必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
2020-09-10T09:32:33.079252upcloud.m0sh1x2.com sshd[17555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139  user=root
2020-09-10T09:32:34.904026upcloud.m0sh1x2.com sshd[17555]: Failed password for root from 49.51.160.139 port 41714 ssh2
2020-09-11 03:52:31
attack
2020-09-10T09:32:33.079252upcloud.m0sh1x2.com sshd[17555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139  user=root
2020-09-10T09:32:34.904026upcloud.m0sh1x2.com sshd[17555]: Failed password for root from 49.51.160.139 port 41714 ssh2
2020-09-10 19:27:17
attackbots
Time:     Sat Sep  5 08:07:22 2020 +0000
IP:       49.51.160.139 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  5 07:40:14 ca-16-ede1 sshd[78257]: Invalid user nexthink from 49.51.160.139 port 52316
Sep  5 07:40:16 ca-16-ede1 sshd[78257]: Failed password for invalid user nexthink from 49.51.160.139 port 52316 ssh2
Sep  5 07:53:09 ca-16-ede1 sshd[79899]: Invalid user dongwei from 49.51.160.139 port 36616
Sep  5 07:53:11 ca-16-ede1 sshd[79899]: Failed password for invalid user dongwei from 49.51.160.139 port 36616 ssh2
Sep  5 08:07:21 ca-16-ede1 sshd[81762]: Invalid user stats from 49.51.160.139 port 58818
2020-09-05 17:36:05
attackspambots
Invalid user lzj from 49.51.160.139 port 59010
2020-08-31 19:47:00
attackspam
$f2bV_matches
2020-08-28 04:51:12
attackspam
web-1 [ssh_2] SSH Attack
2020-08-23 03:41:58
attack
Aug 19 20:04:21 nextcloud sshd\[13546\]: Invalid user cnz from 49.51.160.139
Aug 19 20:04:21 nextcloud sshd\[13546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Aug 19 20:04:24 nextcloud sshd\[13546\]: Failed password for invalid user cnz from 49.51.160.139 port 46272 ssh2
2020-08-20 02:35:29
attackbotsspam
21 attempts against mh-ssh on echoip
2020-08-19 07:11:36
attackbotsspam
Aug 11 23:29:40 fhem-rasp sshd[4817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139  user=root
Aug 11 23:29:43 fhem-rasp sshd[4817]: Failed password for root from 49.51.160.139 port 50350 ssh2
...
2020-08-12 05:42:13
attackbotsspam
2020-07-26T07:07:43.168439dmca.cloudsearch.cf sshd[13743]: Invalid user paci from 49.51.160.139 port 50926
2020-07-26T07:07:43.173487dmca.cloudsearch.cf sshd[13743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
2020-07-26T07:07:43.168439dmca.cloudsearch.cf sshd[13743]: Invalid user paci from 49.51.160.139 port 50926
2020-07-26T07:07:45.445483dmca.cloudsearch.cf sshd[13743]: Failed password for invalid user paci from 49.51.160.139 port 50926 ssh2
2020-07-26T07:15:51.521002dmca.cloudsearch.cf sshd[13945]: Invalid user servidor from 49.51.160.139 port 56296
2020-07-26T07:15:51.526612dmca.cloudsearch.cf sshd[13945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
2020-07-26T07:15:51.521002dmca.cloudsearch.cf sshd[13945]: Invalid user servidor from 49.51.160.139 port 56296
2020-07-26T07:15:53.126095dmca.cloudsearch.cf sshd[13945]: Failed password for invalid user servidor from 49.5
...
2020-07-26 15:39:33
attack
Jul 25 06:01:16 vm1 sshd[5064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Jul 25 06:01:18 vm1 sshd[5064]: Failed password for invalid user md from 49.51.160.139 port 41048 ssh2
...
2020-07-25 14:47:18
attack
Apr 19 22:13:04 vpn01 sshd[6518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Apr 19 22:13:06 vpn01 sshd[6518]: Failed password for invalid user bi from 49.51.160.139 port 48050 ssh2
...
