必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): OVH Singapore Pte. Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
 TCP (SYN) 139.99.125.231:50637 -> port 22, len 48
2020-09-01 19:04:17
相同子网IP讨论:
IP 类型 评论内容 时间
139.99.125.58 attackspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=10001  .  dstport=32936  .     (1089)
2020-09-17 19:04:12
139.99.125.230 attack
 TCP (SYN) 139.99.125.230:51409 -> port 22, len 48
2020-09-01 21:06:56
139.99.125.230 attack
SmallBizIT.US 1 packets to tcp(22)
2020-09-01 18:25:28
139.99.125.230 attackspambots
2020-08-31T19:25:50.598331abusebot-2.cloudsearch.cf sshd[11620]: Invalid user ubnt from 139.99.125.230 port 59752
2020-08-31T19:25:50.645193abusebot-2.cloudsearch.cf sshd[11622]: Invalid user admin from 139.99.125.230 port 35698
2020-08-31T19:25:50.647160abusebot-2.cloudsearch.cf sshd[11626]: Invalid user 1234 from 139.99.125.230 port 43918
2020-08-31T19:25:51.722996abusebot-2.cloudsearch.cf sshd[11628]: Invalid user usuario from 139.99.125.230 port 49656
...
2020-09-01 03:42:24
139.99.125.84 attackspambots
Port probing on unauthorized port 22
2020-08-29 02:11:39
139.99.125.86 attack
Attempted connection to port 64129.
2020-08-24 21:24:56
139.99.125.191 attackspam
139.99.125.191 was recorded 6 times by 4 hosts attempting to connect to the following ports: 26014,50570,39019,51856. Incident counter (4h, 24h, all-time): 6, 31, 1174
2020-04-28 21:33:58
139.99.125.191 attackbotsspam
139.99.125.191 was recorded 11 times by 7 hosts attempting to connect to the following ports: 26014,51856,39019,20269,50570,60429. Incident counter (4h, 24h, all-time): 11, 19, 1146
2020-04-27 23:12:32
139.99.125.191 attack
139.99.125.191 was recorded 28 times by 9 hosts attempting to connect to the following ports: 50570,51856,39019,54434,56610,52084,20269,60429,51142. Incident counter (4h, 24h, all-time): 28, 86, 1123
2020-04-25 21:06:30
139.99.125.191 attack
Port 27034 scan denied
2020-03-28 19:23:50
139.99.125.191 attackbots
139.99.125.191 was recorded 13 times by 8 hosts attempting to connect to the following ports: 39019,54434,20269,51856,56610,52084,60429,51142. Incident counter (4h, 24h, all-time): 13, 112, 855
2020-03-28 06:26:16
139.99.125.191 attackbotsspam
139.99.125.191 was recorded 8 times by 5 hosts attempting to connect to the following ports: 60429,54434,50570,52084,51142. Incident counter (4h, 24h, all-time): 8, 116, 846
2020-03-28 04:19:40
139.99.125.191 attackspam
probes 16 times on the port 34928 59003 62781
2020-03-27 18:25:06
139.99.125.191 attackspambots
139.99.125.191 was recorded 20 times by 9 hosts attempting to connect to the following ports: 51856,39019,50570,52084,54434,56610,51142,60429,26014. Incident counter (4h, 24h, all-time): 20, 82, 683
2020-03-26 16:58:49
139.99.125.191 attack
139.99.125.191 was recorded 20 times by 6 hosts attempting to connect to the following ports: 54434,56610,51142,51856,50570,60429. Incident counter (4h, 24h, all-time): 20, 96, 592
2020-03-25 14:04:47
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.125.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.125.231.			IN	A

