必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.34.214.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.34.214.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:59:09 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
161.214.34.100.in-addr.arpa domain name pointer pool-100-34-214-161.phlapa.fios.verizon.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.214.34.100.in-addr.arpa	name = pool-100-34-214-161.phlapa.fios.verizon.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.194.145.94 attackspambots
Lines containing failures of 196.194.145.94
Nov  2 04:41:52 Tosca sshd[28293]: Invalid user admin from 196.194.145.94 port 40576
Nov  2 04:41:52 Tosca sshd[28293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.194.145.94 
Nov  2 04:41:53 Tosca sshd[28293]: Failed password for invalid user admin from 196.194.145.94 port 40576 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=196.194.145.94
2019-11-03 00:48:56
183.15.123.226 attackspam
Nov  2 01:31:35 newdogma sshd[18591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.123.226  user=r.r
Nov  2 01:31:37 newdogma sshd[18591]: Failed password for r.r from 183.15.123.226 port 59476 ssh2
Nov  2 01:31:37 newdogma sshd[18591]: Received disconnect from 183.15.123.226 port 59476:11: Bye Bye [preauth]
Nov  2 01:31:37 newdogma sshd[18591]: Disconnected from 183.15.123.226 port 59476 [preauth]
Nov  2 01:37:54 newdogma sshd[18624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.123.226  user=r.r
Nov  2 01:37:56 newdogma sshd[18624]: Failed password for r.r from 183.15.123.226 port 43474 ssh2
Nov  2 01:37:56 newdogma sshd[18624]: Received disconnect from 183.15.123.226 port 43474:11: Bye Bye [preauth]
Nov  2 01:37:56 newdogma sshd[18624]: Disconnected from 183.15.123.226 port 43474 [preauth]
Nov  2 01:43:53 newdogma sshd[18675]: pam_unix(sshd:auth): authentication failur........
-------------------------------
2019-11-03 00:56:26
178.45.21.140 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/178.45.21.140/ 
 
 RU - 1H : (153)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 178.45.21.140 
 
 CIDR : 178.45.16.0/20 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 3 
  3H - 10 
  6H - 25 
 12H - 42 
 24H - 74 
 
 DateTime : 2019-11-02 12:53:06 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 00:51:28
185.232.67.5 attackspambots
Nov  2 17:33:01 dedicated sshd[6518]: Invalid user admin from 185.232.67.5 port 34511
2019-11-03 01:03:09
192.99.247.232 attack
Nov  2 03:10:19 eddieflores sshd\[17663\]: Invalid user danman from 192.99.247.232
Nov  2 03:10:19 eddieflores sshd\[17663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v6rwik.insurewise247.com
Nov  2 03:10:21 eddieflores sshd\[17663\]: Failed password for invalid user danman from 192.99.247.232 port 51220 ssh2
Nov  2 03:14:16 eddieflores sshd\[17944\]: Invalid user gm from 192.99.247.232
Nov  2 03:14:16 eddieflores sshd\[17944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v6rwik.insurewise247.com
2019-11-03 01:10:40
68.183.65.165 attack
Nov  2 19:08:01 server sshd\[24719\]: Invalid user pms from 68.183.65.165 port 54394
Nov  2 19:08:01 server sshd\[24719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.65.165
Nov  2 19:08:03 server sshd\[24719\]: Failed password for invalid user pms from 68.183.65.165 port 54394 ssh2
Nov  2 19:11:49 server sshd\[5551\]: Invalid user student from 68.183.65.165 port 37012
Nov  2 19:11:49 server sshd\[5551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.65.165
2019-11-03 01:17:51
185.36.218.75 attackspambots
slow and persistent scanner
2019-11-03 00:46:07
222.186.173.201 attackspam
DATE:2019-11-02 18:04:47, IP:222.186.173.201, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-11-03 01:19:36
183.88.218.141 attackbots
Nov  2 14:49:34 master sshd[31082]: Failed password for invalid user admin from 183.88.218.141 port 35356 ssh2
2019-11-03 00:46:28
165.22.211.73 attackspam
Invalid user zakri from 165.22.211.73 port 47344
2019-11-03 00:41:00
73.76.10.136 attackbots
3389BruteforceFW21
2019-11-03 01:15:49
179.177.11.176 attackspam
Nov  2 12:17:22 XXX sshd[7501]: Invalid user magic from 179.177.11.176 port 16524
2019-11-03 00:47:05
107.180.68.110 attackbotsspam
Nov  2 14:08:43 hcbbdb sshd\[4387\]: Invalid user xyzpdq from 107.180.68.110
Nov  2 14:08:43 hcbbdb sshd\[4387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-110.ip.secureserver.net
Nov  2 14:08:45 hcbbdb sshd\[4387\]: Failed password for invalid user xyzpdq from 107.180.68.110 port 42359 ssh2
Nov  2 14:12:29 hcbbdb sshd\[4739\]: Invalid user gp from 107.180.68.110
Nov  2 14:12:29 hcbbdb sshd\[4739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-110.ip.secureserver.net
2019-11-03 00:42:59
193.188.22.229 attackspam
ET COMPROMISED Known Compromised or Hostile Host Traffic group 10 - port: 443 proto: TCP cat: Misc Attack
2019-11-03 00:57:56
154.16.67.143 attack
Nov  2 02:05:33 sachi sshd\[11931\]: Invalid user wacao from 154.16.67.143
Nov  2 02:05:34 sachi sshd\[11931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.67.143
Nov  2 02:05:35 sachi sshd\[11931\]: Failed password for invalid user wacao from 154.16.67.143 port 60318 ssh2
Nov  2 02:09:53 sachi sshd\[12405\]: Invalid user jermaine from 154.16.67.143
Nov  2 02:09:53 sachi sshd\[12405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.67.143
2019-11-03 01:07:56

最近上报的IP列表

16.222.217.78 179.231.234.151 147.86.236.92 164.2.69.194
57.28.213.203 25.84.54.103 250.124.22.172 192.5.212.220
154.245.185.235 104.147.66.68 175.225.59.157 53.143.171.32
6.0.224.72 242.188.230.223 14.2.48.255 21.191.17.98
197.241.7.4 153.39.96.167 56.42.61.156 73.172.186.61