必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Henan Telecom Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Unauthorized connection attempt detected from IP address 171.12.139.142 to port 139 [T]
2020-05-20 08:52:27
相同子网IP讨论:
IP 类型 评论内容 时间
171.12.139.23 attackspambots
Unauthorized connection attempt detected from IP address 171.12.139.23 to port 139 [T]
2020-05-20 08:53:04
171.12.139.76 attackspambots
Unauthorized connection attempt detected from IP address 171.12.139.76 to port 139 [T]
2020-05-20 08:52:46
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.12.139.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;171.12.139.142.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051901 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 08:52:22 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
;; connection timed out; no servers could be reached
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 142.139.12.171.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.244.121.132 attack
Unauthorized connection attempt from IP address 103.244.121.132 on Port 445(SMB)
2020-02-07 21:24:27
69.165.239.85 attackspambots
Feb  7 05:54:40 vmanager6029 sshd\[11673\]: Invalid user dcl from 69.165.239.85 port 54228
Feb  7 05:54:40 vmanager6029 sshd\[11673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.165.239.85
Feb  7 05:54:42 vmanager6029 sshd\[11673\]: Failed password for invalid user dcl from 69.165.239.85 port 54228 ssh2
2020-02-07 21:01:18
78.167.219.127 attackspambots
unauthorized connection attempt
2020-02-07 21:19:25
156.208.168.32 attackspam
unauthorized connection attempt
2020-02-07 21:08:11
221.170.105.74 attackbotsspam
23/tcp
[2020-02-07]1pkt
2020-02-07 21:28:51
186.226.37.92 attackspam
unauthorized connection attempt
2020-02-07 21:34:04
197.35.189.97 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=36000)(02071336)
2020-02-07 21:21:57
200.236.100.125 attackbotsspam
unauthorized connection attempt
2020-02-07 21:38:57
197.43.192.128 attackspam
unauthorized connection attempt
2020-02-07 21:50:43
60.173.156.55 attackspam
SIP/5060 Probe, BF, Hack -
2020-02-07 21:46:24
87.14.251.107 attack
Feb  7 13:09:21 server sshd\[15856\]: Invalid user nje from 87.14.251.107
Feb  7 13:09:21 server sshd\[15856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host107-251-dynamic.14-87-r.retail.telecomitalia.it 
Feb  7 13:09:24 server sshd\[15856\]: Failed password for invalid user nje from 87.14.251.107 port 36672 ssh2
Feb  7 13:15:37 server sshd\[17190\]: Invalid user fgc from 87.14.251.107
Feb  7 13:15:37 server sshd\[17190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host107-251-dynamic.14-87-r.retail.telecomitalia.it 
...
2020-02-07 21:24:55
161.129.146.224 attackbots
unauthorized connection attempt
2020-02-07 21:40:35
186.235.53.40 attack
unauthorized connection attempt
2020-02-07 21:49:49
168.227.64.21 attackspambots
unauthorized connection attempt
2020-02-07 21:07:46
91.23.148.34 attack
unauthorized connection attempt
2020-02-07 21:35:47

最近上报的IP列表

79.229.13.12 106.42.98.118 106.42.97.1 106.42.96.129
106.42.96.51 36.99.246.122 57.110.153.31 36.99.245.223
36.99.245.201 38.30.18.41 36.99.245.20 78.202.78.6
36.99.244.161 95.168.139.139 36.99.244.41 75.85.85.108
1.199.159.178 101.1.115.143 1.199.159.28 1.199.158.147