必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.154.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.154.134.		IN	A

;; AUTHORITY SECTION:
.			585	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 27 07:39:24 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
134.154.149.104.in-addr.arpa domain name pointer brtdy.captnoman.co.uk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.154.149.104.in-addr.arpa	name = brtdy.captnoman.co.uk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
154.86.203.90 attackspam
154.86.203.90 -- Jan 31, 2:54:45 AM GMT+11 -- GET /search.aspx?search=bugg&f_sort=HP%22%20or%20(1,2)=(select*from(select%20name_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a)%20--%20%22x%22=%22x
2020-01-31 08:40:31
176.31.244.63 attack
Jan 31 01:21:54 lnxded63 sshd[16714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.244.63
2020-01-31 08:41:44
49.88.112.113 attackbots
Jan 30 19:28:27 plusreed sshd[27363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Jan 30 19:28:29 plusreed sshd[27363]: Failed password for root from 49.88.112.113 port 29362 ssh2
...
2020-01-31 08:31:30
121.176.202.191 attack
port scan and connect, tcp 23 (telnet)
2020-01-31 08:21:43
92.90.41.93 attackspambots
Jan 31 05:49:25 areeb-Workstation sshd[6588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.90.41.93 
Jan 31 05:49:27 areeb-Workstation sshd[6588]: Failed password for invalid user ganarupa from 92.90.41.93 port 55756 ssh2
...
2020-01-31 08:23:40
219.147.15.232 attackspam
Unauthorized connection attempt from IP address 219.147.15.232 on Port 445(SMB)
2020-01-31 08:20:59
34.80.177.141 attackbotsspam
Unauthorized connection attempt detected from IP address 34.80.177.141 to port 2220 [J]
2020-01-31 08:42:56
113.1.62.45 attackspam
Multiple failed FTP logins
2020-01-31 08:48:29
139.215.217.180 attack
Jan 31 00:41:01 [host] sshd[15266]: Invalid user sansiddhi from 139.215.217.180
Jan 31 00:41:01 [host] sshd[15266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180
Jan 31 00:41:03 [host] sshd[15266]: Failed password for invalid user sansiddhi from 139.215.217.180 port 41528 ssh2
2020-01-31 08:48:10
62.234.99.172 attackbotsspam
Unauthorized connection attempt detected from IP address 62.234.99.172 to port 2220 [J]
2020-01-31 08:33:01
193.148.69.60 attack
Invalid user jinendra from 193.148.69.60 port 54046
2020-01-31 08:19:01
189.112.239.33 attackbots
Jan 31 00:20:53 localhost sshd\[32586\]: Invalid user samrithi from 189.112.239.33 port 43179
Jan 31 00:20:53 localhost sshd\[32586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.239.33
Jan 31 00:20:55 localhost sshd\[32586\]: Failed password for invalid user samrithi from 189.112.239.33 port 43179 ssh2
2020-01-31 08:52:24
190.203.15.209 attackbots
Honeypot attack, port: 445, PTR: 190-203-15-209.dyn.dsl.cantv.net.
2020-01-31 08:18:15
182.180.105.103 attackspambots
Automatic report - Port Scan Attack
2020-01-31 08:19:27
222.186.15.158 attackbotsspam
Jan 31 01:28:23 dcd-gentoo sshd[11960]: User root from 222.186.15.158 not allowed because none of user's groups are listed in AllowGroups
Jan 31 01:28:25 dcd-gentoo sshd[11960]: error: PAM: Authentication failure for illegal user root from 222.186.15.158
Jan 31 01:28:23 dcd-gentoo sshd[11960]: User root from 222.186.15.158 not allowed because none of user's groups are listed in AllowGroups
Jan 31 01:28:25 dcd-gentoo sshd[11960]: error: PAM: Authentication failure for illegal user root from 222.186.15.158
Jan 31 01:28:23 dcd-gentoo sshd[11960]: User root from 222.186.15.158 not allowed because none of user's groups are listed in AllowGroups
Jan 31 01:28:25 dcd-gentoo sshd[11960]: error: PAM: Authentication failure for illegal user root from 222.186.15.158
Jan 31 01:28:25 dcd-gentoo sshd[11960]: Failed keyboard-interactive/pam for invalid user root from 222.186.15.158 port 16808 ssh2
...
2020-01-31 08:29:20

最近上报的IP列表

104.148.74.45 104.149.156.131 104.149.239.195 104.152.108.248
104.17.58.48 104.17.59.48 104.17.60.2 104.17.61.2
104.17.64.71 104.17.65.71 104.17.75.97 104.17.76.75
104.17.86.23 104.172.87.32 104.18.109.24 104.18.110.24
104.18.117.94 104.18.124.234 104.18.125.234 104.18.133.24