必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): GoDaddy.com LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
192.169.139.6 - - [04/Jul/2020:11:48:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1993 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [04/Jul/2020:11:48:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1993 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [04/Jul/2020:11:48:27 +0100] "POST /wp-login.php HTTP/1.1" 200 1993 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-04 19:24:22
attack
Automatic report - Banned IP Access
2020-05-24 00:27:28
attack
192.169.139.6 - - [15/May/2020:08:28:59 +0200] "GET /wp-login.php HTTP/1.1" 200 6539 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [15/May/2020:08:29:01 +0200] "POST /wp-login.php HTTP/1.1" 200 6790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [15/May/2020:08:29:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-15 15:26:51
attack
192.169.139.6 - - [03/May/2020:05:53:28 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [03/May/2020:05:53:29 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [03/May/2020:05:53:31 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-03 14:54:58
attack
192.169.139.6 - - [29/Apr/2020:09:45:05 +0200] "GET /wp-login.php HTTP/1.1" 200 5686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [29/Apr/2020:09:45:13 +0200] "POST /wp-login.php HTTP/1.1" 200 5937 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.169.139.6 - - [29/Apr/2020:09:45:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-29 18:04:10
attackspam
Unauthorized connection attempt detected from IP address 192.169.139.6 to port 3306
2020-04-27 13:35:10
attackspam
Automatic report - XMLRPC Attack
2020-02-13 18:58:25
attackbots
xmlrpc attack
2020-01-24 03:41:38
attackspam
Dec 25 10:53:07 wordpress wordpress(www.ruhnke.cloud)[19628]: Blocked authentication attempt for admin from ::ffff:192.169.139.6
2019-12-25 19:19:15
attack
WordPress login brute force attempt
2019-10-22 00:31:06
attackbotsspam
Looking for resource vulnerabilities
2019-10-20 07:11:32
attackspam
WordPress wp-login brute force :: 192.169.139.6 0.044 BYPASS [18/Oct/2019:06:49:33  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-18 07:29:26
attack
Automatic report - XMLRPC Attack
2019-10-06 21:04:53
相同子网IP讨论:
IP 类型 评论内容 时间
192.169.139.217 attack
Scan port
2023-07-24 12:19:22
192.169.139.161 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-11 16:31:24
192.169.139.161 attackbots
RDP Bruteforce
2019-11-26 03:13:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.169.139.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;192.169.139.6.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100600 1800 900 604800 86400

