998 sshd[2574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
2020-07-15T21:10:54.391611sd-86998 sshd[2574]: Invalid user ts3server from 139.59.66.101 port 35094
2020-07-15T21:10:56.462045sd-86998 sshd[2574]: Failed password for invalid user ts3server from 139.59.66.101 port 35094 ssh2
2020-07-15T21:15:11.311933sd-86998 sshd[3159]: Invalid user wanghui from 139.59.66.101 port 45352
...
2020-07-16 03:50:20
139.59.66.101 attackspam
Jul 12 15:31:52 scw-6657dc sshd[29892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Jul 12 15:31:52 scw-6657dc sshd[29892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Jul 12 15:31:54 scw-6657dc sshd[29892]: Failed password for invalid user sharon from 139.59.66.101 port 60226 ssh2
...
2020-07-13 02:00:00
139.59.66.101 attackbotsspam
Jul 11 10:24:23 buvik sshd[31300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Jul 11 10:24:25 buvik sshd[31300]: Failed password for invalid user rentbikegate from 139.59.66.101 port 54836 ssh2
Jul 11 10:27:34 buvik sshd[31715]: Invalid user plesk from 139.59.66.101
...
2020-07-11 16:34:10
139.59.66.101 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-10T06:14:24Z and 2020-07-10T06:45:42Z
2020-07-10 16:42:25
139.59.66.245 attackbots
unauthorized connection attempt
2020-06-26 13:34:17
139.59.66.185 attackspambots
Survey redirect via email to MMS. Unsolicited spam.
2020-06-26 04:52:47
139.59.66.245 attack
Fail2Ban Ban Triggered
2020-06-23 12:24:25
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.66.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.66.50.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:37:55 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
50.66.59.139.in-addr.arpa domain name pointer server1.abhigroup.co.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.66.59.139.in-addr.arpa	name = server1.abhigroup.co.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.98.175 attackbots
Apr 12 09:23:41 ns382633 sshd\[1593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.98.175  user=root
Apr 12 09:23:43 ns382633 sshd\[1593\]: Failed password for root from 139.199.98.175 port 46838 ssh2
Apr 12 09:45:53 ns382633 sshd\[6247\]: Invalid user ubnt from 139.199.98.175 port 38834
Apr 12 09:45:53 ns382633 sshd\[6247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.98.175
Apr 12 09:45:55 ns382633 sshd\[6247\]: Failed password for invalid user ubnt from 139.199.98.175 port 38834 ssh2
2020-04-12 19:21:37
35.197.227.71 attackspambots
Apr 12 06:25:53 ArkNodeAT sshd\[7953\]: Invalid user ts3speak from 35.197.227.71
Apr 12 06:25:53 ArkNodeAT sshd\[7953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.197.227.71
Apr 12 06:25:55 ArkNodeAT sshd\[7953\]: Failed password for invalid user ts3speak from 35.197.227.71 port 48328 ssh2
2020-04-12 19:19:22
111.38.46.183 attack
CMS (WordPress or Joomla) login attempt.
2020-04-12 19:20:45
109.194.198.186 attack
Chat Spam
2020-04-12 18:45:43
80.28.211.131 attack
$f2bV_matches
2020-04-12 19:08:25
111.9.56.34 attack
Apr 12 08:51:12 vps333114 sshd[32035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.9.56.34  user=root
Apr 12 08:51:14 vps333114 sshd[32035]: Failed password for root from 111.9.56.34 port 33230 ssh2
...
2020-04-12 18:59:53
95.248.188.6 attackspambots
Unauthorized connection attempt detected from IP address 95.248.188.6 to port 81
2020-04-12 18:55:53
18.237.21.152 attack
Brute force attack against VPN service
2020-04-12 19:01:05
45.118.151.85 attack
Apr 12 12:50:15 ArkNodeAT sshd\[16981\]: Invalid user 111111 from 45.118.151.85
Apr 12 12:50:15 ArkNodeAT sshd\[16981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.151.85
Apr 12 12:50:18 ArkNodeAT sshd\[16981\]: Failed password for invalid user 111111 from 45.118.151.85 port 56450 ssh2
2020-04-12 19:25:44
188.129.30.128 attackbots
Port probing on unauthorized port 88
2020-04-12 18:46:42
87.251.74.7 attackbotsspam
Fail2Ban Ban Triggered
2020-04-12 18:42:04
121.226.156.72 attackspambots
Apr 12 08:20:03 web2 pure-ftpd: (?@121.226.156.72) [WARNING] Authentication failed for user [anonymous]
Apr 12 08:20:18 web2 pure-ftpd: (?@121.226.156.72) [WARNING] Authentication failed for user [www]
Apr 12 08:20:27 web2 pure-ftpd: (?@121.226.156.72) [WARNING] Authentication failed for user [www]
2020-04-12 18:50:07
183.88.90.122 attack
(smtpauth) Failed SMTP AUTH login from 183.88.90.122 (TH/Thailand/mx-ll-183.88.90-122.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-12 08:18:37 plain authenticator failed for ([127.0.0.1]) [183.88.90.122]: 535 Incorrect authentication data (set_id=info)
2020-04-12 19:07:00
149.202.206.206 attackspambots
Apr 12 07:55:59 ourumov-web sshd\[22431\]: Invalid user hebert from 149.202.206.206 port 34103
Apr 12 07:55:59 ourumov-web sshd\[22431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.206.206
Apr 12 07:56:01 ourumov-web sshd\[22431\]: Failed password for invalid user hebert from 149.202.206.206 port 34103 ssh2
...
2020-04-12 18:57:46
45.127.101.246 attackbots
Apr 12 09:51:08 jane sshd[28204]: Failed password for root from 45.127.101.246 port 47427 ssh2
...
2020-04-12 18:48:04

最近上报的IP列表

139.59.6.80 139.59.61.14 139.59.7.192 139.59.66.44
139.59.7.40 139.59.71.27 139.59.75.228 139.59.72.138
139.59.72.87 139.59.72.54 139.59.72.88 139.59.73.216
139.59.78.67 139.59.80.24 139.59.79.139 139.59.80.137
139.59.80.56 139.59.85.26 139.59.85.95 139.59.85.69