必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sri Lanka

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.134.143.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.134.143.220.		IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:06:44 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 220.143.134.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.143.134.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.60.81.90 attack
5555/tcp
[2019-07-11]1pkt
2019-07-11 18:26:58
31.170.123.203 attackbots
9-7-2019 11:16:37	Brute force attack by common bot infected identified EHLO/HELO: USER
9-7-2019 11:16:37	Connection from IP address: 31.170.123.203 on port: 25


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.170.123.203
2019-07-11 18:19:17
83.15.183.138 attackbots
Jul 11 06:23:01 legacy sshd[28574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.15.183.138
Jul 11 06:23:02 legacy sshd[28574]: Failed password for invalid user stack from 83.15.183.138 port 15557 ssh2
Jul 11 06:26:31 legacy sshd[28724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.15.183.138
...
2019-07-11 18:16:38
54.37.205.162 attack
Jul 11 09:42:49 MK-Soft-Root1 sshd\[10663\]: Invalid user edwina from 54.37.205.162 port 34268
Jul 11 09:42:49 MK-Soft-Root1 sshd\[10663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.205.162
Jul 11 09:42:51 MK-Soft-Root1 sshd\[10663\]: Failed password for invalid user edwina from 54.37.205.162 port 34268 ssh2
...
2019-07-11 18:17:42
82.221.105.7 attack
2019-07-11T09:33:10.162613Z 816324244e40 New connection: 82.221.105.7:48941 (172.17.0.4:2222) [session: 816324244e40]
2019-07-11T09:33:10.556234Z 24e0d237b932 New connection: 82.221.105.7:48973 (172.17.0.4:2222) [session: 24e0d237b932]
2019-07-11 18:05:23
196.52.43.88 attackbotsspam
5060/tcp 23/tcp 5632/udp...
[2019-05-10/07-10]70pkt,40pt.(tcp),8pt.(udp)
2019-07-11 17:50:28
107.170.196.241 attack
31201/tcp 23481/tcp 623/udp...
[2019-05-12/07-10]51pkt,45pt.(tcp),2pt.(udp)
2019-07-11 17:48:47
138.185.166.194 attack
Jul 10 20:09:44 mxgate1 postfix/postscreen[26117]: CONNECT from [138.185.166.194]:49880 to [176.31.12.44]:25
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26118]: addr 138.185.166.194 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26118]: addr 138.185.166.194 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26122]: addr 138.185.166.194 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26119]: addr 138.185.166.194 listed by domain bl.spamcop.net as 127.0.0.2
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26121]: addr 138.185.166.194 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 10 20:09:45 mxgate1 postfix/dnsblog[26166]: addr 138.185.166.194 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 10 20:09:45 mxgate1 postfix/postscreen[26117]: PREGREET 38 after 0.53 from [138.185.166.194]:49880: EHLO ip138-185-166-194.netjat.com.br

Jul 10 20:09:45 mxgate1 postfix........
-------------------------------
2019-07-11 18:27:41
203.218.36.136 attackbotsspam
" "
2019-07-11 17:54:56
198.108.67.42 attack
2095/tcp 3088/tcp 3690/tcp...
[2019-05-10/07-10]109pkt,104pt.(tcp)
2019-07-11 18:02:59
101.68.70.14 attackbotsspam
Jul 11 12:47:54 hosting sshd[17974]: Invalid user tes from 101.68.70.14 port 47101
Jul 11 12:47:54 hosting sshd[17974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.70.14
Jul 11 12:47:54 hosting sshd[17974]: Invalid user tes from 101.68.70.14 port 47101
Jul 11 12:47:55 hosting sshd[17974]: Failed password for invalid user tes from 101.68.70.14 port 47101 ssh2
Jul 11 12:50:47 hosting sshd[18353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.70.14  user=admin
Jul 11 12:50:49 hosting sshd[18353]: Failed password for admin from 101.68.70.14 port 56405 ssh2
...
2019-07-11 18:14:17
217.12.126.20 attack
Jul 11 02:54:48 rigel postfix/smtpd[10244]: warning: hostname static.217.12.126.20.tmg.md does not resolve to address 217.12.126.20: Name or service not known
Jul 11 02:54:48 rigel postfix/smtpd[10244]: connect from unknown[217.12.126.20]
Jul 11 02:54:48 rigel postfix/smtpd[10244]: warning: unknown[217.12.126.20]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 11 02:54:48 rigel postfix/smtpd[10244]: warning: unknown[217.12.126.20]: SASL PLAIN authentication failed: authentication failure
Jul 11 02:54:49 rigel postfix/smtpd[10244]: warning: unknown[217.12.126.20]: SASL LOGIN authentication failed: authentication failure
Jul 11 02:54:49 rigel postfix/smtpd[10244]: disconnect from unknown[217.12.126.20]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.12.126.20
2019-07-11 18:22:52
37.187.19.222 attack
$f2bV_matches
2019-07-11 17:49:30
27.124.2.123 attackspambots
SMB Server BruteForce Attack
2019-07-11 18:18:42
181.143.17.66 attackspam
Attempts against Pop3/IMAP
2019-07-11 18:02:28

最近上报的IP列表

112.119.87.94 112.134.169.190 112.134.141.184 112.134.186.42
112.134.143.201 112.134.217.48 112.134.187.231 112.134.209.231
112.134.158.135 112.134.190.106 112.134.218.211 112.134.219.177
112.134.220.71 112.134.240.239 112.134.246.147 112.134.249.206
112.134.252.87 112.134.245.8 112.134.67.169 112.134.231.196