2020-04-20 07:44:10
attackbotsspam
Apr 15 20:03:19 * sshd[32092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Apr 15 20:03:21 * sshd[32092]: Failed password for invalid user gmodserver from 49.51.160.139 port 50712 ssh2
2020-04-16 02:19:25
attack
Apr 13 14:50:30 OPSO sshd\[23877\]: Invalid user osboxes from 49.51.160.139 port 59516
Apr 13 14:50:30 OPSO sshd\[23877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Apr 13 14:50:33 OPSO sshd\[23877\]: Failed password for invalid user osboxes from 49.51.160.139 port 59516 ssh2
Apr 13 14:56:21 OPSO sshd\[25692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139  user=root
Apr 13 14:56:23 OPSO sshd\[25692\]: Failed password for root from 49.51.160.139 port 39232 ssh2
2020-04-13 21:15:55
attackbots
Apr 12 06:11:56 pi sshd[27408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139  user=root
Apr 12 06:11:59 pi sshd[27408]: Failed password for invalid user root from 49.51.160.139 port 59166 ssh2
2020-04-12 16:20:37
attackspambots
Mar 28 03:20:45 web1 sshd\[8771\]: Invalid user noderig from 49.51.160.139
Mar 28 03:20:45 web1 sshd\[8771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Mar 28 03:20:47 web1 sshd\[8771\]: Failed password for invalid user noderig from 49.51.160.139 port 42418 ssh2
Mar 28 03:25:53 web1 sshd\[9302\]: Invalid user jf from 49.51.160.139
Mar 28 03:25:53 web1 sshd\[9302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
2020-03-28 21:53:27
attack
Invalid user user from 49.51.160.139 port 43300
2020-03-28 14:02:24
attackspam
Mar 24 20:02:01 silence02 sshd[3149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
Mar 24 20:02:03 silence02 sshd[3149]: Failed password for invalid user terraria from 49.51.160.139 port 36252 ssh2
Mar 24 20:07:43 silence02 sshd[3410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.160.139
2020-03-25 03:08:02
相同子网IP讨论:
IP 类型 评论内容 时间
49.51.160.53 attack
[portscan]
2020-12-31 13:16:15
49.51.160.77 spamattack
port 6003
2020-12-31 13:09:30
49.51.160.240 attack
Unauthorized connection attempt detected from IP address 49.51.160.240 to port 8181
2020-07-25 22:41:04
49.51.160.107 attack
Unauthorized connection attempt detected from IP address 49.51.160.107 to port 2181
2020-07-25 21:09:41
49.51.160.201 attackspam
Unauthorized connection attempt detected from IP address 49.51.160.201 to port 4506
2020-07-22 22:01:46
49.51.160.252 attack
Unauthorized connection attempt detected from IP address 49.51.160.252 to port 80
2020-07-22 20:33:05
49.51.160.173 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.173 to port 102
2020-07-18 19:25:08
49.51.160.252 attack
Unauthorized connection attempt detected from IP address 49.51.160.252 to port 8058
2020-07-14 03:29:10
49.51.160.84 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.84 to port 2053
2020-07-09 05:26:25
49.51.160.240 attackspam
Unauthorized connection attempt detected from IP address 49.51.160.240 to port 8332
2020-07-09 05:05:28
49.51.160.77 attackbotsspam
Unauthorized connection attempt detected from IP address 49.51.160.77 to port 9595
2020-07-09 02:11:32
49.51.160.77 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.77 to port 8118
2020-07-07 03:44:53
49.51.160.201 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.201 to port 515
2020-07-07 03:44:40
49.51.160.240 attackbotsspam
Unauthorized connection attempt detected from IP address 49.51.160.240 to port 8123
2020-06-22 06:53:58
49.51.160.47 attack
Unauthorized connection attempt detected from IP address 49.51.160.47 to port 1433
2020-06-22 06:37:44
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.51.160.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.51.160.139.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032401 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 03:07:58 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 139.160.51.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.160.51.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.158.124.100 attackspam
spam (f2b h2)
2020-07-25 15:18:12
61.133.232.253 attackspam
Jul 25 05:49:42 Ubuntu-1404-trusty-64-minimal sshd\[17747\]: Invalid user developer from 61.133.232.253
Jul 25 05:49:42 Ubuntu-1404-trusty-64-minimal sshd\[17747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253
Jul 25 05:49:44 Ubuntu-1404-trusty-64-minimal sshd\[17747\]: Failed password for invalid user developer from 61.133.232.253 port 32166 ssh2
Jul 25 06:00:54 Ubuntu-1404-trusty-64-minimal sshd\[28558\]: Invalid user citroen from 61.133.232.253
Jul 25 06:00:54 Ubuntu-1404-trusty-64-minimal sshd\[28558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253
2020-07-25 14:46:28
222.186.175.150 attack
