必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): AT&T Corp.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/99.99.139.67/ 
 
 US - 1H : (61)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7018 
 
 IP : 99.99.139.67 
 
 CIDR : 99.96.0.0/13 
 
 PREFIX COUNT : 9621 
 
 UNIQUE IP COUNT : 81496832 
 
 
 ATTACKS DETECTED ASN7018 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 4 
 
 DateTime : 2020-03-29 23:32:51 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-30 06:42:51
attackbotsspam
Unauthorized connection attempt detected from IP address 99.99.139.67 to port 23 [J]
2020-01-19 17:50:56
attackspambots
Unauthorized connection attempt detected from IP address 99.99.139.67 to port 8000 [J]
2020-01-17 17:20:23
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.99.139.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.99.139.67.			IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011700 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 17:20:19 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
67.139.99.99.in-addr.arpa domain name pointer 99-99-139-67.lightspeed.wepbfl.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.139.99.99.in-addr.arpa	name = 99-99-139-67.lightspeed.wepbfl.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
86.104.220.20 attack
Aug 23 09:18:37 ArkNodeAT sshd\[3411\]: Invalid user aaron from 86.104.220.20
Aug 23 09:18:37 ArkNodeAT sshd\[3411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.104.220.20
Aug 23 09:18:39 ArkNodeAT sshd\[3411\]: Failed password for invalid user aaron from 86.104.220.20 port 53288 ssh2
2019-08-23 18:52:27
190.64.68.181 attackbotsspam
Aug 23 12:22:58 vps01 sshd[25747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.181
Aug 23 12:23:00 vps01 sshd[25747]: Failed password for invalid user inc0metax from 190.64.68.181 port 57505 ssh2
2019-08-23 19:05:25
192.42.116.14 attack
SSH 15 Failed Logins
2019-08-23 19:05:09
145.239.133.27 attackbots
$f2bV_matches
2019-08-23 19:09:22
185.220.102.4 attackbotsspam
SSH 15 Failed Logins
2019-08-23 18:37:29
193.112.196.240 attackbots
Invalid user dev from 193.112.196.240 port 58054
2019-08-23 19:04:38
106.12.134.58 attack
Invalid user tom from 106.12.134.58 port 42106
2019-08-23 18:50:48
81.169.251.133 attackbots
Invalid user mythic from 81.169.251.133 port 54156
2019-08-23 18:52:50
211.143.246.38 attack
Aug 23 11:32:25 MK-Soft-Root1 sshd\[758\]: Invalid user testing from 211.143.246.38 port 39336
Aug 23 11:32:25 MK-Soft-Root1 sshd\[758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38
Aug 23 11:32:27 MK-Soft-Root1 sshd\[758\]: Failed password for invalid user testing from 211.143.246.38 port 39336 ssh2
...
2019-08-23 19:01:16
113.204.228.66 attack
Invalid user allen from 113.204.228.66 port 43400
2019-08-23 19:16:58
176.42.46.145 attackspambots
Invalid user admina from 176.42.46.145 port 52492
2019-08-23 19:06:36
133.130.89.115 attackspambots
Aug 23 13:01:28 bouncer sshd\[18390\]: Invalid user aaa from 133.130.89.115 port 35444
Aug 23 13:01:28 bouncer sshd\[18390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.115 
Aug 23 13:01:30 bouncer sshd\[18390\]: Failed password for invalid user aaa from 133.130.89.115 port 35444 ssh2
...
2019-08-23 19:12:49
107.179.116.226 attackspambots
Invalid user oracle from 107.179.116.226 port 38104
2019-08-23 18:49:28
213.59.184.12 attackspambots
Aug 23 09:36:30 vps691689 sshd[12280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.184.12
Aug 23 09:36:32 vps691689 sshd[12280]: Failed password for invalid user fg from 213.59.184.12 port 36689 ssh2
Aug 23 09:41:04 vps691689 sshd[12345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.184.12
...
2019-08-23 19:00:49
223.196.89.130 attack
SSH Brute-Force reported by Fail2Ban
2019-08-23 19:00:20

最近上报的IP列表

41.129.40.166 41.38.160.58 39.105.132.227 31.25.131.76
27.66.126.122 14.228.42.55 2.93.157.244 2.37.151.44
213.26.141.26 211.252.34.42 201.24.127.39 191.187.193.168
191.55.129.231 189.235.98.61 189.209.167.177 188.175.106.85
188.72.5.226 188.3.6.15 19.165.76.159 187.167.194.168