;; AUTHORITY SECTION:
.			362	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 01 19:04:12 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
231.125.99.139.in-addr.arpa domain name pointer ns5000490.ip-139-99-125.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
231.125.99.139.in-addr.arpa	name = ns5000490.ip-139-99-125.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
144.22.108.33 attackspam
leo_www
2020-03-28 04:54:54
61.182.232.38 attack
2020-03-27T19:52:50.657019ionos.janbro.de sshd[1725]: Invalid user pmn from 61.182.232.38 port 46262
2020-03-27T19:52:52.952150ionos.janbro.de sshd[1725]: Failed password for invalid user pmn from 61.182.232.38 port 46262 ssh2
2020-03-27T19:54:47.263895ionos.janbro.de sshd[1748]: Invalid user bdy from 61.182.232.38 port 51112
2020-03-27T19:54:47.424071ionos.janbro.de sshd[1748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.182.232.38
2020-03-27T19:54:47.263895ionos.janbro.de sshd[1748]: Invalid user bdy from 61.182.232.38 port 51112
2020-03-27T19:54:49.302566ionos.janbro.de sshd[1748]: Failed password for invalid user bdy from 61.182.232.38 port 51112 ssh2
2020-03-27T19:56:41.531369ionos.janbro.de sshd[1764]: Invalid user urr from 61.182.232.38 port 55958
2020-03-27T19:56:41.842579ionos.janbro.de sshd[1764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.182.232.38
2020-03-27T19:56:41.531369ionos.
...
2020-03-28 04:34:36
106.13.25.179 attack
Mar 27 15:08:58 localhost sshd[18805]: Invalid user keitaro from 106.13.25.179 port 15558
...
2020-03-28 04:25:51
140.143.247.30 attack
Invalid user simran from 140.143.247.30 port 48530
2020-03-28 04:21:31
162.241.226.175 attack
GET /blog/
2020-03-28 04:52:55
146.164.36.75 attackspam
SSH login attempts.
2020-03-28 04:46:47
104.236.33.155 attackspambots
(sshd) Failed SSH login from 104.236.33.155 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 19:56:58 amsweb01 sshd[5632]: Invalid user maricaxx from 104.236.33.155 port 59634
Mar 27 19:57:00 amsweb01 sshd[5632]: Failed password for invalid user maricaxx from 104.236.33.155 port 59634 ssh2
Mar 27 19:59:39 amsweb01 sshd[5842]: Invalid user tgq from 104.236.33.155 port 48458
Mar 27 19:59:41 amsweb01 sshd[5842]: Failed password for invalid user tgq from 104.236.33.155 port 48458 ssh2
Mar 27 20:00:59 amsweb01 sshd[6022]: Invalid user hut from 104.236.33.155 port 37116
2020-03-28 04:20:38
78.187.207.184 attackspambots
Unauthorized connection attempt detected from IP address 78.187.207.184 to port 445
2020-03-28 04:51:00
113.11.255.28 attackbots
Mar 27 13:57:01 124388 sshd[22078]: Invalid user xkh from 113.11.255.28 port 41039
Mar 27 13:57:01 124388 sshd[22078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.11.255.28
Mar 27 13:57:01 124388 sshd[22078]: Invalid user xkh from 113.11.255.28 port 41039
Mar 27 13:57:03 124388 sshd[22078]: Failed password for invalid user xkh from 113.11.255.28 port 41039 ssh2
Mar 27 14:01:06 124388 sshd[22109]: Invalid user flj from 113.11.255.28 port 46644
2020-03-28 04:32:17
104.227.139.186 attack
Mar 27 16:00:19 vps sshd[944339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.227.139.186
Mar 27 16:00:21 vps sshd[944339]: Failed password for invalid user hlds from 104.227.139.186 port 49264 ssh2
Mar 27 16:03:49 vps sshd[961505]: Invalid user xjz from 104.227.139.186 port 33940
Mar 27 16:03:49 vps sshd[961505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.227.139.186
Mar 27 16:03:50 vps sshd[961505]: Failed password for invalid user xjz from 104.227.139.186 port 33940 ssh2
...
2020-03-28 04:30:44
167.71.223.51 attackspam
Mar 27 20:50:26 MainVPS sshd[12167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.223.51  user=mail
Mar 27 20:50:28 MainVPS sshd[12167]: Failed password for mail from 167.71.223.51 port 35422 ssh2
Mar 27 20:59:49 MainVPS sshd[30437]: Invalid user zde from 167.71.223.51 port 50132
Mar 27 20:59:49 MainVPS sshd[30437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.223.51
Mar 27 20:59:49 MainVPS sshd[30437]: Invalid user zde from 167.71.223.51 port 50132
Mar 27 20:59:51 MainVPS sshd[30437]: Failed password for invalid user zde from 167.71.223.51 port 50132 ssh2
...
2020-03-28 04:24:03
138.68.67.173 attack
Mar 27 13:28:56 debian-2gb-nbg1-2 kernel: \[7571207.392477\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.68.67.173 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=44795 PROTO=TCP SPT=52329 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-28 04:31:50
197.60.83.139 attackspambots
SSH login attempts.
2020-03-28 04:38:33
104.236.151.120 attackspam
Mar 27 18:54:07 sso sshd[22873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.151.120
Mar 27 18:54:08 sso sshd[22873]: Failed password for invalid user wiltshire from 104.236.151.120 port 43117 ssh2
...
2020-03-28 04:26:06
45.225.216.80 attackbots
Mar 27 18:16:06 * sshd[23112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.216.80
Mar 27 18:16:07 * sshd[23112]: Failed password for invalid user igp from 45.225.216.80 port 40884 ssh2
2020-03-28 04:42:36

最近上报的IP列表

177.73.47.23 60.191.217.110 58.69.61.165 27.72.168.7
103.176.182.158 38.66.202.231 136.181.146.142 211.57.144.121
213.212.243.106 144.77.37.29 200.146.254.116 126.194.62.17
3.221.174.215 171.86.142.58 58.16.106.201 103.124.153.36
61.201.20.76 37.176.169.213 53.79.234.88 181.112.192.207