必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.155.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.155.34.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:14:42 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
34.155.149.104.in-addr.arpa domain name pointer mipoio.brituter.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.155.149.104.in-addr.arpa	name = mipoio.brituter.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.18 attackspambots
Mar 25 13:16:24 debian-2gb-nbg1-2 kernel: \[7397664.611054\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52013 PROTO=TCP SPT=50760 DPT=18111 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-25 20:19:52
185.176.27.46 attack
Port 1055 scan denied
2020-03-25 20:17:51
66.240.192.138 attackbots
Unauthorized connection attempt detected from IP address 66.240.192.138 to port 6000
2020-03-25 20:46:08
185.176.27.90 attack
03/25/2020-07:19:26.196231 185.176.27.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 20:17:19
83.97.20.49 attackbotsspam
scans 18 times in preceeding hours on the ports (in chronological order) 5353 6664 28017 8545 8139 10333 22105 1099 4949 1911 6665 61616 45554 4848 5560 1991 6667 8378 resulting in total of 18 scans from 83.97.20.0/24 block.
2020-03-25 20:39:03
198.108.67.63 attackbots
Mar 25 09:22:59 debian-2gb-nbg1-2 kernel: \[7383659.994191\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.63 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=4961 PROTO=TCP SPT=53770 DPT=49971 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-25 20:08:47
5.135.190.67 attack
2020-03-25T13:49:11.537844vps751288.ovh.net sshd\[11738\]: Invalid user support from 5.135.190.67 port 44238
2020-03-25T13:49:11.548006vps751288.ovh.net sshd\[11738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3121678.ip-5-135-190.eu
2020-03-25T13:49:13.333099vps751288.ovh.net sshd\[11738\]: Failed password for invalid user support from 5.135.190.67 port 44238 ssh2
2020-03-25T13:51:16.943666vps751288.ovh.net sshd\[11750\]: Invalid user oracle from 5.135.190.67 port 58232
2020-03-25T13:51:16.953913vps751288.ovh.net sshd\[11750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3121678.ip-5-135-190.eu
2020-03-25 20:59:24
89.248.160.150 attack
Port 41201 scan denied
2020-03-25 20:38:15
93.174.95.106 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 2480 resulting in total of 5 scans from 93.174.88.0/21 block.
2020-03-25 20:32:59
80.82.78.100 attackbotsspam
137/udp 1045/udp 1030/udp...
[2020-01-24/03-24]1964pkt,33pt.(udp)
2020-03-25 20:40:00
51.91.212.80 attackbots
scans once in preceeding hours on the ports (in chronological order) 4433 resulting in total of 3 scans from 51.91.212.0/24 block.
2020-03-25 20:47:45
178.34.190.34 attackspambots
2020-03-24 UTC: (31x) - ,admin(2x),carlos,carly,dacian,delma,er,golf,hr,jojo,jude,keiki,marylyn,mysql,ness,openfiler,qn,rabbitmq,rachele,rdp,rk,rufina,st,sybille,test,tu,u,user,xiang,zion
2020-03-25 20:53:20
80.82.77.245 attackbotsspam
Port 445 (MS DS) access denied
2020-03-25 20:40:32
92.118.37.70 attackspam
Port scan: Attack repeated for 24 hours
2020-03-25 20:34:59
198.108.66.234 attackspambots
8385/tcp 9072/tcp 9351/tcp...
[2020-01-26/03-25]99pkt,95pt.(tcp),1tp.(icmp)
2020-03-25 20:11:06

最近上报的IP列表

104.149.155.134 104.149.18.226 104.149.182.35 104.149.182.41
104.149.188.54 104.149.199.138 104.149.201.141 104.149.201.180
54.26.251.125 104.149.201.189 74.166.12.158 104.149.206.208
104.149.209.250 104.149.22.188 104.149.221.234 104.149.224.38
48.213.149.35 104.149.24.150 72.91.33.11 104.149.244.14