必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.70.149.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.70.149.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:03:13 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
134.149.70.108.in-addr.arpa domain name pointer 108-70-149-134.lightspeed.sndgca.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.149.70.108.in-addr.arpa	name = 108-70-149-134.lightspeed.sndgca.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.232.34.247 attackbotsspam
Jun  5 06:52:07 vpn01 sshd[13723]: Failed password for root from 49.232.34.247 port 48804 ssh2
...
2020-06-05 18:07:57
118.89.16.139 attack
Jun  5 10:45:21 h2779839 sshd[3405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.16.139  user=root
Jun  5 10:45:23 h2779839 sshd[3405]: Failed password for root from 118.89.16.139 port 54010 ssh2
Jun  5 10:47:21 h2779839 sshd[3416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.16.139  user=root
Jun  5 10:47:22 h2779839 sshd[3416]: Failed password for root from 118.89.16.139 port 50864 ssh2
Jun  5 10:49:12 h2779839 sshd[3447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.16.139  user=root
Jun  5 10:49:14 h2779839 sshd[3447]: Failed password for root from 118.89.16.139 port 47716 ssh2
Jun  5 10:51:04 h2779839 sshd[3480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.16.139  user=root
Jun  5 10:51:06 h2779839 sshd[3480]: Failed password for root from 118.89.16.139 port 44570 ssh2
Jun  5 10:53
...
2020-06-05 18:41:45
141.98.9.157 attack
2020-06-05T10:27:27.245811shield sshd\[8607\]: Invalid user admin from 141.98.9.157 port 33841
2020-06-05T10:27:27.251029shield sshd\[8607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
2020-06-05T10:27:29.409160shield sshd\[8607\]: Failed password for invalid user admin from 141.98.9.157 port 33841 ssh2
2020-06-05T10:27:52.746179shield sshd\[8639\]: Invalid user test from 141.98.9.157 port 39099
2020-06-05T10:27:52.750958shield sshd\[8639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
2020-06-05 18:31:41
51.91.212.80 attackbotsspam
06/05/2020-05:58:56.722794 51.91.212.80 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2020-06-05 18:24:12
103.90.231.179 attackspam
Jun  5 09:18:05 mout sshd[12144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.231.179  user=root
Jun  5 09:18:08 mout sshd[12144]: Failed password for root from 103.90.231.179 port 52396 ssh2
2020-06-05 18:03:24
51.91.212.81 attack
Jun  5 12:01:04 debian-2gb-nbg1-2 kernel: \[13610018.457977\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.91.212.81 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=37369 DPT=6443 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-05 18:20:02
66.96.235.110 attackspambots
2020-06-05T07:57:38.880475sd-86998 sshd[7904]: Invalid user sidney\r from 66.96.235.110 port 54176
2020-06-05T07:57:38.885710sd-86998 sshd[7904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.235.110
2020-06-05T07:57:38.880475sd-86998 sshd[7904]: Invalid user sidney\r from 66.96.235.110 port 54176
2020-06-05T07:57:40.574507sd-86998 sshd[7904]: Failed password for invalid user sidney\r from 66.96.235.110 port 54176 ssh2
2020-06-05T08:01:22.413229sd-86998 sshd[9033]: Invalid user jimoshazhouleng\r from 66.96.235.110 port 57098
...
2020-06-05 18:33:26
101.99.81.158 attackbotsspam
2020-06-05T11:57:08.151676+02:00  sshd[25878]: Failed password for root from 101.99.81.158 port 57705 ssh2
2020-06-05 18:12:44
106.12.60.40 attackbots
Jun  5 10:06:44 pi sshd[30452]: Failed password for root from 106.12.60.40 port 42394 ssh2
2020-06-05 18:39:28
112.85.42.186 attackspam
Jun  5 15:22:47 dhoomketu sshd[510061]: Failed password for root from 112.85.42.186 port 46213 ssh2
Jun  5 15:22:50 dhoomketu sshd[510061]: Failed password for root from 112.85.42.186 port 46213 ssh2
Jun  5 15:22:52 dhoomketu sshd[510061]: Failed password for root from 112.85.42.186 port 46213 ssh2
Jun  5 15:23:46 dhoomketu sshd[510076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Jun  5 15:23:48 dhoomketu sshd[510076]: Failed password for root from 112.85.42.186 port 24327 ssh2
...
2020-06-05 18:14:05
196.1.126.24 attackbotsspam
(SC/Seychelles/-) SMTP Bruteforcing attempts
2020-06-05 18:32:47
218.92.0.165 attackbots
2020-06-05T12:11:12.450531n23.at sshd[30334]: Failed password for root from 218.92.0.165 port 10817 ssh2
2020-06-05T12:11:16.723597n23.at sshd[30334]: Failed password for root from 218.92.0.165 port 10817 ssh2
2020-06-05T12:11:20.329550n23.at sshd[30334]: Failed password for root from 218.92.0.165 port 10817 ssh2
...
2020-06-05 18:12:12
167.172.195.99 attack
prod6
...
2020-06-05 18:41:57
51.77.230.49 attackspam
2020-06-05T03:40:31.466837abusebot.cloudsearch.cf sshd[8100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.ip-51-77-230.eu  user=root
2020-06-05T03:40:33.735828abusebot.cloudsearch.cf sshd[8100]: Failed password for root from 51.77.230.49 port 58136 ssh2
2020-06-05T03:43:50.335845abusebot.cloudsearch.cf sshd[8345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.ip-51-77-230.eu  user=root
2020-06-05T03:43:51.924003abusebot.cloudsearch.cf sshd[8345]: Failed password for root from 51.77.230.49 port 33840 ssh2
2020-06-05T03:47:10.885901abusebot.cloudsearch.cf sshd[8602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.ip-51-77-230.eu  user=root
2020-06-05T03:47:13.596911abusebot.cloudsearch.cf sshd[8602]: Failed password for root from 51.77.230.49 port 37774 ssh2
2020-06-05T03:50:31.132017abusebot.cloudsearch.cf sshd[8894]: pam_unix(sshd:auth): authentication
...
2020-06-05 18:31:10
62.171.144.195 attackbots
[2020-06-05 05:53:46] NOTICE[1288] chan_sip.c: Registration from '' failed for '62.171.144.195:46476' - Wrong password
[2020-06-05 05:53:46] SECURITY[1303] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-05T05:53:46.648-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="german",SessionID="0x7f4d7403c148",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.171.144.195/46476",Challenge="221601ac",ReceivedChallenge="221601ac",ReceivedHash="412cb09d6b2e26ebd58342124f572208"
[2020-06-05 05:55:10] NOTICE[1288] chan_sip.c: Registration from '' failed for '62.171.144.195:54114' - Wrong password
[2020-06-05 05:55:10] SECURITY[1303] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-05T05:55:10.899-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="germany1",SessionID="0x7f4d74371bc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
...
2020-06-05 18:05:48

最近上报的IP列表

170.163.79.180 53.243.155.158 185.36.236.162 55.68.110.129
91.91.202.27 65.86.218.213 156.133.255.67 192.149.127.61
12.119.55.58 59.119.205.38 200.235.141.155 46.224.242.54
188.100.196.239 214.138.249.158 133.81.100.32 125.222.240.194
246.55.152.191 50.149.131.96 228.121.238.133 73.121.204.175