Jul 25 08:28:44 mellenthin sshd[32211]: Failed none for invalid user root from 222.186.175.150 port 21460 ssh2
Jul 25 08:28:44 mellenthin sshd[32211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
2020-07-25 14:37:12
69.148.226.251 attack
Invalid user vlc from 69.148.226.251 port 49689
2020-07-25 15:12:39
103.46.139.230 attack
Invalid user lxj from 103.46.139.230 port 46400
2020-07-25 14:49:20
92.62.237.185 attack
Jul 25 05:35:27 mail.srvfarm.net postfix/smtps/smtpd[369855]: warning: unknown[92.62.237.185]: SASL PLAIN authentication failed: 
Jul 25 05:35:27 mail.srvfarm.net postfix/smtps/smtpd[369855]: lost connection after AUTH from unknown[92.62.237.185]
Jul 25 05:35:36 mail.srvfarm.net postfix/smtpd[369051]: warning: unknown[92.62.237.185]: SASL PLAIN authentication failed: 
Jul 25 05:35:36 mail.srvfarm.net postfix/smtpd[369051]: lost connection after AUTH from unknown[92.62.237.185]
Jul 25 05:38:28 mail.srvfarm.net postfix/smtpd[369031]: warning: unknown[92.62.237.185]: SASL PLAIN authentication failed:
2020-07-25 15:07:58
186.216.68.130 attackbotsspam
Jul 25 04:59:28 mail.srvfarm.net postfix/smtps/smtpd[352431]: warning: unknown[186.216.68.130]: SASL PLAIN authentication failed: 
Jul 25 04:59:29 mail.srvfarm.net postfix/smtps/smtpd[352431]: lost connection after AUTH from unknown[186.216.68.130]
Jul 25 05:08:26 mail.srvfarm.net postfix/smtps/smtpd[365292]: warning: unknown[186.216.68.130]: SASL PLAIN authentication failed: 
Jul 25 05:08:26 mail.srvfarm.net postfix/smtps/smtpd[365292]: lost connection after AUTH from unknown[186.216.68.130]
Jul 25 05:09:21 mail.srvfarm.net postfix/smtps/smtpd[365718]: lost connection after CONNECT from unknown[186.216.68.130]
2020-07-25 15:03:30
81.170.239.2 attackspambots
xmlrpc attack
2020-07-25 14:43:44
61.177.172.168 attackbots
Jul 25 08:33:12 PorscheCustomer sshd[7928]: Failed password for root from 61.177.172.168 port 41742 ssh2
Jul 25 08:33:24 PorscheCustomer sshd[7928]: error: maximum authentication attempts exceeded for root from 61.177.172.168 port 41742 ssh2 [preauth]
Jul 25 08:33:30 PorscheCustomer sshd[7932]: Failed password for root from 61.177.172.168 port 6613 ssh2
...
2020-07-25 14:44:05
61.177.172.41 attackspam
failed root login
2020-07-25 14:58:49
62.210.194.8 attack
Jul 25 05:33:49 mail.srvfarm.net postfix/smtpd[368884]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8]
Jul 25 05:35:54 mail.srvfarm.net postfix/smtpd[366539]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8]
Jul 25 05:38:00 mail.srvfarm.net postfix/smtpd[369028]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8]
Jul 25 05:40:07 mail.srvfarm.net postfix/smtpd[370123]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8]
Jul 25 05:41:11 mail.srvfarm.net postfix/smtpd[366536]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8]
2020-07-25 14:57:36
78.128.113.115 attack
2020-07-25T01:04:38.281240linuxbox-skyline auth[14906]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=postmaster rhost=78.128.113.115
...
2020-07-25 15:09:13
115.72.128.189 attackbots
2020-07-25T08:33:34.254349shiva sshd[32701]: Invalid user user from 115.72.128.189 port 59700
2020-07-25T08:33:39.109212shiva sshd[32706]: Invalid user operator from 115.72.128.189 port 50894
2020-07-25T08:33:39.261348shiva sshd[32703]: Invalid user admin from 115.72.128.189 port 58068
2020-07-25T08:33:43.527390shiva sshd[32710]: Invalid user support from 115.72.128.189 port 45888
2020-07-25T08:33:48.192957shiva sshd[32715]: Invalid user ubnt from 115.72.128.189 port 48968
...
2020-07-25 14:40:00
177.155.134.68 attackbotsspam
 TCP (SYN) 177.155.134.68:40191 -> port 1433, len 44
2020-07-25 14:42:01
217.115.244.158 attack
Jul 25 05:38:07 mail.srvfarm.net postfix/smtpd[369051]: warning: 217-115-244-158.cust.avonet.cz[217.115.244.158]: SASL PLAIN authentication failed: 
Jul 25 05:38:07 mail.srvfarm.net postfix/smtpd[369051]: lost connection after AUTH from 217-115-244-158.cust.avonet.cz[217.115.244.158]
Jul 25 05:40:11 mail.srvfarm.net postfix/smtps/smtpd[368125]: warning: 217-115-244-158.cust.avonet.cz[217.115.244.158]: SASL PLAIN authentication failed: 
Jul 25 05:40:11 mail.srvfarm.net postfix/smtps/smtpd[368125]: lost connection after AUTH from 217-115-244-158.cust.avonet.cz[217.115.244.158]
Jul 25 05:45:13 mail.srvfarm.net postfix/smtpd[369046]: warning: 217-115-244-158.cust.avonet.cz[217.115.244.158]: SASL PLAIN authentication failed:
2020-07-25 14:50:15

最近上报的IP列表

27.128.240.247 119.153.178.32 105.112.105.128 195.58.17.185
213.102.79.17 92.114.17.214 61.55.142.131 106.13.207.205
62.137.76.84 137.224.123.137 113.142.73.214 77.42.85.182
115.224.78.215 175.101.15.35 188.127.41.2 181.57.232.14
123.192.91.82 37.53.101.226 81.23.105.222 216.155.88.24