必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.134.148.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.134.148.99.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 11:43:11 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 99.148.134.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.148.134.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.164.113 attackspam
Sep 26 17:33:36 vps691689 sshd[17896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.164.113
Sep 26 17:33:38 vps691689 sshd[17896]: Failed password for invalid user postgres from 193.112.164.113 port 34192 ssh2
...
2019-09-27 00:34:54
103.76.252.6 attack
Sep 26 15:51:13 hcbbdb sshd\[28298\]: Invalid user public from 103.76.252.6
Sep 26 15:51:13 hcbbdb sshd\[28298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
Sep 26 15:51:15 hcbbdb sshd\[28298\]: Failed password for invalid user public from 103.76.252.6 port 40226 ssh2
Sep 26 15:56:08 hcbbdb sshd\[28818\]: Invalid user dustin from 103.76.252.6
Sep 26 15:56:08 hcbbdb sshd\[28818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
2019-09-27 00:01:40
46.217.90.32 attackspam
PHP.URI.Code.Injection
2019-09-27 00:09:19
49.234.46.134 attackspam
Sep 26 19:18:24 server sshd\[15437\]: Invalid user fh from 49.234.46.134 port 34400
Sep 26 19:18:24 server sshd\[15437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.46.134
Sep 26 19:18:25 server sshd\[15437\]: Failed password for invalid user fh from 49.234.46.134 port 34400 ssh2
Sep 26 19:28:03 server sshd\[16058\]: Invalid user fl from 49.234.46.134 port 41470
Sep 26 19:28:03 server sshd\[16058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.46.134
2019-09-27 00:46:57
51.255.171.51 attack
2019-09-26 14:49:55,742 fail2ban.actions: WARNING [ssh] Ban 51.255.171.51
2019-09-27 00:41:03
43.249.192.164 attackbotsspam
10 attempts against mh-pma-try-ban on grass.magehost.pro
2019-09-27 00:35:14
49.88.112.78 attack
Sep 26 11:54:30 plusreed sshd[15306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
Sep 26 11:54:31 plusreed sshd[15306]: Failed password for root from 49.88.112.78 port 57218 ssh2
Sep 26 11:54:34 plusreed sshd[15306]: Failed password for root from 49.88.112.78 port 57218 ssh2
Sep 26 11:54:30 plusreed sshd[15306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
Sep 26 11:54:31 plusreed sshd[15306]: Failed password for root from 49.88.112.78 port 57218 ssh2
Sep 26 11:54:34 plusreed sshd[15306]: Failed password for root from 49.88.112.78 port 57218 ssh2
...
2019-09-27 00:01:09
118.89.48.251 attackspambots
$f2bV_matches_ltvn
2019-09-27 00:07:53
168.232.198.18 attackbots
Sep 26 17:46:59 MK-Soft-Root2 sshd[4905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.18 
Sep 26 17:47:00 MK-Soft-Root2 sshd[4905]: Failed password for invalid user temp from 168.232.198.18 port 39985 ssh2
...
2019-09-27 00:05:49
89.163.146.71 attackspam
20 attempts against mh-misbehave-ban on pine.magehost.pro
2019-09-27 00:22:02
213.33.244.187 attack
F2B jail: sshd. Time: 2019-09-26 18:07:40, Reported by: VKReport
2019-09-27 00:17:52
54.36.150.19 attack
Automatic report - Banned IP Access
2019-09-27 00:44:47
139.59.135.84 attackbotsspam
Sep 26 05:44:01 php1 sshd\[31732\]: Invalid user silas from 139.59.135.84
Sep 26 05:44:01 php1 sshd\[31732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84
Sep 26 05:44:03 php1 sshd\[31732\]: Failed password for invalid user silas from 139.59.135.84 port 39556 ssh2
Sep 26 05:48:31 php1 sshd\[32140\]: Invalid user ibm from 139.59.135.84
Sep 26 05:48:31 php1 sshd\[32140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84
2019-09-27 00:06:19
36.80.42.153 attackspam
Sep 26 14:19:05 Ubuntu-1404-trusty-64-minimal sshd\[2849\]: Invalid user prp13 from 36.80.42.153
Sep 26 14:19:05 Ubuntu-1404-trusty-64-minimal sshd\[2849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.42.153
Sep 26 14:19:07 Ubuntu-1404-trusty-64-minimal sshd\[2849\]: Failed password for invalid user prp13 from 36.80.42.153 port 41550 ssh2
Sep 26 14:37:11 Ubuntu-1404-trusty-64-minimal sshd\[23950\]: Invalid user ethereal from 36.80.42.153
Sep 26 14:37:11 Ubuntu-1404-trusty-64-minimal sshd\[23950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.42.153
2019-09-27 00:25:04
123.11.199.57 attackbots
Unauthorised access (Sep 26) SRC=123.11.199.57 LEN=40 TTL=49 ID=55238 TCP DPT=8080 WINDOW=38059 SYN
2019-09-27 00:51:09

最近上报的IP列表

1.133.201.195 1.134.205.167 1.134.232.63 94.4.71.103
1.134.57.82 1.136.104.52 1.136.105.189 1.136.108.229
1.136.44.145 1.138.209.5 1.139.218.165 1.139.99.226
1.14.104.146 1.14.122.251 1.14.130.8 228.195.42.2
1.14.135.98 1.14.139.125 1.14.147.48 1.14.157.129