必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): Jamia Millia Islamia University New Delhi

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): University/College/School

用户上报:
类型 评论内容 时间
attack
unauthorized connection attempt
2020-01-28 17:51:08
attackspambots
Unauthorised access (Jan 23) SRC=14.139.62.117 LEN=52 TTL=117 ID=9240 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-23 16:21:34
attack
unauthorized connection attempt
2020-01-22 17:53:02
相同子网IP讨论:
IP 类型 评论内容 时间
14.139.62.139 attackspambots
 TCP (SYN) 14.139.62.139:32414 -> port 1433, len 44
2020-07-19 18:55:53
14.139.62.139 attackspam
Unauthorized connection attempt detected from IP address 14.139.62.139 to port 1433
2020-07-01 12:16:14
14.139.62.139 attackspam
Icarus honeypot on github
2020-04-24 19:48:17
14.139.62.139 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/14.139.62.139/ 
 
 IN - 1H : (64)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN55824 
 
 IP : 14.139.62.139 
 
 CIDR : 14.139.62.0/24 
 
 PREFIX COUNT : 191 
 
 UNIQUE IP COUNT : 72960 
 
 
 ATTACKS DETECTED ASN55824 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-09 17:10:33 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-10 07:26:11
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.139.62.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.139.62.117.			IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012200 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 17:52:58 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 117.62.139.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.62.139.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.98.192.83 attackbots
Aug 11 10:40:44 localhost sshd\[6320\]: Invalid user informatica from 88.98.192.83
Aug 11 10:40:44 localhost sshd\[6320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.98.192.83
Aug 11 10:40:45 localhost sshd\[6320\]: Failed password for invalid user informatica from 88.98.192.83 port 59268 ssh2
Aug 11 10:44:47 localhost sshd\[6350\]: Invalid user cvs from 88.98.192.83
Aug 11 10:44:47 localhost sshd\[6350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.98.192.83
...
2019-08-11 18:57:01
103.209.1.33 attack
Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-08-11 18:37:19
77.247.110.20 attackspam
\[2019-08-11 06:27:50\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-11T06:27:50.042-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="700748422069004",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/57258",ACLName="no_extension_match"
\[2019-08-11 06:31:58\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-11T06:31:58.813-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="7000748422069004",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/59407",ACLName="no_extension_match"
\[2019-08-11 06:36:26\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-11T06:36:26.541-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="70000748422069004",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/50277",ACLName="no_
2019-08-11 18:37:57
159.89.111.136 attackbotsspam
Aug 11 12:37:00 localhost sshd\[8433\]: Invalid user darwin from 159.89.111.136 port 32892
Aug 11 12:37:00 localhost sshd\[8433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.111.136
Aug 11 12:37:02 localhost sshd\[8433\]: Failed password for invalid user darwin from 159.89.111.136 port 32892 ssh2
2019-08-11 18:41:12
91.205.130.178 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-11 07:41:20,355 INFO [amun_request_handler] PortScan Detected on Port: 445 (91.205.130.178)
2019-08-11 18:35:13
122.225.3.146 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-11 07:32:59,159 INFO [amun_request_handler] PortScan Detected on Port: 445 (122.225.3.146)
2019-08-11 18:56:09
51.38.152.200 attack
Aug 11 15:46:45 lcl-usvr-02 sshd[8288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.152.200  user=lp
Aug 11 15:46:47 lcl-usvr-02 sshd[8288]: Failed password for lp from 51.38.152.200 port 11427 ssh2
Aug 11 15:51:06 lcl-usvr-02 sshd[9137]: Invalid user green from 51.38.152.200 port 52688
Aug 11 15:51:06 lcl-usvr-02 sshd[9137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.152.200
Aug 11 15:51:06 lcl-usvr-02 sshd[9137]: Invalid user green from 51.38.152.200 port 52688
Aug 11 15:51:08 lcl-usvr-02 sshd[9137]: Failed password for invalid user green from 51.38.152.200 port 52688 ssh2
...
2019-08-11 19:06:21
95.110.235.17 attackspambots
2019-08-11T10:35:36.439764abusebot-5.cloudsearch.cf sshd\[24413\]: Invalid user cfabllc from 95.110.235.17 port 37594
2019-08-11 18:56:28
114.118.6.133 attackspam
Aug 11 15:48:31 itv-usvr-02 sshd[30165]: Invalid user azureuser from 114.118.6.133 port 46918
Aug 11 15:48:31 itv-usvr-02 sshd[30165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.6.133
Aug 11 15:48:31 itv-usvr-02 sshd[30165]: Invalid user azureuser from 114.118.6.133 port 46918
Aug 11 15:48:32 itv-usvr-02 sshd[30165]: Failed password for invalid user azureuser from 114.118.6.133 port 46918 ssh2
Aug 11 15:55:06 itv-usvr-02 sshd[30170]: Invalid user ftp from 114.118.6.133 port 43154
2019-08-11 18:36:44
138.128.209.35 attack
Aug 11 12:13:05 www sshd\[159095\]: Invalid user aaa from 138.128.209.35
Aug 11 12:13:05 www sshd\[159095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.209.35
Aug 11 12:13:07 www sshd\[159095\]: Failed password for invalid user aaa from 138.128.209.35 port 34440 ssh2
...
2019-08-11 18:36:16
119.200.186.168 attackspambots
Automatic report - Banned IP Access
2019-08-11 18:11:07
98.209.233.237 attackspambots
Aug 11 13:33:56 server sshd\[10159\]: Invalid user vaibhav from 98.209.233.237 port 43990
Aug 11 13:33:56 server sshd\[10159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.209.233.237
Aug 11 13:33:58 server sshd\[10159\]: Failed password for invalid user vaibhav from 98.209.233.237 port 43990 ssh2
Aug 11 13:38:16 server sshd\[8552\]: Invalid user sandbox from 98.209.233.237 port 37916
Aug 11 13:38:16 server sshd\[8552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.209.233.237
2019-08-11 18:50:34
106.13.106.46 attack
Aug 11 12:36:10 cp sshd[20488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.106.46
2019-08-11 19:01:42
184.105.247.231 attackspambots
27017/tcp 873/tcp 9200/tcp...
[2019-06-10/08-11]53pkt,10pt.(tcp),2pt.(udp)
2019-08-11 18:52:21
1.71.129.178 attack
*Port Scan* detected from 1.71.129.178 (CN/China/-). 4 hits in the last 80 seconds
2019-08-11 18:44:19

最近上报的IP列表

150.129.104.59 113.111.35.45 162.206.162.72 138.255.15.55
119.42.113.113 163.54.207.177 117.233.82.93 220.142.128.230
117.97.176.80 52.185.165.143 115.132.146.242 98.255.244.48
111.43.223.163 252.58.6.133 109.242.212.250 192.107.60.191
103.141.234.38 255.169.126.110 194.30.254.74 142.134.57.124