必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.11.134.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.11.134.26.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 23:45:38 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
26.134.11.103.in-addr.arpa domain name pointer 26.134.11.103.swin.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
26.134.11.103.in-addr.arpa	name = 26.134.11.103.swin.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
146.88.240.4 attackspambots
13.12.2019 07:06:11 Connection to port 27017 blocked by firewall
2019-12-13 15:09:36
211.220.27.191 attackspam
Dec 13 07:07:29 mail sshd[24848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191 
Dec 13 07:07:31 mail sshd[24848]: Failed password for invalid user Albert from 211.220.27.191 port 50114 ssh2
Dec 13 07:14:24 mail sshd[25878]: Failed password for root from 211.220.27.191 port 57384 ssh2
2019-12-13 14:48:12
160.16.148.109 attackbots
2019-12-13T06:32:25.830559shield sshd\[8739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-410-46105.vs.sakura.ne.jp  user=root
2019-12-13T06:32:27.377073shield sshd\[8739\]: Failed password for root from 160.16.148.109 port 52176 ssh2
2019-12-13T06:38:30.994003shield sshd\[9023\]: Invalid user wwwadmin from 160.16.148.109 port 33128
2019-12-13T06:38:30.999313shield sshd\[9023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-410-46105.vs.sakura.ne.jp
2019-12-13T06:38:32.319703shield sshd\[9023\]: Failed password for invalid user wwwadmin from 160.16.148.109 port 33128 ssh2
2019-12-13 15:03:46
139.59.94.225 attackbots
Dec 12 22:34:52 mockhub sshd[8766]: Failed password for backup from 139.59.94.225 port 59036 ssh2
...
2019-12-13 15:09:51
93.113.134.207 attackbots
(Dec 13)  LEN=40 TTL=241 ID=24984 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 TTL=241 ID=59377 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 TTL=241 ID=13092 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 TTL=241 ID=17425 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 TTL=241 ID=6135 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=28348 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=56932 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=18642 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=4041 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=43411 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=53282 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=59903 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=62822 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=62670 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TTL=241 ID=6165 DF TCP DPT=23 WINDOW=14600 SYN...
2019-12-13 15:04:22
200.48.214.19 attackspam
Dec 12 20:52:53 wbs sshd\[11580\]: Invalid user mesgina from 200.48.214.19
Dec 12 20:52:53 wbs sshd\[11580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.48.214.19
Dec 12 20:52:55 wbs sshd\[11580\]: Failed password for invalid user mesgina from 200.48.214.19 port 18154 ssh2
Dec 12 20:59:13 wbs sshd\[12219\]: Invalid user fadeh from 200.48.214.19
Dec 12 20:59:13 wbs sshd\[12219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.48.214.19
2019-12-13 15:06:26
218.92.0.179 attackspam
Dec 13 07:44:25 sso sshd[2434]: Failed password for root from 218.92.0.179 port 32059 ssh2
Dec 13 07:44:29 sso sshd[2434]: Failed password for root from 218.92.0.179 port 32059 ssh2
...
2019-12-13 14:46:48
185.143.221.186 attackspam
12/13/2019-01:40:41.926520 185.143.221.186 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-13 15:03:19
112.35.26.43 attackbots
Dec 13 07:46:19 mail sshd[30573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.26.43 
Dec 13 07:46:21 mail sshd[30573]: Failed password for invalid user linkwww2008 from 112.35.26.43 port 51530 ssh2
Dec 13 07:53:35 mail sshd[31687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.26.43
2019-12-13 14:55:12
46.38.144.146 attackbotsspam
Dec 13 07:56:16 s1 postfix/submission/smtpd\[12832\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:56:43 s1 postfix/submission/smtpd\[9285\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:57:11 s1 postfix/submission/smtpd\[12714\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:57:40 s1 postfix/submission/smtpd\[12704\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:58:07 s1 postfix/submission/smtpd\[12699\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:58:36 s1 postfix/submission/smtpd\[12704\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:59:04 s1 postfix/submission/smtpd\[12700\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 13 07:59:32 s1 postfix/submission/smtpd\[12709\]: warning: unknown\[4
2019-12-13 15:05:02
218.92.0.168 attack
Dec 13 07:23:09 mail sshd[27167]: Failed password for root from 218.92.0.168 port 38381 ssh2
Dec 13 07:23:12 mail sshd[27167]: Failed password for root from 218.92.0.168 port 38381 ssh2
Dec 13 07:23:17 mail sshd[27167]: Failed password for root from 218.92.0.168 port 38381 ssh2
Dec 13 07:23:20 mail sshd[27167]: Failed password for root from 218.92.0.168 port 38381 ssh2
2019-12-13 14:47:07
118.70.116.154 attackbots
Unauthorised access (Dec 13) SRC=118.70.116.154 LEN=52 TTL=109 ID=12134 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec 13) SRC=118.70.116.154 LEN=52 TTL=109 ID=24064 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec 11) SRC=118.70.116.154 LEN=52 TTL=110 ID=27443 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  9) SRC=118.70.116.154 LEN=52 TTL=110 ID=32410 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-13 14:43:30
69.244.198.97 attackbots
$f2bV_matches
2019-12-13 15:20:19
202.175.113.123 attack
Fail2Ban Ban Triggered
2019-12-13 14:42:07
222.175.100.119 attack
Unauthorized connection attempt from IP address 222.175.100.119 on Port 445(SMB)
2019-12-13 15:05:55

最近上报的IP列表

103.11.135.114 103.11.135.131 103.11.135.135 103.11.135.138
103.11.134.246 103.11.135.156 103.11.135.164 103.11.135.166
103.11.135.169 103.11.134.122 103.11.135.150 103.11.135.177
103.11.135.162 103.11.135.193 103.11.135.170 103.11.135.173
103.11.135.18 103.11.135.65 103.11.135.75 103.11.135.57