必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.59.91.254 attackspambots
Jul 19 18:06:47 ajax sshd[11849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.254 
Jul 19 18:06:49 ajax sshd[11849]: Failed password for invalid user postgres from 139.59.91.254 port 48234 ssh2
2020-07-20 01:26:19
139.59.91.23 attackbots
Invalid user admin from 139.59.91.23 port 53526
2020-04-17 14:06:35
139.59.91.23 attack
Apr 16 13:44:27 www_kotimaassa_fi sshd[16132]: Failed password for root from 139.59.91.23 port 55098 ssh2
...
2020-04-17 01:24:59
139.59.91.22 attackspam
Jan 19 22:08:06 vpn01 sshd[29170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.22
Jan 19 22:08:08 vpn01 sshd[29170]: Failed password for invalid user hosting from 139.59.91.22 port 51236 ssh2
...
2020-01-20 05:54:07
139.59.91.165 attackspambots
Unauthorized connection attempt detected from IP address 139.59.91.165 to port 2220 [J]
2020-01-15 09:26:31
139.59.91.165 attackspam
Unauthorized connection attempt detected from IP address 139.59.91.165 to port 2220 [J]
2020-01-14 20:38:18
139.59.91.176 attackspam
Nov 28 13:11:23 vpn01 sshd[12983]: Failed password for root from 139.59.91.176 port 56023 ssh2
...
2019-11-28 22:31:15
139.59.91.176 attackspambots
Nov 27 15:03:21 vpn01 sshd[26949]: Failed password for root from 139.59.91.176 port 38403 ssh2
...
2019-11-27 22:08:31
139.59.91.215 attackspam
2019-11-24T07:59:53.405861matrix.arvenenaske.de sshd[358984]: Invalid user mysql from 139.59.91.215 port 37302
2019-11-24T07:59:53.410726matrix.arvenenaske.de sshd[358984]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.215 user=mysql
2019-11-24T07:59:53.411274matrix.arvenenaske.de sshd[358984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.215
2019-11-24T07:59:53.405861matrix.arvenenaske.de sshd[358984]: Invalid user mysql from 139.59.91.215 port 37302
2019-11-24T07:59:55.437052matrix.arvenenaske.de sshd[358984]: Failed password for invalid user mysql from 139.59.91.215 port 37302 ssh2
2019-11-24T08:06:20.413519matrix.arvenenaske.de sshd[359101]: Invalid user adhhostname from 139.59.91.215 port 50514
2019-11-24T08:06:20.418255matrix.arvenenaske.de sshd[359101]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.215 user=adhh........
------------------------------
2019-11-25 02:46:00
139.59.91.176 attackbots
detected by Fail2Ban
2019-11-10 19:30:54
139.59.91.176 attackspam
Nov  7 08:26:32 vpn01 sshd[15260]: Failed password for root from 139.59.91.176 port 44660 ssh2
...
2019-11-07 20:11:37
139.59.91.139 attackspambots
(sshd) Failed SSH login from 139.59.91.139 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 08:37:12 chookity sshd[30151]: Did not receive identification string from 139.59.91.139 port 60946
Sep 26 08:40:19 chookity sshd[30312]: Invalid user doctor from 139.59.91.139 port 33116
Sep 26 08:40:47 chookity sshd[30323]: Invalid user virus from 139.59.91.139 port 48666
Sep 26 08:41:15 chookity sshd[30326]: Invalid user windows from 139.59.91.139 port 37018
Sep 26 08:41:42 chookity sshd[30334]: Invalid user dummy from 139.59.91.139 port 52776
2019-09-26 21:00:58
139.59.91.139 attackspambots
Sep  4 02:20:00 vpn01 sshd\[21555\]: Invalid user quan from 139.59.91.139
Sep  4 02:20:00 vpn01 sshd\[21555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.139
Sep  4 02:20:02 vpn01 sshd\[21555\]: Failed password for invalid user quan from 139.59.91.139 port 53652 ssh2
2019-09-04 11:00:48
139.59.91.139 attackbots
Sep  3 04:30:17 lcl-usvr-02 sshd[11852]: Invalid user patrick from 139.59.91.139 port 52970
Sep  3 04:30:17 lcl-usvr-02 sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.139
Sep  3 04:30:17 lcl-usvr-02 sshd[11852]: Invalid user patrick from 139.59.91.139 port 52970
Sep  3 04:30:18 lcl-usvr-02 sshd[11852]: Failed password for invalid user patrick from 139.59.91.139 port 52970 ssh2
Sep  3 04:34:49 lcl-usvr-02 sshd[12866]: Invalid user test from 139.59.91.139 port 51652
...
