必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspam
 TCP (SYN) 162.243.139.50:53202 -> port 8080, len 40
2020-06-06 22:57:14
相同子网IP讨论:
IP 类型 评论内容 时间
162.243.139.21 proxy
VPN fraud
2023-02-24 13:44:38
162.243.139.19 proxy
VPN
2023-01-23 14:02:03
162.243.139.98 attack
[Fri Jun 12 03:31:39 2020] - DDoS Attack From IP: 162.243.139.98 Port: 51724
2020-07-16 21:22:30
162.243.139.167 attack
[Sun Jun 14 03:12:01 2020] - DDoS Attack From IP: 162.243.139.167 Port: 58412
2020-07-16 20:56:22
162.243.139.150 attack
[Wed Jun 17 15:34:21 2020] - DDoS Attack From IP: 162.243.139.150 Port: 57028
2020-07-16 20:29:09
162.243.139.246 attack
[Wed Jun 17 21:52:27 2020] - DDoS Attack From IP: 162.243.139.246 Port: 58139
2020-07-16 20:26:41
162.243.139.98 attackspam
[Fri Jun 12 03:31:41 2020] - DDoS Attack From IP: 162.243.139.98 Port: 51724
2020-07-13 03:31:45
162.243.139.167 attackspambots
[Sun Jun 14 03:12:03 2020] - DDoS Attack From IP: 162.243.139.167 Port: 58412
2020-07-13 03:17:58
162.243.139.150 attackbotsspam
[Wed Jun 17 15:34:23 2020] - DDoS Attack From IP: 162.243.139.150 Port: 57028
2020-07-13 03:02:20
162.243.139.246 attackspam
[Wed Jun 17 21:52:29 2020] - DDoS Attack From IP: 162.243.139.246 Port: 58139
2020-07-13 03:00:05
162.243.139.196 attack
[Fri May 22 02:56:34 2020] - DDoS Attack From IP: 162.243.139.196 Port: 39583
2020-07-09 03:49:00
162.243.139.226 attackspam
[Mon May 25 12:06:40 2020] - DDoS Attack From IP: 162.243.139.226 Port: 59688
2020-07-09 03:24:42
162.243.139.40 attackspam
[Thu May 28 02:37:02 2020] - DDoS Attack From IP: 162.243.139.40 Port: 48945
2020-07-09 03:18:45
162.243.139.241 attackbotsspam
[Thu May 28 12:09:43 2020] - DDoS Attack From IP: 162.243.139.241 Port: 46028
2020-07-09 03:12:30
162.243.139.141 attackbots
[Fri May 29 12:54:48 2020] - DDoS Attack From IP: 162.243.139.141 Port: 55461
2020-07-09 02:53:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.243.139.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.243.139.50.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060600 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 06 22:57:07 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
50.139.243.162.in-addr.arpa domain name pointer zg-0428c-326.stretchoid.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.139.243.162.in-addr.arpa	name = zg-0428c-326.stretchoid.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.104 attack
Fail2Ban Ban Triggered
2020-03-25 20:21:11
5.101.0.209 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 6800 8081
2020-03-25 20:52:21
185.175.93.78 attackspambots
Mar 25 12:11:55 debian-2gb-nbg1-2 kernel: \[7393795.699001\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.78 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=9142 PROTO=TCP SPT=44641 DPT=64366 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-25 20:21:41
185.176.27.250 attackbotsspam
03/25/2020-06:26:57.478852 185.176.27.250 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 20:15:08
185.176.27.18 attackspambots
Mar 25 13:16:24 debian-2gb-nbg1-2 kernel: \[7397664.611054\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52013 PROTO=TCP SPT=50760 DPT=18111 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-25 20:19:52
167.99.66.158 attackbotsspam
Mar 25 13:51:17 vps647732 sshd[30794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.158
Mar 25 13:51:19 vps647732 sshd[30794]: Failed password for invalid user yd from 167.99.66.158 port 38616 ssh2
...
2020-03-25 20:55:03
111.230.249.77 attack
Invalid user wangjinyu from 111.230.249.77 port 48022
2020-03-25 21:04:27
80.82.78.100 attackbotsspam
137/udp 1045/udp 1030/udp...
[2020-01-24/03-24]1964pkt,33pt.(udp)
2020-03-25 20:40:00
80.82.65.74 attack
39232/tcp 57253/tcp 27751/tcp...
[2020-01-24/03-25]2266pkt,421pt.(tcp)
2020-03-25 20:42:00
45.134.179.240 attack
firewall-block, port(s): 3390/tcp
2020-03-25 20:50:01
129.211.10.228 attackspambots
Invalid user gitdaemon from 129.211.10.228 port 27114
2020-03-25 21:03:36
37.49.227.109 attackspambots
firewall-block, port(s): 5683/udp
2020-03-25 20:51:13
106.12.23.198 attack
Mar 25 13:46:45 ns3042688 sshd\[12157\]: Invalid user evelyn from 106.12.23.198
Mar 25 13:46:45 ns3042688 sshd\[12157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.23.198 
Mar 25 13:46:46 ns3042688 sshd\[12157\]: Failed password for invalid user evelyn from 106.12.23.198 port 41542 ssh2
Mar 25 13:51:13 ns3042688 sshd\[12428\]: Invalid user ftpadmin from 106.12.23.198
Mar 25 13:51:13 ns3042688 sshd\[12428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.23.198 
...
2020-03-25 21:01:30
185.176.27.26 attack
03/25/2020-07:39:51.010119 185.176.27.26 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 20:19:19
5.188.210.203 attack
Port 3128 scan denied
2020-03-25 20:51:49

最近上报的IP列表

8.174.100.101 149.14.20.252 102.233.70.240 167.58.49.203
201.179.219.105 210.137.249.216 151.37.67.24 82.5.126.218
15.146.230.50 192.168.14.14 103.249.22.3 77.222.122.209
77.42.74.155 46.242.61.178 103.48.182.203 65.222.245.11
213.184.251.86 181.231.241.239 186.11.123.150 113.167.105.35