必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.59.91.254 attackspambots
Jul 19 18:06:47 ajax sshd[11849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.254 
Jul 19 18:06:49 ajax sshd[11849]: Failed password for invalid user postgres from 139.59.91.254 port 48234 ssh2
2020-07-20 01:26:19
139.59.91.23 attackbots
Invalid user admin from 139.59.91.23 port 53526
2020-04-17 14:06:35
139.59.91.23 attack
Apr 16 13:44:27 www_kotimaassa_fi sshd[16132]: Failed password for root from 139.59.91.23 port 55098 ssh2
...
2020-04-17 01:24:59
139.59.91.22 attackspam
Jan 19 22:08:06 vpn01 sshd[29170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.22
Jan 19 22:08:08 vpn01 sshd[29170]: Failed password for invalid user hosting from 139.59.91.22 port 51236 ssh2
...
2020-01-20 05:54:07
139.59.91.165 attackspambots
Unauthorized connection attempt detected from IP address 139.59.91.165 to port 2220 [J]
2020-01-15 09:26:31
139.59.91.165 attackspam
Unauthorized connection attempt detected from IP address 139.59.91.165 to port 2220 [J]
2020-01-14 20:38:18
139.59.91.176 attackspam
Nov 28 13:11:23 vpn01 sshd[12983]: Failed password for root from 139.59.91.176 port 56023 ssh2
...
2019-11-28 22:31:15
139.59.91.176 attackspambots
Nov 27 15:03:21 vpn01 sshd[26949]: Failed password for root from 139.59.91.176 port 38403 ssh2
...
2019-11-27 22:08:31
139.59.91.215 attackspam
2019-11-24T07:59:53.405861matrix.arvenenaske.de sshd[358984]: Invalid user mysql from 139.59.91.215 port 37302
2019-11-24T07:59:53.410726matrix.arvenenaske.de sshd[358984]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.215 user=mysql
2019-11-24T07:59:53.411274matrix.arvenenaske.de sshd[358984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.215
2019-11-24T07:59:53.405861matrix.arvenenaske.de sshd[358984]: Invalid user mysql from 139.59.91.215 port 37302
2019-11-24T07:59:55.437052matrix.arvenenaske.de sshd[358984]: Failed password for invalid user mysql from 139.59.91.215 port 37302 ssh2
2019-11-24T08:06:20.413519matrix.arvenenaske.de sshd[359101]: Invalid user adhhostname from 139.59.91.215 port 50514
2019-11-24T08:06:20.418255matrix.arvenenaske.de sshd[359101]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.215 user=adhh........
------------------------------
2019-11-25 02:46:00
139.59.91.176 attackbots
detected by Fail2Ban
2019-11-10 19:30:54
139.59.91.176 attackspam
Nov  7 08:26:32 vpn01 sshd[15260]: Failed password for root from 139.59.91.176 port 44660 ssh2
...
2019-11-07 20:11:37
139.59.91.139 attackspambots
(sshd) Failed SSH login from 139.59.91.139 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 08:37:12 chookity sshd[30151]: Did not receive identification string from 139.59.91.139 port 60946
Sep 26 08:40:19 chookity sshd[30312]: Invalid user doctor from 139.59.91.139 port 33116
Sep 26 08:40:47 chookity sshd[30323]: Invalid user virus from 139.59.91.139 port 48666
Sep 26 08:41:15 chookity sshd[30326]: Invalid user windows from 139.59.91.139 port 37018
Sep 26 08:41:42 chookity sshd[30334]: Invalid user dummy from 139.59.91.139 port 52776
2019-09-26 21:00:58
139.59.91.139 attackspambots
Sep  4 02:20:00 vpn01 sshd\[21555\]: Invalid user quan from 139.59.91.139
Sep  4 02:20:00 vpn01 sshd\[21555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.139
Sep  4 02:20:02 vpn01 sshd\[21555\]: Failed password for invalid user quan from 139.59.91.139 port 53652 ssh2
2019-09-04 11:00:48
139.59.91.139 attackbots
Sep  3 04:30:17 lcl-usvr-02 sshd[11852]: Invalid user patrick from 139.59.91.139 port 52970
Sep  3 04:30:17 lcl-usvr-02 sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.139
Sep  3 04:30:17 lcl-usvr-02 sshd[11852]: Invalid user patrick from 139.59.91.139 port 52970
Sep  3 04:30:18 lcl-usvr-02 sshd[11852]: Failed password for invalid user patrick from 139.59.91.139 port 52970 ssh2
Sep  3 04:34:49 lcl-usvr-02 sshd[12866]: Invalid user test from 139.59.91.139 port 51652
...
2019-09-03 05:51:44
139.59.91.139 attack
Aug 15 10:51:50 localhost sshd[25589]: Invalid user est from 139.59.91.139 port 46252
Aug 15 10:51:50 localhost sshd[25589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.139
Aug 15 10:51:50 localhost sshd[25589]: Invalid user est from 139.59.91.139 port 46252
Aug 15 10:51:52 localhost sshd[25589]: Failed password for invalid user est from 139.59.91.139 port 46252 ssh2
...
