必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
14.139.120.141 attack
Nov 28 18:37:31 kmh-wsh-001-nbg03 sshd[5224]: Invalid user my from 14.139.120.141 port 58868
Nov 28 18:37:31 kmh-wsh-001-nbg03 sshd[5224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.141
Nov 28 18:37:33 kmh-wsh-001-nbg03 sshd[5224]: Failed password for invalid user my from 14.139.120.141 port 58868 ssh2
Nov 28 18:37:33 kmh-wsh-001-nbg03 sshd[5224]: Received disconnect from 14.139.120.141 port 58868:11: Bye Bye [preauth]
Nov 28 18:37:33 kmh-wsh-001-nbg03 sshd[5224]: Disconnected from 14.139.120.141 port 58868 [preauth]
Nov 28 18:53:36 kmh-wsh-001-nbg03 sshd[5951]: Invalid user vserver from 14.139.120.141 port 55722
Nov 28 18:53:36 kmh-wsh-001-nbg03 sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.141
Nov 28 18:53:38 kmh-wsh-001-nbg03 sshd[5951]: Failed password for invalid user vserver from 14.139.120.141 port 55722 ssh2
Nov 28 18:53:38 kmh-wsh-001-nbg03 s........
-------------------------------
2019-12-01 00:48:43
14.139.120.141 attack
Nov 29 18:07:28 server sshd\[32506\]: Invalid user fang from 14.139.120.141
Nov 29 18:07:28 server sshd\[32506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.141 
Nov 29 18:07:30 server sshd\[32506\]: Failed password for invalid user fang from 14.139.120.141 port 35818 ssh2
Nov 29 18:11:44 server sshd\[1165\]: Invalid user test from 14.139.120.141
Nov 29 18:11:44 server sshd\[1165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.141 
...
2019-11-30 01:30:54
14.139.120.78 attackspam
Nov 13 01:46:53 ArkNodeAT sshd\[11233\]: Invalid user tunon from 14.139.120.78
Nov 13 01:46:53 ArkNodeAT sshd\[11233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
Nov 13 01:46:55 ArkNodeAT sshd\[11233\]: Failed password for invalid user tunon from 14.139.120.78 port 55184 ssh2
2019-11-13 09:06:33
14.139.120.78 attackspam
Nov 10 23:39:17 vps666546 sshd\[17002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78  user=root
Nov 10 23:39:19 vps666546 sshd\[17002\]: Failed password for root from 14.139.120.78 port 38604 ssh2
Nov 10 23:43:36 vps666546 sshd\[17186\]: Invalid user feechan from 14.139.120.78 port 47390
Nov 10 23:43:36 vps666546 sshd\[17186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
Nov 10 23:43:38 vps666546 sshd\[17186\]: Failed password for invalid user feechan from 14.139.120.78 port 47390 ssh2
...
2019-11-11 07:41:03
14.139.120.78 attackspambots
Oct 24 06:58:17 cvbnet sshd[16559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78 
Oct 24 06:58:19 cvbnet sshd[16559]: Failed password for invalid user 1qazse456 from 14.139.120.78 port 57472 ssh2
...
2019-10-24 13:03:37
14.139.120.78 attack
Oct 19 10:23:32 cvbnet sshd[6254]: Failed password for root from 14.139.120.78 port 56478 ssh2
...
2019-10-19 17:10:51
14.139.120.78 attackspam
Oct 16 09:21:01 legacy sshd[9416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
Oct 16 09:21:02 legacy sshd[9416]: Failed password for invalid user asdfg!@#$% from 14.139.120.78 port 58240 ssh2
Oct 16 09:26:06 legacy sshd[9482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
...
2019-10-16 16:06:44
14.139.120.78 attackbotsspam
Sep 22 18:12:59 wbs sshd\[25121\]: Invalid user gun from 14.139.120.78
Sep 22 18:12:59 wbs sshd\[25121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
Sep 22 18:13:01 wbs sshd\[25121\]: Failed password for invalid user gun from 14.139.120.78 port 37216 ssh2
Sep 22 18:18:02 wbs sshd\[25579\]: Invalid user Administrator from 14.139.120.78
Sep 22 18:18:02 wbs sshd\[25579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
2019-09-23 12:31:00
14.139.120.78 attackspam
2019-09-21T06:21:56.201563game.arvenenaske.de sshd[45693]: Invalid user pluto from 14.139.120.78 port 54936
2019-09-21T06:21:56.210391game.arvenenaske.de sshd[45693]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78 user=pluto
2019-09-21T06:21:56.211339game.arvenenaske.de sshd[45693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78
2019-09-21T06:21:56.201563game.arvenenaske.de sshd[45693]: Invalid user pluto from 14.139.120.78 port 54936
2019-09-21T06:21:58.102556game.arvenenaske.de sshd[45693]: Failed password for invalid user pluto from 14.139.120.78 port 54936 ssh2
2019-09-21T06:26:28.513978game.arvenenaske.de sshd[45700]: Invalid user marilena from 14.139.120.78 port 42922
2019-09-21T06:26:28.519759game.arvenenaske.de sshd[45700]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.78 user=marilena
2019-09-21T06:26:28........