2019-09-03 05:51:44
139.59.91.139 attack
Aug 15 10:51:50 localhost sshd[25589]: Invalid user est from 139.59.91.139 port 46252
Aug 15 10:51:50 localhost sshd[25589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.139
Aug 15 10:51:50 localhost sshd[25589]: Invalid user est from 139.59.91.139 port 46252
Aug 15 10:51:52 localhost sshd[25589]: Failed password for invalid user est from 139.59.91.139 port 46252 ssh2
...
2019-08-15 16:18:48
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.91.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54452
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.91.5.			IN	A

;; AUTHORITY SECTION:
.			153	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:40:08 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 5.91.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.91.59.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.3.177.213 attackspambots
Dec  6 22:12:06 web1 sshd\[5783\]: Invalid user bartelink from 192.3.177.213
Dec  6 22:12:06 web1 sshd\[5783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213
Dec  6 22:12:07 web1 sshd\[5783\]: Failed password for invalid user bartelink from 192.3.177.213 port 33410 ssh2
Dec  6 22:17:32 web1 sshd\[6344\]: Invalid user frank from 192.3.177.213
Dec  6 22:17:32 web1 sshd\[6344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213
2019-12-07 16:25:31
165.22.213.24 attackspam
Dec  7 08:50:27 eventyay sshd[21248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.24
Dec  7 08:50:29 eventyay sshd[21248]: Failed password for invalid user superstar from 165.22.213.24 port 58342 ssh2
Dec  7 08:56:36 eventyay sshd[21452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.213.24
...
2019-12-07 16:02:06
103.103.161.159 attackbots
Port Scan
2019-12-07 16:16:35
222.186.180.41 attackspam
2019-12-07T09:03:06.726454scmdmz1 sshd\[13687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-12-07T09:03:09.261290scmdmz1 sshd\[13687\]: Failed password for root from 222.186.180.41 port 7240 ssh2
2019-12-07T09:03:12.921279scmdmz1 sshd\[13687\]: Failed password for root from 222.186.180.41 port 7240 ssh2
...
2019-12-07 16:10:51
140.143.206.106 attackspam
Dec  4 15:12:05 xxx sshd[25597]: Failed password for r.r from 140.143.206.106 port 60994 ssh2
Dec  4 15:12:05 xxx sshd[25597]: Received disconnect from 140.143.206.106 port 60994:11: Bye Bye [preauth]
Dec  4 15:12:05 xxx sshd[25597]: Disconnected from 140.143.206.106 port 60994 [preauth]
Dec  4 15:35:21 xxx sshd[29853]: Connection closed by 140.143.206.106 port 46546 [preauth]
Dec  4 15:42:01 xxx sshd[31813]: Failed password for r.r from 140.143.206.106 port 43214 ssh2
Dec  4 15:42:01 xxx sshd[31813]: Received disconnect from 140.143.206.106 port 43214:11: Bye Bye [preauth]
Dec  4 15:42:01 xxx sshd[31813]: Disconnected from 140.143.206.106 port 43214 [preauth]
Dec  4 15:49:35 xxx sshd[467]: Invalid user guest from 140.143.206.106 port 39846
Dec  4 15:49:35 xxx sshd[467]: Failed password for invalid user guest from 140.143.206.106 port 39846 ssh2
Dec  4 15:49:35 xxx sshd[467]: Received disconnect from 140.143.206.106 port 39846:11: Bye Bye [preauth]
Dec  4 15:49:35 xxx s........
