必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.99.125.58 attackspam
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=10001  .  dstport=32936  .     (1089)
2020-09-17 19:04:12
139.99.125.230 attack
 TCP (SYN) 139.99.125.230:51409 -> port 22, len 48
2020-09-01 21:06:56
139.99.125.231 attackspambots
 TCP (SYN) 139.99.125.231:50637 -> port 22, len 48
2020-09-01 19:04:17
139.99.125.230 attack
SmallBizIT.US 1 packets to tcp(22)
2020-09-01 18:25:28
139.99.125.230 attackspambots
2020-08-31T19:25:50.598331abusebot-2.cloudsearch.cf sshd[11620]: Invalid user ubnt from 139.99.125.230 port 59752
2020-08-31T19:25:50.645193abusebot-2.cloudsearch.cf sshd[11622]: Invalid user admin from 139.99.125.230 port 35698
2020-08-31T19:25:50.647160abusebot-2.cloudsearch.cf sshd[11626]: Invalid user 1234 from 139.99.125.230 port 43918
2020-08-31T19:25:51.722996abusebot-2.cloudsearch.cf sshd[11628]: Invalid user usuario from 139.99.125.230 port 49656
...
2020-09-01 03:42:24
139.99.125.84 attackspambots
Port probing on unauthorized port 22
2020-08-29 02:11:39
139.99.125.86 attack
Attempted connection to port 64129.
2020-08-24 21:24:56
139.99.125.191 attackspam
139.99.125.191 was recorded 6 times by 4 hosts attempting to connect to the following ports: 26014,50570,39019,51856. Incident counter (4h, 24h, all-time): 6, 31, 1174
2020-04-28 21:33:58
139.99.125.191 attackbotsspam
139.99.125.191 was recorded 11 times by 7 hosts attempting to connect to the following ports: 26014,51856,39019,20269,50570,60429. Incident counter (4h, 24h, all-time): 11, 19, 1146
2020-04-27 23:12:32
139.99.125.191 attack
139.99.125.191 was recorded 28 times by 9 hosts attempting to connect to the following ports: 50570,51856,39019,54434,56610,52084,20269,60429,51142. Incident counter (4h, 24h, all-time): 28, 86, 1123
2020-04-25 21:06:30
139.99.125.191 attack
Port 27034 scan denied
2020-03-28 19:23:50
139.99.125.191 attackbots
139.99.125.191 was recorded 13 times by 8 hosts attempting to connect to the following ports: 39019,54434,20269,51856,56610,52084,60429,51142. Incident counter (4h, 24h, all-time): 13, 112, 855
2020-03-28 06:26:16
139.99.125.191 attackbotsspam
139.99.125.191 was recorded 8 times by 5 hosts attempting to connect to the following ports: 60429,54434,50570,52084,51142. Incident counter (4h, 24h, all-time): 8, 116, 846
2020-03-28 04:19:40
139.99.125.191 attackspam
probes 16 times on the port 34928 59003 62781
2020-03-27 18:25:06
139.99.125.191 attackspambots
139.99.125.191 was recorded 20 times by 9 hosts attempting to connect to the following ports: 51856,39019,50570,52084,54434,56610,51142,60429,26014. Incident counter (4h, 24h, all-time): 20, 82, 683
2020-03-26 16:58:49
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.125.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.99.125.35.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021091600 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 17 00:59:44 CST 2021
;; MSG SIZE  rcvd: 106
HOST信息:
35.125.99.139.in-addr.arpa domain name pointer ns564773.ip-139-99-125.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
35.125.99.139.in-addr.arpa	name = ns564773.ip-139-99-125.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.32.94.87 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54363a9cfd11b1e0 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: d.skk.moe | User-Agent: Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14 | CF_DC: HKG. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:34:13
210.0.159.10 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 543787fb8930ddc3 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: HK | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 13_2_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.3 Mobile/15E148 Safari/604.1 | CF_DC: SIN. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:45:56
111.206.221.29 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5435b85c7f7ed396 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: whitelist | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:35:06
116.52.207.181 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 54315a670fbde516 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/4.066686748 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:57:42
119.39.47.72 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5434eed2fd3b9394 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:56:46
27.211.182.100 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54337db33da6e7e1 | WAF_Rule_ID: 1122843 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:42:39
45.32.103.245 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5436d7a28fc6da00 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: SG | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.3 Safari/605.1.15 | CF_DC: SIN. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 04:07:40
59.173.154.176 attack
The IP has triggered Cloudflare WAF. CF-Ray: 543046f05e4fe7ed | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 04:05:50
110.177.77.62 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5437dca35f8078f0 | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: clash.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 04:01:19
106.11.157.121 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 543446d0e963791c | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 04:04:30
128.1.231.46 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5435466c2eb6c3b3 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: SG | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.3 Safari/605.1.15 | CF_DC: SIN. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:51:37
49.7.4.125 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54315244eedcd386 | WAF_Rule_ID: asn | WAF_Kind: firewall | CF_Action: jschallenge | Country: CN | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 9; zh-CN; GLK-AL00 Build/HUAWEIGLK-AL00) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/57.0.2987.108 UCBrowser/12.7.1.1051 Mobile Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:40:07
52.175.49.154 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54356ee08e9cd94a | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: HK | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: lab.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 | CF_DC: HKG. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 04:06:25
113.120.10.204 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 543688df2f26d366 | WAF_Rule_ID: 1122843 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: doku.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:33:17
111.175.56.221 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 54363c3f1a81eb75 | WAF_Rule_ID: 1122843 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqusjs.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:35:32

最近上报的IP列表

195.133.40.107 158.101.196.120 216.58.223.100 201.159.8.21
201.159.8.154 201.159.8.164 91.218.247.218 158.69.162.121
203.96.243.41 147.135.252.16 167.172.212.111 115.77.120.91
31.210.20.233 31.210.22.233 31.210.24.233 91.132.197.27
198.54.124.143 115.186.189.58 119.160.65.20 11.90.150.137