必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.207.134.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.207.134.131.		IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:52:23 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
131.134.207.104.in-addr.arpa domain name pointer 104.207.134.131.vultr.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.134.207.104.in-addr.arpa	name = 104.207.134.131.vultr.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.236.222 attackbots
Invalid user yaoyuan from 122.51.236.222 port 39484
2020-07-31 14:48:44
122.51.80.103 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-31 15:02:09
67.207.88.180 attackspambots
Unauthorized connection attempt detected from IP address 67.207.88.180 to port 14240
2020-07-31 15:02:46
159.89.129.36 attackspambots
Port scan denied
2020-07-31 14:54:31
193.35.51.13 attack
2020-07-31 08:47:40 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data \(set_id=harald.schueller@jugend-ohne-grenzen.net\)
2020-07-31 08:47:47 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-31 08:47:55 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-31 08:48:00 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-31 08:48:12 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
...
2020-07-31 15:05:10
222.186.175.23 attackbots
31.07.2020 06:39:28 SSH access blocked by firewall
2020-07-31 14:41:54
59.50.239.106 attack
Unauthorised access (Jul 31) SRC=59.50.239.106 LEN=40 TTL=51 ID=30021 TCP DPT=8080 WINDOW=51693 SYN 
Unauthorised access (Jul 31) SRC=59.50.239.106 LEN=40 TTL=51 ID=55921 TCP DPT=23 WINDOW=57797 SYN 
Unauthorised access (Jul 30) SRC=59.50.239.106 LEN=40 TTL=51 ID=61815 TCP DPT=8080 WINDOW=51693 SYN
2020-07-31 15:08:48
192.35.168.31 attackspambots
 UDP 192.35.168.31:56976 -> port 47808, len 45
2020-07-31 14:44:47
175.207.12.238 attackbots
Bruteforce detected by fail2ban
2020-07-31 14:59:13
18.190.106.79 attackspam
18.190.106.79 - - \[31/Jul/2020:07:42:01 +0200\] "POST /wp-login.php HTTP/1.0" 200 2507 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
18.190.106.79 - - \[31/Jul/2020:07:42:03 +0200\] "POST /wp-login.php HTTP/1.0" 200 2473 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
18.190.106.79 - - \[31/Jul/2020:07:42:05 +0200\] "POST /wp-login.php HTTP/1.0" 200 2470 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-31 15:07:18
222.186.42.137 attackspambots
Jul 30 21:47:44 vm0 sshd[13910]: Failed password for root from 222.186.42.137 port 52842 ssh2
Jul 31 08:51:25 vm0 sshd[6560]: Failed password for root from 222.186.42.137 port 48220 ssh2
...
2020-07-31 14:54:03
76.68.154.155 attackbotsspam
Port probing on unauthorized port 23
2020-07-31 15:14:13
116.73.24.9 attack
" "
2020-07-31 15:12:01
202.185.199.64 attackbotsspam
Jul 31 09:04:01 hosting sshd[12318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.185.199.64  user=root
Jul 31 09:04:03 hosting sshd[12318]: Failed password for root from 202.185.199.64 port 51288 ssh2
...
2020-07-31 15:09:17
46.101.19.133 attackbots
Jul 31 06:27:16 ip-172-31-61-156 sshd[6159]: Failed password for root from 46.101.19.133 port 41955 ssh2
Jul 31 06:31:46 ip-172-31-61-156 sshd[6357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
Jul 31 06:31:47 ip-172-31-61-156 sshd[6357]: Failed password for root from 46.101.19.133 port 47583 ssh2
Jul 31 06:36:06 ip-172-31-61-156 sshd[6527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
Jul 31 06:36:08 ip-172-31-61-156 sshd[6527]: Failed password for root from 46.101.19.133 port 53210 ssh2
...
2020-07-31 14:55:49

最近上报的IP列表

104.207.131.237 104.207.134.206 104.207.135.118 104.207.135.101
104.207.134.233 104.207.135.156 104.207.135.136 104.207.135.63
104.207.135.206 101.109.220.127 104.207.138.109 104.207.135.146
104.207.138.114 104.207.138.175 104.207.138.16 104.207.138.116
104.207.139.147 104.207.139.28 104.207.140.108 104.207.139.207