必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.99.62.85 attack
Automatic report - Banned IP Access
2020-10-08 05:44:40
139.99.62.85 attackspam
xmlrpc attack
2020-10-07 13:58:46
139.99.62.85 attackbots
139.99.62.85 - - [14/Dec/2019:10:38:28 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.62.85 - - [14/Dec/2019:10:38:29 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-14 22:44:26
139.99.62.85 attack
Automatic report - XMLRPC Attack
2019-12-08 20:08:45
139.99.62.10 attack
Sep 17 20:11:40 saschabauer sshd[24591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Sep 17 20:11:42 saschabauer sshd[24591]: Failed password for invalid user adda from 139.99.62.10 port 43454 ssh2
2019-09-18 02:20:35
139.99.62.10 attackspam
Sep 16 00:16:00 localhost sshd\[2743\]: Invalid user marco from 139.99.62.10 port 40548
Sep 16 00:16:00 localhost sshd\[2743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Sep 16 00:16:02 localhost sshd\[2743\]: Failed password for invalid user marco from 139.99.62.10 port 40548 ssh2
...
2019-09-16 08:47:25
139.99.62.10 attack
Sep 15 07:37:17 vps647732 sshd[14868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Sep 15 07:37:19 vps647732 sshd[14868]: Failed password for invalid user q2w3e4R from 139.99.62.10 port 51936 ssh2
...
2019-09-15 13:50:48
139.99.62.10 attackbotsspam
Sep 10 17:07:47 friendsofhawaii sshd\[27694\]: Invalid user student from 139.99.62.10
Sep 10 17:07:47 friendsofhawaii sshd\[27694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia
Sep 10 17:07:49 friendsofhawaii sshd\[27694\]: Failed password for invalid user student from 139.99.62.10 port 42312 ssh2
Sep 10 17:14:43 friendsofhawaii sshd\[28448\]: Invalid user q3server from 139.99.62.10
Sep 10 17:14:43 friendsofhawaii sshd\[28448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia
2019-09-11 11:17:28
139.99.62.10 attack
Sep  5 11:39:11 auw2 sshd\[26721\]: Invalid user oracle from 139.99.62.10
Sep  5 11:39:11 auw2 sshd\[26721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia
Sep  5 11:39:13 auw2 sshd\[26721\]: Failed password for invalid user oracle from 139.99.62.10 port 56602 ssh2
Sep  5 11:43:53 auw2 sshd\[27124\]: Invalid user smbuser from 139.99.62.10
Sep  5 11:43:53 auw2 sshd\[27124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia
2019-09-06 05:54:40
139.99.62.10 attackspambots
Sep  1 13:44:45 auw2 sshd\[12472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia  user=root
Sep  1 13:44:47 auw2 sshd\[12472\]: Failed password for root from 139.99.62.10 port 42604 ssh2
Sep  1 13:49:34 auw2 sshd\[12850\]: Invalid user duncan from 139.99.62.10
Sep  1 13:49:34 auw2 sshd\[12850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia
Sep  1 13:49:36 auw2 sshd\[12850\]: Failed password for invalid user duncan from 139.99.62.10 port 36740 ssh2
2019-09-02 11:06:55
139.99.62.10 attack
Aug 30 20:12:57 meumeu sshd[18937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10 
Aug 30 20:12:59 meumeu sshd[18937]: Failed password for invalid user qqq from 139.99.62.10 port 51166 ssh2
Aug 30 20:17:38 meumeu sshd[19498]: Failed password for root from 139.99.62.10 port 47666 ssh2
...
2019-08-31 02:35:10
139.99.62.10 attackspambots
Aug 25 00:49:13 root sshd[3077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10 
Aug 25 00:49:15 root sshd[3077]: Failed password for invalid user library from 139.99.62.10 port 44704 ssh2
Aug 25 00:53:43 root sshd[3142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10 
...
2019-08-25 07:15:07
139.99.62.10 attackspam
Aug 20 08:24:44 ns315508 sshd[28068]: Invalid user weblogic from 139.99.62.10 port 38434
Aug 20 08:24:44 ns315508 sshd[28068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Aug 20 08:24:44 ns315508 sshd[28068]: Invalid user weblogic from 139.99.62.10 port 38434
Aug 20 08:24:46 ns315508 sshd[28068]: Failed password for invalid user weblogic from 139.99.62.10 port 38434 ssh2
Aug 20 08:29:26 ns315508 sshd[28101]: Invalid user test2 from 139.99.62.10 port 37162
...
2019-08-20 16:39:03
139.99.62.10 attackspam
Aug 17 18:28:50 *** sshd[26078]: Failed password for invalid user student01 from 139.99.62.10 port 42818 ssh2
Aug 17 18:39:46 *** sshd[26271]: Failed password for invalid user yap from 139.99.62.10 port 45908 ssh2
Aug 17 18:44:33 *** sshd[26404]: Failed password for invalid user test from 139.99.62.10 port 35672 ssh2
Aug 17 18:49:17 *** sshd[26477]: Failed password for invalid user grey from 139.99.62.10 port 53674 ssh2
Aug 17 18:54:04 *** sshd[26539]: Failed password for invalid user nagios from 139.99.62.10 port 43430 ssh2
Aug 17 18:58:54 *** sshd[26607]: Failed password for invalid user shekhar from 139.99.62.10 port 33182 ssh2
Aug 17 19:03:46 *** sshd[26730]: Failed password for invalid user jp from 139.99.62.10 port 51172 ssh2
Aug 17 19:08:29 *** sshd[26829]: Failed password for invalid user nexus from 139.99.62.10 port 40952 ssh2
Aug 17 19:13:16 *** sshd[26955]: Failed password for invalid user wp-user from 139.99.62.10 port 58962 ssh2
Aug 17 19:27:54 *** sshd[27242]: Failed password for invalid user gh
2019-08-19 04:06:58
139.99.62.10 attackspam
Aug 17 21:57:43 marvibiene sshd[61609]: Invalid user zheng from 139.99.62.10 port 35648
Aug 17 21:57:43 marvibiene sshd[61609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Aug 17 21:57:43 marvibiene sshd[61609]: Invalid user zheng from 139.99.62.10 port 35648
Aug 17 21:57:44 marvibiene sshd[61609]: Failed password for invalid user zheng from 139.99.62.10 port 35648 ssh2
...
2019-08-18 09:52:41
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.62.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.62.78.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020120701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 08 01:58:23 CST 2020
;; MSG SIZE  rcvd: 116