------------------------------
2019-09-22 21:21:16
14.139.120.51 attack
Mar  4 23:37:39 motanud sshd\[23621\]: Invalid user mokua from 14.139.120.51 port 37230
Mar  4 23:37:39 motanud sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.51
Mar  4 23:37:41 motanud sshd\[23621\]: Failed password for invalid user mokua from 14.139.120.51 port 37230 ssh2
2019-08-10 21:10:05
14.139.120.70 attackbotsspam
Aug  1 08:43:32 server sshd\[32211\]: Invalid user test from 14.139.120.70 port 41146
Aug  1 08:43:32 server sshd\[32211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.70
Aug  1 08:43:34 server sshd\[32211\]: Failed password for invalid user test from 14.139.120.70 port 41146 ssh2
Aug  1 08:48:37 server sshd\[18043\]: User root from 14.139.120.70 not allowed because listed in DenyUsers
Aug  1 08:48:37 server sshd\[18043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.70  user=root
2019-08-01 13:49:12
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.139.120.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.139.120.238.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:35:20 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 238.120.139.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.120.139.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.11.133.178 attack
Port probing on unauthorized port 8080
2020-06-14 01:17:30
212.116.102.246 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-14 00:48:08
203.56.24.180 attackbotsspam
2020-06-13T16:34:04.560685sd-86998 sshd[15772]: Invalid user ts3 from 203.56.24.180 port 54960
2020-06-13T16:34:04.566271sd-86998 sshd[15772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.56.24.180
2020-06-13T16:34:04.560685sd-86998 sshd[15772]: Invalid user ts3 from 203.56.24.180 port 54960
2020-06-13T16:34:07.147447sd-86998 sshd[15772]: Failed password for invalid user ts3 from 203.56.24.180 port 54960 ssh2
2020-06-13T16:37:56.965414sd-86998 sshd[16127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.56.24.180  user=root
2020-06-13T16:37:58.730970sd-86998 sshd[16127]: Failed password for root from 203.56.24.180 port 37908 ssh2
...
2020-06-14 00:46:28
195.181.168.170 attack
(From eduardo.mcchesney@googlemail.com) Let us help your business thrive with our Virtual Business phone system. Including video, text to and from landline, conference bridge, and off premise cell phone application. Creating virtual office access for your team. Deploy your office from anywhere. Fully managed by OUR team and you can keep your existing phone numbers.
- We also assist with Signs, printing and office supplies including toner and printers. We can print decals, t shirts, hats and business cards.
- Everything to keep your business running and growing !
517.657.4020
TTG
https://bit.ly/trivatechgroup
2020-06-14 01:00:40
125.124.147.117 attackbotsspam
DATE:2020-06-13 18:16:00, IP:125.124.147.117, PORT:ssh SSH brute force auth (docker-dc)
2020-06-14 01:08:59
51.38.236.221 attack
Jun 13 16:38:40 minden010 sshd[27406]: Failed password for root from 51.38.236.221 port 55558 ssh2
Jun 13 16:44:20 minden010 sshd[29482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.236.221
Jun 13 16:44:22 minden010 sshd[29482]: Failed password for invalid user slujbot from 51.38.236.221 port 55040 ssh2
...
2020-06-14 00:34:28
141.98.81.208 attackspam
2020-06-13T03:52:38.126973homeassistant sshd[27187]: Failed password for invalid user Administrator from 141.98.81.208 port 9107 ssh2
2020-06-13T16:55:45.811788homeassistant sshd[12409]: Invalid user Administrator from 141.98.81.208 port 10559
...