-------------------------------
2019-12-07 15:56:02
207.154.218.16 attackspam
Dec  7 07:29:06 hell sshd[31008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.218.16
Dec  7 07:29:08 hell sshd[31008]: Failed password for invalid user teste from 207.154.218.16 port 51114 ssh2
...
2019-12-07 16:31:23
196.207.87.106 attackbotsspam
UTC: 2019-12-06 port: 554/tcp
2019-12-07 15:59:04
217.61.121.48 attackbots
Dec  7 08:31:06 cvbnet sshd[8576]: Failed password for uucp from 217.61.121.48 port 43454 ssh2
...
2019-12-07 16:10:07
75.190.98.206 attackspambots
Unauthorised access (Dec  7) SRC=75.190.98.206 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=61440 TCP DPT=1433 WINDOW=1024 SYN 
Unauthorised access (Dec  6) SRC=75.190.98.206 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=37558 TCP DPT=1433 WINDOW=1024 SYN
2019-12-07 16:18:08
194.204.236.164 attackspam
Dec  7 06:54:25 mail sshd[15985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.236.164  user=root
Dec  7 06:54:27 mail sshd[15985]: Failed password for root from 194.204.236.164 port 44665 ssh2
Dec  7 07:29:27 mail sshd[5967]: Invalid user plain from 194.204.236.164
Dec  7 07:29:27 mail sshd[5967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.236.164
Dec  7 07:29:27 mail sshd[5967]: Invalid user plain from 194.204.236.164
Dec  7 07:29:29 mail sshd[5967]: Failed password for invalid user plain from 194.204.236.164 port 33311 ssh2
...
2019-12-07 16:09:53
83.202.112.2 attack
Dec  7 07:29:32 mail1 sshd\[17041\]: Invalid user pi from 83.202.112.2 port 37626
Dec  7 07:29:32 mail1 sshd\[17042\]: Invalid user pi from 83.202.112.2 port 37630
Dec  7 07:29:32 mail1 sshd\[17041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.202.112.2
Dec  7 07:29:32 mail1 sshd\[17042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.202.112.2
Dec  7 07:29:34 mail1 sshd\[17041\]: Failed password for invalid user pi from 83.202.112.2 port 37626 ssh2
...
2019-12-07 16:00:34
87.147.106.18 attackbotsspam
Dec  7 09:06:28 vps691689 sshd[10815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.147.106.18
Dec  7 09:06:30 vps691689 sshd[10815]: Failed password for invalid user matt from 87.147.106.18 port 40716 ssh2
Dec  7 09:12:17 vps691689 sshd[10984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.147.106.18
...
2019-12-07 16:20:37
49.88.112.60 attack
Dec  7 08:09:31 pi sshd\[13333\]: Failed password for root from 49.88.112.60 port 30769 ssh2
Dec  7 08:10:25 pi sshd\[13429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60  user=root
Dec  7 08:10:28 pi sshd\[13429\]: Failed password for root from 49.88.112.60 port 12884 ssh2
Dec  7 08:10:30 pi sshd\[13429\]: Failed password for root from 49.88.112.60 port 12884 ssh2
Dec  7 08:10:32 pi sshd\[13429\]: Failed password for root from 49.88.112.60 port 12884 ssh2
...
2019-12-07 16:13:29
188.166.232.14 attackspam
Dec  7 12:45:32 gw1 sshd[7672]: Failed password for mail from 188.166.232.14 port 56318 ssh2
Dec  7 12:51:52 gw1 sshd[7975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.14
...
2019-12-07 16:17:05
103.27.238.202 attack
Invalid user souder from 103.27.238.202 port 42030
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202
Failed password for invalid user souder from 103.27.238.202 port 42030 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202  user=root
Failed password for root from 103.27.238.202 port 50612 ssh2
2019-12-07 16:30:27

最近上报的IP列表

139.59.91.189 139.59.91.191 139.59.91.251 139.59.91.40
118.254.203.139 139.59.90.52 139.59.92.175 139.59.92.141
139.59.92.154 139.59.92.182 139.59.92.189 139.59.92.116
139.59.92.152 139.59.92.148 139.59.92.202 118.254.203.143
139.59.92.181 139.59.93.12 139.59.92.63 139.59.94.164