HOST信息:
78.62.99.139.in-addr.arpa domain name pointer ns562744.ip-139-99-62.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.62.99.139.in-addr.arpa	name = ns562744.ip-139-99-62.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.148.19.153 attackspam
probes 6 times on the port 8080 8088 9200
2020-05-07 02:13:30
181.55.188.187 attackbotsspam
May  6 11:49:43 debian sshd[6319]: Unable to negotiate with 181.55.188.187 port 17672: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
May  6 12:54:43 debian sshd[9344]: Unable to negotiate with 181.55.188.187 port 17672: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-05-07 01:37:48
125.46.11.67 attackspambots
6381/tcp 6380/tcp 6378/tcp...
[2020-04-05/05-06]217pkt,4pt.(tcp)
2020-05-07 02:13:08
185.216.140.252 attackspambots
05/06/2020-13:25:56.170847 185.216.140.252 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-07 02:02:33
195.54.160.12 attackbots
scans 3 times in preceeding hours on the ports (in chronological order) 20657 14631 38104
2020-05-07 01:46:26
185.209.0.26 attackbotsspam
4835/tcp 4285/tcp 4570/tcp...
[2020-04-28/05-06]344pkt,273pt.(tcp)
2020-05-07 01:47:35
185.200.118.49 attackbots
scans once in preceeding hours on the ports (in chronological order) 1080 resulting in total of 5 scans from 185.200.118.0/24 block.
2020-05-07 02:05:06
172.104.124.229 attackbots
scans once in preceeding hours on the ports (in chronological order) 8888 resulting in total of 4 scans from 172.104.0.0/15 block.
2020-05-07 02:11:25
185.175.93.104 attack
05/06/2020-13:33:21.358635 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-07 02:05:54
185.216.140.185 attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 44899 44899 resulting in total of 11 scans from 185.216.140.0/24 block.
2020-05-07 02:02:54
185.143.223.244 attackbotsspam
port
2020-05-07 01:50:08
185.143.223.252 attackbotsspam
scans 28 times in preceeding hours on the ports (in chronological order) 3457 8001 9020 3334 18215 8081 8100 8083 3319 3339 5001 3349 3734 3600 33891 4000 3322 8209 6114 7777 2049 3335 3457 9401 3379 8964 3269 3334
2020-05-07 01:49:39
172.104.116.36 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 2121 resulting in total of 4 scans from 172.104.0.0/15 block.
2020-05-07 02:11:38
185.153.198.240 attackbotsspam
firewall-block, port(s): 34075/tcp
2020-05-07 02:09:09
198.20.70.114 attackspambots
Unauthorized connection attempt detected from IP address 198.20.70.114 to port 5601
2020-05-07 01:44:27

最近上报的IP列表

80.211.78.235 114.35.218.4 143.0.69.219 149.129.131.134
1.210.132.90 149.200.73.252 162.83.234.200 168.195.135.46
169.255.125.8 98.208.79.150 111.207.147.9 178.215.163.152
164.68.118.147 37.43.205.223 116.206.31.241 182.254.240.2
178.46.165.142 85.113.214.226 193.239.147.164 85.174.192.209