必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Hurricane Electric LLC

主机名(hostname): unknown

机构(organization): Hurricane Electric LLC

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
proxy
VPN fraud
2023-03-20 14:02:25
attack
Unauthorised access (Feb 20) SRC=184.105.139.103 LEN=40 TTL=241 ID=54321 TCP DPT=21 WINDOW=65535 SYN
2020-02-21 05:29:56
attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 01:35:08
attackspam
" "
2019-08-21 23:32:29
attackbots
Honeypot hit.
2019-07-06 02:10:43
相同子网IP讨论:
IP 类型 评论内容 时间
184.105.139.105 attackproxy
Compromised IP
2024-05-09 23:09:39
184.105.139.109 attackproxy
Vulnerability Scanner
2024-04-30 12:59:43
184.105.139.70 attack
Vulnerability Scanner
2024-04-20 00:30:49
184.105.139.90 botsattackproxy
Ddos bot
2024-04-20 00:26:45
184.105.139.68 attack
Vulnerability Scanner
2024-04-10 01:16:38
184.105.139.69 proxy
VPN fraud
2023-05-15 19:23:33
184.105.139.120 proxy
VPN fraud
2023-05-10 13:17:43
184.105.139.99 proxy
VPN fraud
2023-03-20 13:57:09
184.105.139.74 proxy
VPN
2023-01-30 14:03:54
184.105.139.86 proxy
VPN
2023-01-19 13:51:12
184.105.139.124 attackproxy
VPN
2022-12-29 20:40:24
184.105.139.124 attack
VPN
2022-12-29 20:40:21
184.105.139.126 proxy
Attack VPN
2022-12-09 13:59:02
184.105.139.70 attackbotsspam
 TCP (SYN) 184.105.139.70:51140 -> port 5900, len 40
2020-10-14 04:24:47
184.105.139.70 attackspam
 TCP (SYN) 184.105.139.70:51140 -> port 5900, len 40
2020-10-13 19:51:22
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 184.105.139.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 291
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;184.105.139.103.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 21:12:35 CST 2019
;; MSG SIZE  rcvd: 119

HOST信息:
103.139.105.184.in-addr.arpa is an alias for 103.64-26.139.105.184.in-addr.arpa.
103.64-26.139.105.184.in-addr.arpa domain name pointer scan-01j.shadowserver.org.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
103.139.105.184.in-addr.arpa	canonical name = 103.64-26.139.105.184.in-addr.arpa.
103.64-26.139.105.184.in-addr.arpa	name = scan-01j.shadowserver.org.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.132.6 attack
trying to access non-authorized port
2020-04-05 09:57:55
209.17.96.122 attackbotsspam
Brute force attack stopped by firewall
2020-04-05 09:40:03
125.64.94.221 attack
Brute force attack stopped by firewall
2020-04-05 09:54:05
183.99.171.104 attackbots
firewall-block, port(s): 23/tcp
2020-04-05 09:32:16
54.37.149.233 attackspambots
Apr  5 00:46:45 xeon sshd[28541]: Failed password for root from 54.37.149.233 port 54638 ssh2
2020-04-05 09:43:57
95.211.236.105 attackspam
Brute force SMTP login attempted.
...
2020-04-05 09:31:14
134.209.148.107 attackspam
$f2bV_matches
2020-04-05 09:32:50
43.226.69.237 attackbots
Apr  5 00:47:28 xeon sshd[28586]: Failed password for root from 43.226.69.237 port 59326 ssh2
2020-04-05 09:44:39
103.45.102.212 attack
Apr  5 01:18:11 legacy sshd[18032]: Failed password for root from 103.45.102.212 port 56626 ssh2
Apr  5 01:20:43 legacy sshd[18074]: Failed password for root from 103.45.102.212 port 39200 ssh2
...
2020-04-05 09:51:05
46.38.145.6 attack
Apr  5 03:39:24 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:40:37 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:41:51 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:43:03 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 03:44:16 srv01 postfix/smtpd\[7260\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-05 09:48:31
62.210.177.41 attackspambots
Brute force attack stopped by firewall
2020-04-05 10:01:47
195.154.170.245 attackspam
Brute force attack stopped by firewall
2020-04-05 09:59:20
185.53.88.35 attackspam
Scanned 1 times in the last 24 hours on port 5060
2020-04-05 09:30:11
91.233.250.106 attackspam
Brute force attack stopped by firewall
2020-04-05 10:06:04
64.53.14.211 attackbotsspam
fail2ban -- 64.53.14.211
...
2020-04-05 09:57:03

最近上报的IP列表

5.150.139.109 223.184.87.15 43.245.163.164 99.11.14.97
194.232.135.246 46.246.10.254 5.23.30.215 162.243.143.131
99.224.61.160 154.130.103.42 147.232.165.170 185.149.89.36
175.154.156.56 27.130.53.246 193.16.176.178 185.218.149.216
200.151.97.24 159.35.39.54 72.143.80.203 112.226.90.242