2019-08-15 16:18:48
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.91.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.91.39.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:06:32 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 39.91.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.91.59.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.236.10.88 attackspambots
Automatic report - Banned IP Access
2020-07-30 15:51:16
51.83.125.8 attack
Invalid user liucanbin from 51.83.125.8 port 49976
2020-07-30 15:52:11
46.151.211.66 attackspam
SSH Brute Force
2020-07-30 16:23:02
78.138.188.187 attack
Jul 30 00:33:41 dignus sshd[17871]: Failed password for invalid user guangyao from 78.138.188.187 port 45306 ssh2
Jul 30 00:38:10 dignus sshd[18391]: Invalid user zbh from 78.138.188.187 port 58930
Jul 30 00:38:10 dignus sshd[18391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.138.188.187
Jul 30 00:38:13 dignus sshd[18391]: Failed password for invalid user zbh from 78.138.188.187 port 58930 ssh2
Jul 30 00:42:37 dignus sshd[18912]: Invalid user user02 from 78.138.188.187 port 44334
...
2020-07-30 16:05:04
222.186.30.218 attackspam
Unauthorized connection attempt detected from IP address 222.186.30.218 to port 22
2020-07-30 15:54:14
49.233.32.106 attackspam
SSH Brute Force
2020-07-30 16:16:20
114.141.132.88 attackbotsspam
$f2bV_matches
2020-07-30 16:16:42
190.121.139.13 attackbotsspam
Automatic report - Port Scan Attack
2020-07-30 15:55:18
61.177.172.54 attack
Jul 30 00:55:48 dignus sshd[20392]: Failed password for root from 61.177.172.54 port 49139 ssh2
Jul 30 00:55:51 dignus sshd[20392]: Failed password for root from 61.177.172.54 port 49139 ssh2
Jul 30 00:55:54 dignus sshd[20392]: Failed password for root from 61.177.172.54 port 49139 ssh2
Jul 30 00:55:58 dignus sshd[20392]: Failed password for root from 61.177.172.54 port 49139 ssh2
Jul 30 00:56:01 dignus sshd[20392]: Failed password for root from 61.177.172.54 port 49139 ssh2
...
2020-07-30 16:09:50
42.236.10.83 attack
Automatic report - Banned IP Access
2020-07-30 16:18:18
36.89.251.105 attackbotsspam
Jul 30 08:38:39 rocket sshd[21778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.251.105
Jul 30 08:38:41 rocket sshd[21778]: Failed password for invalid user grid from 36.89.251.105 port 55348 ssh2
Jul 30 08:43:39 rocket sshd[22555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.251.105
...
2020-07-30 15:52:27
187.16.96.35 attackspambots
Invalid user xingfeng from 187.16.96.35 port 36472
2020-07-30 16:29:29
162.223.89.190 attack
2020-07-30T06:51:22.068749abusebot-6.cloudsearch.cf sshd[3753]: Invalid user wfei from 162.223.89.190 port 46428
2020-07-30T06:51:22.075490abusebot-6.cloudsearch.cf sshd[3753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.223.89.190
2020-07-30T06:51:22.068749abusebot-6.cloudsearch.cf sshd[3753]: Invalid user wfei from 162.223.89.190 port 46428
2020-07-30T06:51:24.199997abusebot-6.cloudsearch.cf sshd[3753]: Failed password for invalid user wfei from 162.223.89.190 port 46428 ssh2
2020-07-30T06:58:34.071290abusebot-6.cloudsearch.cf sshd[3812]: Invalid user rhdqn from 162.223.89.190 port 57896
2020-07-30T06:58:34.077900abusebot-6.cloudsearch.cf sshd[3812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.223.89.190
2020-07-30T06:58:34.071290abusebot-6.cloudsearch.cf sshd[3812]: Invalid user rhdqn from 162.223.89.190 port 57896
2020-07-30T06:58:36.508410abusebot-6.cloudsearch.cf sshd[3812]: Failed pas
...
2020-07-30 15:49:18
222.186.190.14 attackspambots
(sshd) Failed SSH login from 222.186.190.14 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 30 09:56:57 amsweb01 sshd[4939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
Jul 30 09:57:00 amsweb01 sshd[4939]: Failed password for root from 222.186.190.14 port 10502 ssh2
Jul 30 09:57:02 amsweb01 sshd[4939]: Failed password for root from 222.186.190.14 port 10502 ssh2
Jul 30 09:57:04 amsweb01 sshd[4939]: Failed password for root from 222.186.190.14 port 10502 ssh2
Jul 30 09:57:06 amsweb01 sshd[5031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
2020-07-30 16:00:44
184.105.139.125 attackspambots
07/29/2020-23:52:16.633026 184.105.139.125 Protocol: 17 GPL RPC xdmcp info query
2020-07-30 15:48:31

最近上报的IP列表

139.59.91.204 139.59.87.251 139.59.91.232 139.59.92.223
139.59.91.71 139.59.92.143 139.59.94.38 139.59.94.76
139.59.92.67 139.59.95.223 139.59.95.103 139.59.96.178
139.59.96.200 139.59.99.233 139.59.98.163 139.60.0.41
139.6.10.199 139.59.99.216 139.60.101.0 139.60.100.41