;; Query time: 401 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 06 21:04:45 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
6.139.169.192.in-addr.arpa domain name pointer ip-192-169-139-6.ip.secureserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.139.169.192.in-addr.arpa	name = ip-192-169-139-6.ip.secureserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.136.89 attackspam
Nov  3 17:13:09 apollo sshd\[23732\]: Invalid user jeferson from 140.143.136.89Nov  3 17:13:11 apollo sshd\[23732\]: Failed password for invalid user jeferson from 140.143.136.89 port 34206 ssh2Nov  3 17:36:52 apollo sshd\[23757\]: Failed password for root from 140.143.136.89 port 41152 ssh2
...
2019-11-04 05:02:46
218.92.0.206 attackbots
Nov  3 16:02:56 eventyay sshd[16100]: Failed password for root from 218.92.0.206 port 52548 ssh2
Nov  3 16:03:39 eventyay sshd[16102]: Failed password for root from 218.92.0.206 port 13978 ssh2
...
2019-11-04 04:53:19
178.128.216.127 attackspam
Nov  3 10:27:59 auw2 sshd\[8856\]: Invalid user ld from 178.128.216.127
Nov  3 10:27:59 auw2 sshd\[8856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.216.127
Nov  3 10:28:01 auw2 sshd\[8856\]: Failed password for invalid user ld from 178.128.216.127 port 49804 ssh2
Nov  3 10:32:04 auw2 sshd\[9223\]: Invalid user demouser from 178.128.216.127
Nov  3 10:32:04 auw2 sshd\[9223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.216.127
2019-11-04 04:46:25
185.176.27.126 attackbots
firewall-block, port(s): 20/tcp, 142/tcp, 604/tcp, 1492/tcp, 1522/tcp, 1525/tcp, 2161/tcp, 2374/tcp, 2883/tcp, 3129/tcp, 3162/tcp, 3209/tcp, 3273/tcp, 3414/tcp, 3514/tcp, 3555/tcp, 3729/tcp, 3743/tcp, 3776/tcp, 3942/tcp, 3945/tcp, 4061/tcp, 4213/tcp, 4379/tcp, 4473/tcp, 4767/tcp, 5087/tcp, 5148/tcp, 5305/tcp, 5337/tcp, 5491/tcp, 5497/tcp, 5535/tcp, 6107/tcp, 6644/tcp, 6732/tcp, 6926/tcp, 6995/tcp, 7132/tcp, 7255/tcp, 7349/tcp, 7531/tcp, 7692/tcp, 7700/tcp, 7733/tcp, 7776/tcp, 7859/tcp, 7911/tcp, 8007/tcp, 8166/tcp, 8336/tcp, 8400/tcp, 8475/tcp, 8701/tcp, 8748/tcp, 8824/tcp, 8992/tcp, 9011/tcp, 9152/tcp, 9250/tcp, 9368/tcp, 9398/tcp, 9614/tcp, 9792/tcp, 9805/tcp, 9994/tcp, 10153/tcp, 10242/tcp, 10294/tcp, 10576/tcp, 10590/tcp, 10670/tcp, 10676/tcp, 10694/tcp, 10731/tcp, 11412/tcp, 11525/tcp, 11600/tcp, 11652/tcp, 11840/tcp, 12269/tcp, 12286/tcp, 12301/tcp, 12753/tcp, 12916/tcp, 13367/tcp, 14054/tcp, 14233/tcp, 14909/tcp, 14933/tcp, 15036/tcp, 15191/tcp, 15318/tcp, 15397/tcp, 15440/tcp, 15508/tcp, 16169/tcp, 16
2019-11-04 04:45:22
2a00:d680:20:50::aa81 attack
xmlrpc attack
2019-11-04 04:37:21
193.112.91.90 attack
2019-11-03T15:31:44.918508hub.schaetter.us sshd\[1616\]: Invalid user Fuwuqi2003\* from 193.112.91.90 port 54250
2019-11-03T15:31:44.929910hub.schaetter.us sshd\[1616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.91.90
2019-11-03T15:31:47.189653hub.schaetter.us sshd\[1616\]: Failed password for invalid user Fuwuqi2003\* from 193.112.91.90 port 54250 ssh2
2019-11-03T15:36:40.451189hub.schaetter.us sshd\[1698\]: Invalid user Pa55word2003 from 193.112.91.90 port 57182
2019-11-03T15:36:40.459117hub.schaetter.us sshd\[1698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.91.90
...
2019-11-04 04:42:23
189.111.117.113 attack
Unauthorized connection attempt from IP address 189.111.117.113 on Port 445(SMB)
2019-11-04 04:42:58
107.179.95.9 attackspam
Nov  3 23:08:55 server sshd\[27876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.179.95.9  user=root
Nov  3 23:08:57 server sshd\[27876\]: Failed password for root from 107.179.95.9 port 43656 ssh2
Nov  3 23:30:28 server sshd\[1346\]: Invalid user oracle from 107.179.95.9
Nov  3 23:30:28 server sshd\[1346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.179.95.9 
Nov  3 23:30:31 server sshd\[1346\]: Failed password for invalid user oracle from 107.179.95.9 port 50688 ssh2
...
2019-11-04 04:31:05
128.199.184.127 attackspam
Nov  3 12:34:20 lanister sshd[23851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.184.127  user=root
Nov  3 12:34:22 lanister sshd[23851]: Failed password for root from 128.199.184.127 port 33494 ssh2
Nov  3 12:34:20 lanister sshd[23851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.184.127  user=root
Nov  3 12:34:22 lanister sshd[23851]: Failed password for root from 128.199.184.127 port 33494 ssh2
...
2019-11-04 04:34:11
67.213.75.130 attack
Invalid user stupor from 67.213.75.130 port 37379
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.213.75.130
Failed password for invalid user stupor from 67.213.75.130 port 37379 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.213.75.130  user=root
Failed password for root from 67.213.75.130 port 28985 ssh2
2019-11-04 04:29:55
114.40.20.94 attack
Unauthorized connection attempt from IP address 114.40.20.94 on Port 445(SMB)
2019-11-04 04:29:13
182.75.170.150 attackbots
Unauthorized connection attempt from IP address 182.75.170.150 on Port 445(SMB)
2019-11-04 04:51:12
81.82.196.223 attack
Automatic report - Banned IP Access
2019-11-04 04:56:37
89.248.168.176 attackbots
Connection by 89.248.168.176 on port: 5938 got caught by honeypot at 11/3/2019 7:38:27 PM
2019-11-04 04:59:36
151.80.254.75 attackspambots
Nov  3 21:13:47 srv01 sshd[7157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.75  user=root
Nov  3 21:13:49 srv01 sshd[7157]: Failed password for root from 151.80.254.75 port 49716 ssh2
Nov  3 21:17:18 srv01 sshd[7341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.75  user=root
Nov  3 21:17:20 srv01 sshd[7341]: Failed password for root from 151.80.254.75 port 59770 ssh2
Nov  3 21:21:11 srv01 sshd[7729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.75  user=root
Nov  3 21:21:12 srv01 sshd[7729]: Failed password for root from 151.80.254.75 port 41606 ssh2
...
2019-11-04 04:49:29

最近上报的IP列表

102.254.141.180 220.146.11.56 70.240.72.213 218.32.189.5
61.82.27.32 149.109.71.155 211.103.203.2 247.72.64.194
223.80.149.110 88.250.158.66 96.154.204.80 190.28.121.159
147.220.97.225 79.91.45.95 187.72.3.32 77.40.61.212
85.175.216.32 45.33.81.51 23.94.70.202 42.113.183.216