必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea, Republic of

运营商(isp): SK Broadband Co Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-23 05:27:37
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.117.148.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11070
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;39.117.148.48.			IN	A

;; AUTHORITY SECTION:
.			3385	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 23 05:27:32 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 48.148.117.39.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 48.148.117.39.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.32.22.239 attackbotsspam
Unauthorized connection attempt detected from IP address 213.32.22.239 to port 2220 [J]
2020-02-05 03:49:35
134.209.19.132 attackspambots
2019-05-08 09:28:52 H=bamboozle.bridgecoaa.com \(scarce.renodairyfarm.icu\) \[134.209.19.132\]:38161 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-05-08 09:28:52 H=bamboozle.bridgecoaa.com \(scarce.renodairyfarm.icu\) \[134.209.19.132\]:38161 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-05-08 09:31:40 H=bamboozle.bridgecoaa.com \(photocopy.renodairyfarm.icu\) \[134.209.19.132\]:50248 I=\[193.107.90.29\]:25 sender verify fail for \: Unrouteable address
2019-05-08 09:31:40 H=bamboozle.bridgecoaa.com \(photocopy.renodairyfarm.icu\) \[134.209.19.132\]:50248 I=\[193.107.90.29\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 03:30:27
128.199.219.181 attackspam
Unauthorized connection attempt detected from IP address 128.199.219.181 to port 2220 [J]
2020-02-05 03:57:01
51.15.79.194 attack
Unauthorized connection attempt detected from IP address 51.15.79.194 to port 2220 [J]
2020-02-05 03:27:37
134.209.26.76 attack
2019-05-08 12:59:08 1hOKHz-0008QC-Vg SMTP connection from sisters.boroujerdico.com \(chin.xevoulono.icu\) \[134.209.26.76\]:46304 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-08 12:59:09 1hOKI1-0008QH-P9 SMTP connection from sisters.boroujerdico.com \(out.xevoulono.icu\) \[134.209.26.76\]:39804 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-08 12:59:10 1hOKI1-0008QI-PD SMTP connection from sisters.boroujerdico.com \(polygraph.xevoulono.icu\) \[134.209.26.76\]:35343 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 03:24:47
134.209.19.73 attack
2019-05-07 09:51:17 1hNusf-0005MW-2g SMTP connection from dramatic.bridgecoaa.com \(barefoot.renodairyfarm.icu\) \[134.209.19.73\]:39906 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 09:51:34 1hNusw-0005Mo-Jf SMTP connection from dramatic.bridgecoaa.com \(early.renodairyfarm.icu\) \[134.209.19.73\]:35964 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 09:52:47 1hNuu7-0005Nt-3A SMTP connection from dramatic.bridgecoaa.com \(mice.renodairyfarm.icu\) \[134.209.19.73\]:60863 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-02-05 03:25:49
134.209.18.238 attackbotsspam
2019-05-07 16:57:29 1hO1X7-0000Lh-Ns SMTP connection from material.boroujerdico.com \(pinch.cambostack.icu\) \[134.209.18.238\]:46058 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 16:58:33 1hO1Y9-0000NF-D4 SMTP connection from material.boroujerdico.com \(exciting.cambostack.icu\) \[134.209.18.238\]:45849 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 16:59:14 1hO1Yo-0000OF-1u SMTP connection from material.boroujerdico.com \(carriage.cambostack.icu\) \[134.209.18.238\]:47169 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 03:31:56
78.47.51.201 attack
Feb  4 06:44:25 main sshd[32204]: Failed password for invalid user webmaster from 78.47.51.201 port 46686 ssh2
Feb  4 06:45:52 main sshd[32216]: Failed password for invalid user zabbix from 78.47.51.201 port 33282 ssh2
Feb  4 06:47:20 main sshd[32227]: Failed password for invalid user sybase from 78.47.51.201 port 48090 ssh2
2020-02-05 04:05:19
185.6.172.152 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-02-05 04:03:42
66.70.130.152 attackbots
Feb  4 20:04:23 roki sshd[31049]: Invalid user mujr from 66.70.130.152
Feb  4 20:04:23 roki sshd[31049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.152
Feb  4 20:04:25 roki sshd[31049]: Failed password for invalid user mujr from 66.70.130.152 port 50590 ssh2
Feb  4 20:27:20 roki sshd[32697]: Invalid user cms from 66.70.130.152
Feb  4 20:27:20 roki sshd[32697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.152
...
2020-02-05 03:41:06
183.60.141.171 attackbots
Unauthorised access (Feb  4) SRC=183.60.141.171 LEN=40 TTL=52 ID=11656 TCP DPT=23 WINDOW=1024 SYN 
Unauthorised access (Feb  3) SRC=183.60.141.171 LEN=40 TTL=52 ID=19802 TCP DPT=21 WINDOW=1024 SYN
2020-02-05 03:50:03
220.86.166.7 attackspambots
Feb  4 19:36:46 gw1 sshd[26968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.166.7
Feb  4 19:36:48 gw1 sshd[26968]: Failed password for invalid user olapsys from 220.86.166.7 port 53228 ssh2
...
2020-02-05 03:39:56
134.209.19.184 attackspambots
2019-05-08 08:21:10 H=thought.bridgecoaa.com \(needless.frsteverice.icu\) \[134.209.19.184\]:53531 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-05-08 08:21:10 H=thought.bridgecoaa.com \(needless.frsteverice.icu\) \[134.209.19.184\]:53531 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-05-08 08:23:20 H=thought.bridgecoaa.com \(wash.frsteverice.icu\) \[134.209.19.184\]:35751 I=\[193.107.90.29\]:25 sender verify fail for \: Unrouteable address
2019-05-08 08:23:20 H=thought.bridgecoaa.com \(wash.frsteverice.icu\) \[134.209.19.184\]:35751 I=\[193.107.90.29\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 03:29:51
139.59.56.121 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-05 03:52:28
134.209.1.111 attack
2019-02-28 19:18:57 H=electric.farzamlift.com \(stir.appaie.icu\) \[134.209.1.111\]:57221 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-02-28 19:18:57 H=electric.farzamlift.com \(stir.appaie.icu\) \[134.209.1.111\]:57221 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-28 19:18:57 H=electric.farzamlift.com \(wild.appaie.icu\) \[134.209.1.111\]:52218 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-02-28 19:18:57 H=electric.farzamlift.com \(wild.appaie.icu\) \[134.209.1.111\]:52218 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 16:44:56 1gzkLI-0001GN-GN SMTP connection from electric.farzamlift.com \(countess.ofqnews.icu\) \[134.209.1.111\]:35892 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-01 16:44:56 1gzkLI-0001GM-GN SMTP connec
...
2020-02-05 04:04:22

最近上报的IP列表

177.129.205.155 191.18.98.60 113.173.222.241 111.207.253.225
167.89.7.116 207.154.192.152 103.114.248.66 41.60.235.174
14.230.80.106 119.15.155.59 115.238.251.175 100.185.102.128
92.50.186.82 182.232.31.34 154.168.109.224 221.165.126.138
41.226.248.150 51.83.126.19 77.83.85.185 121.232.43.233