2020-06-14 00:57:20
49.88.112.76 attack
Jun 13 13:27:12 firewall sshd[12101]: Failed password for root from 49.88.112.76 port 53204 ssh2
Jun 13 13:27:15 firewall sshd[12101]: Failed password for root from 49.88.112.76 port 53204 ssh2
Jun 13 13:27:17 firewall sshd[12101]: Failed password for root from 49.88.112.76 port 53204 ssh2
...
2020-06-14 01:09:28
159.89.180.30 attackbots
Jun 13 12:24:12 *** sshd[31235]: User root from 159.89.180.30 not allowed because not listed in AllowUsers
2020-06-14 00:49:37
94.191.14.213 attack
Invalid user mc2 from 94.191.14.213 port 60614
2020-06-14 01:18:13
37.49.224.27 attack
06/13/2020-13:00:54.502209 37.49.224.27 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-14 01:12:33
201.148.87.82 attackbots
2020-06-13T17:03:57.145109shield sshd\[28283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.barmex.com.mx  user=root
2020-06-13T17:03:58.982186shield sshd\[28283\]: Failed password for root from 201.148.87.82 port 1127 ssh2
2020-06-13T17:05:27.258105shield sshd\[28553\]: Invalid user zhengpinwen from 201.148.87.82 port 1993
2020-06-13T17:05:27.261789shield sshd\[28553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.barmex.com.mx
2020-06-13T17:05:29.799865shield sshd\[28553\]: Failed password for invalid user zhengpinwen from 201.148.87.82 port 1993 ssh2
2020-06-14 01:11:25
49.233.162.198 attack
Jun 13 18:36:34 h1745522 sshd[19700]: Invalid user zunwen from 49.233.162.198 port 36060
Jun 13 18:36:34 h1745522 sshd[19700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.162.198
Jun 13 18:36:34 h1745522 sshd[19700]: Invalid user zunwen from 49.233.162.198 port 36060
Jun 13 18:36:37 h1745522 sshd[19700]: Failed password for invalid user zunwen from 49.233.162.198 port 36060 ssh2
Jun 13 18:40:10 h1745522 sshd[19991]: Invalid user odoo from 49.233.162.198 port 47338
Jun 13 18:40:10 h1745522 sshd[19991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.162.198
Jun 13 18:40:10 h1745522 sshd[19991]: Invalid user odoo from 49.233.162.198 port 47338
Jun 13 18:40:12 h1745522 sshd[19991]: Failed password for invalid user odoo from 49.233.162.198 port 47338 ssh2
Jun 13 18:43:50 h1745522 sshd[20224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.162.198
...
2020-06-14 00:50:39
209.97.138.167 attack
Jun 13 17:22:56 mail sshd\[18581\]: Invalid user contec from 209.97.138.167
Jun 13 17:22:56 mail sshd\[18581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.138.167
Jun 13 17:22:57 mail sshd\[18581\]: Failed password for invalid user contec from 209.97.138.167 port 56702 ssh2
...
2020-06-14 00:34:07
216.166.173.70 attackbotsspam
Jun 12 21:01:32 vayu sshd[796216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.166.173.70  user=r.r
Jun 12 21:01:33 vayu sshd[796216]: Failed password for r.r from 216.166.173.70 port 41140 ssh2
Jun 12 21:01:33 vayu sshd[796216]: Received disconnect from 216.166.173.70: 11: Bye Bye [preauth]
Jun 12 21:16:16 vayu sshd[802009]: Invalid user cigare from 216.166.173.70
Jun 12 21:16:16 vayu sshd[802009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.166.173.70 
Jun 12 21:16:18 vayu sshd[802009]: Failed password for invalid user cigare from 216.166.173.70 port 17124 ssh2
Jun 12 21:16:19 vayu sshd[802009]: Received disconnect from 216.166.173.70: 11: Bye Bye [preauth]
Jun 12 21:20:07 vayu sshd[803550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.166.173.70  user=r.r
Jun 12 21:20:09 vayu sshd[803550]: Failed password for r.r from 216.166.........
-------------------------------
2020-06-14 00:50:18

最近上报的IP列表

182.138.137.82 197.254.60.222 183.220.49.247 177.173.116.183
23.108.43.138 156.200.206.181 188.81.211.243 151.247.19.254
47.109.48.160 91.204.15.17 91.150.125.109 171.242.186.79
138.204.135.51 177.106.178.225 121.225.46.151 20.114.79.160
185.22.183.194 42.118.58.152 94.154.127.159 34.142.71.177