必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sydney

省份(region): New South Wales

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): OVH SAS

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.99.221.61 attack
$f2bV_matches
2020-02-12 00:54:56
139.99.221.61 attack
Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J]
2020-02-06 16:49:17
139.99.221.61 attackbots
Feb  2 05:58:33 haigwepa sshd[21028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 
Feb  2 05:58:36 haigwepa sshd[21028]: Failed password for invalid user upload from 139.99.221.61 port 37437 ssh2
...
2020-02-02 13:10:17
139.99.221.61 attack
Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J]
2020-01-26 15:13:09
139.99.221.61 attackspambots
Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J]
2020-01-17 21:10:34
139.99.221.61 attack
$f2bV_matches
2020-01-11 23:46:20
139.99.221.61 attackbotsspam
Invalid user tomek from 139.99.221.61 port 57996
2020-01-10 22:30:27
139.99.221.61 attack
Dec 31 03:27:37 ws19vmsma01 sshd[147604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Dec 31 03:27:39 ws19vmsma01 sshd[147604]: Failed password for invalid user liaan from 139.99.221.61 port 35512 ssh2
...
2019-12-31 16:00:05
139.99.221.61 attack
Dec  4 15:46:10 Ubuntu-1404-trusty-64-minimal sshd\[22367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61  user=root
Dec  4 15:46:12 Ubuntu-1404-trusty-64-minimal sshd\[22367\]: Failed password for root from 139.99.221.61 port 37864 ssh2
Dec  4 15:57:05 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: Invalid user admin from 139.99.221.61
Dec  4 15:57:05 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Dec  4 15:57:07 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: Failed password for invalid user admin from 139.99.221.61 port 51553 ssh2
2019-12-04 23:20:56
139.99.221.61 attackbots
Nov 29 09:12:50 OPSO sshd\[6006\]: Invalid user dwlee200 from 139.99.221.61 port 52802
Nov 29 09:12:50 OPSO sshd\[6006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Nov 29 09:12:52 OPSO sshd\[6006\]: Failed password for invalid user dwlee200 from 139.99.221.61 port 52802 ssh2
Nov 29 09:16:52 OPSO sshd\[6662\]: Invalid user minella from 139.99.221.61 port 43209
Nov 29 09:16:52 OPSO sshd\[6662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
2019-11-29 16:58:50
139.99.221.61 attack
2019-11-26T22:57:20.361407abusebot-7.cloudsearch.cf sshd\[24597\]: Invalid user creation from 139.99.221.61 port 44649
2019-11-27 07:05:52
139.99.221.61 attack
Nov 23 16:46:03 server sshd\[23466\]: User root from 139.99.221.61 not allowed because listed in DenyUsers
Nov 23 16:46:03 server sshd\[23466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61  user=root
Nov 23 16:46:04 server sshd\[23466\]: Failed password for invalid user root from 139.99.221.61 port 52611 ssh2
Nov 23 16:50:24 server sshd\[2950\]: User root from 139.99.221.61 not allowed because listed in DenyUsers
Nov 23 16:50:24 server sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61  user=root
2019-11-23 23:01:16
139.99.221.61 attackbots
$f2bV_matches
2019-11-16 17:03:13
139.99.221.61 attack
Nov 13 13:44:00 herz-der-gamer sshd[29216]: Invalid user nfs from 139.99.221.61 port 38126
Nov 13 13:44:00 herz-der-gamer sshd[29216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
Nov 13 13:44:00 herz-der-gamer sshd[29216]: Invalid user nfs from 139.99.221.61 port 38126
Nov 13 13:44:02 herz-der-gamer sshd[29216]: Failed password for invalid user nfs from 139.99.221.61 port 38126 ssh2
...
2019-11-13 22:43:42
139.99.221.61 attackbots
Oct  9 05:56:50 host sshd\[26301\]: Invalid user 3edcxsw21qaz from 139.99.221.61 port 44388
Oct  9 05:56:50 host sshd\[26301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61
...
2019-10-09 13:06:51
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.221.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64059
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.221.87.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019053100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 00:34:38 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
87.221.99.139.in-addr.arpa domain name pointer ip-139-99-221.eu.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
87.221.99.139.in-addr.arpa	name = ip-139-99-221.eu.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.78.110.128 attackbotsspam
irt: IRT-UNIVERSITYOFSYDNEY-AU
IP: 129.78.110.128 Hostname: maya.cs.usyd.edu.au
Human/Bot: Bot
Mozilla/5.0 zgrab/0.x
2020-09-06 03:34:11
61.216.140.180 attackbotsspam
Unauthorized connection attempt from IP address 61.216.140.180 on Port 445(SMB)
2020-09-06 03:35:06
185.165.169.168 attack
2020-09-05T14:51:01+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-09-06 03:30:55
219.109.231.159 attackbots
Unauthorized connection attempt from IP address 219.109.231.159 on Port 445(SMB)
2020-09-06 03:02:11
190.85.93.210 attackbotsspam
Unauthorized connection attempt from IP address 190.85.93.210 on Port 445(SMB)
2020-09-06 03:21:55
106.51.78.105 attackspam
Sep  5 20:58:47 buvik sshd[21941]: Failed password for root from 106.51.78.105 port 24801 ssh2
Sep  5 21:00:58 buvik sshd[22749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.105  user=root
Sep  5 21:01:00 buvik sshd[22749]: Failed password for root from 106.51.78.105 port 31668 ssh2
...
2020-09-06 03:16:10
180.149.126.48 attack
 TCP (SYN) 180.149.126.48:46343 -> port 8080, len 44
2020-09-06 02:57:30
51.77.223.133 attack
SSH Brute Force
2020-09-06 03:14:32
192.241.220.50 attackbotsspam
TCP ports : 5672 / 29015
2020-09-06 03:14:48
200.125.216.223 attackbots
Unauthorized connection attempt from IP address 200.125.216.223 on Port 445(SMB)
2020-09-06 03:30:32
165.227.101.226 attackbots
Sep  5 20:49:01 eventyay sshd[19903]: Failed password for root from 165.227.101.226 port 44974 ssh2
Sep  5 20:53:03 eventyay sshd[20104]: Failed password for root from 165.227.101.226 port 52424 ssh2
...
2020-09-06 03:08:01
167.99.1.98 attackbots
Sep  6 00:19:10 localhost sshd[765127]: Connection closed by 167.99.1.98 port 37682 [preauth]
...
2020-09-06 03:13:04
201.234.56.238 attackbotsspam
Unauthorized connection attempt from IP address 201.234.56.238 on Port 445(SMB)
2020-09-06 03:19:26
157.42.123.82 attack
157.42.123.82 - - [04/Sep/2020:18:46:03 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36"
157.42.123.82 - - [04/Sep/2020:18:46:07 +0200] "POST /wordpress/xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36"
...
2020-09-06 03:00:58
179.1.76.219 attackbots
 TCP (SYN) 179.1.76.219:62844 -> port 445, len 52
2020-09-06 02:57:42

最近上报的IP列表

4.31.251.63 221.209.62.232 103.28.161.125 83.159.162.26
200.241.50.230 21.183.103.90 212.20.41.132 32.107.194.99
32.101.111.181 72.202.0.54 165.131.54.12 113.67.157.137
114.34.75.88 109.248.62.231 169.197.108.188 62.210.77.158
213.47.155.107 185.234.219.85 89.248.172.101 29.55.32.97