必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.104.134.25 attackbotsspam
Sep  9 20:24:29 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:27:55 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:28:07 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:28:23 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:28:41 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-11 03:08:32
114.104.134.25 attackbots
Sep  9 20:24:29 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:27:55 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:28:07 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:28:23 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 20:28:41 srv01 postfix/smtpd\[29206\]: warning: unknown\[114.104.134.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-10 18:36:41
114.104.134.120 attack
Aug 22 07:36:34 srv01 postfix/smtpd\[25642\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 07:46:53 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 07:47:05 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 07:47:21 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 07:47:41 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-22 18:21:22
114.104.134.156 attackbots
Aug 20 16:05:39 srv01 postfix/smtpd\[2488\]: warning: unknown\[114.104.134.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 16:05:51 srv01 postfix/smtpd\[2488\]: warning: unknown\[114.104.134.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 16:06:08 srv01 postfix/smtpd\[2488\]: warning: unknown\[114.104.134.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 16:06:27 srv01 postfix/smtpd\[2488\]: warning: unknown\[114.104.134.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 16:06:39 srv01 postfix/smtpd\[2488\]: warning: unknown\[114.104.134.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-20 22:15:32
114.104.134.161 attackspam
Aug 15 15:45:33 srv01 postfix/smtpd\[32433\]: warning: unknown\[114.104.134.161\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 15:45:45 srv01 postfix/smtpd\[32433\]: warning: unknown\[114.104.134.161\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 15:45:59 srv01 postfix/smtpd\[32433\]: warning: unknown\[114.104.134.161\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 15:46:21 srv01 postfix/smtpd\[32433\]: warning: unknown\[114.104.134.161\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 15:46:32 srv01 postfix/smtpd\[32433\]: warning: unknown\[114.104.134.161\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-15 22:18:05
114.104.134.104 attackbotsspam
Aug  9 07:23:41 srv01 postfix/smtpd\[22459\]: warning: unknown\[114.104.134.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 07:37:26 srv01 postfix/smtpd\[27976\]: warning: unknown\[114.104.134.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 07:40:53 srv01 postfix/smtpd\[28784\]: warning: unknown\[114.104.134.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 07:41:07 srv01 postfix/smtpd\[28784\]: warning: unknown\[114.104.134.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 07:41:24 srv01 postfix/smtpd\[28784\]: warning: unknown\[114.104.134.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-09 16:05:50
114.104.134.29 attackbotsspam
MAIL: User Login Brute Force Attempt
2020-08-08 06:20:39
114.104.134.169 attackbots
Aug  5 08:41:51 srv01 postfix/smtpd\[14233\]: warning: unknown\[114.104.134.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  5 08:42:04 srv01 postfix/smtpd\[14233\]: warning: unknown\[114.104.134.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  5 08:42:22 srv01 postfix/smtpd\[14233\]: warning: unknown\[114.104.134.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  5 08:42:44 srv01 postfix/smtpd\[14233\]: warning: unknown\[114.104.134.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  5 08:42:56 srv01 postfix/smtpd\[14233\]: warning: unknown\[114.104.134.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-05 17:53:37
114.104.134.83 attack
Aug  1 08:07:15 srv01 postfix/smtpd\[5163\]: warning: unknown\[114.104.134.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:10:42 srv01 postfix/smtpd\[3929\]: warning: unknown\[114.104.134.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:14:09 srv01 postfix/smtpd\[1447\]: warning: unknown\[114.104.134.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:14:20 srv01 postfix/smtpd\[1447\]: warning: unknown\[114.104.134.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 08:14:41 srv01 postfix/smtpd\[1447\]: warning: unknown\[114.104.134.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-01 17:56:53
114.104.134.53 attackspambots
Jun 24 15:45:20 srv01 postfix/smtpd\[5170\]: warning: unknown\[114.104.134.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 15:45:32 srv01 postfix/smtpd\[5170\]: warning: unknown\[114.104.134.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 15:45:49 srv01 postfix/smtpd\[5170\]: warning: unknown\[114.104.134.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 16:05:01 srv01 postfix/smtpd\[5170\]: warning: unknown\[114.104.134.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 16:05:12 srv01 postfix/smtpd\[5170\]: warning: unknown\[114.104.134.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-24 23:36:00
114.104.134.188 attackspam
Jun 22 14:21:31 srv01 postfix/smtpd\[10075\]: warning: unknown\[114.104.134.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:21:43 srv01 postfix/smtpd\[10075\]: warning: unknown\[114.104.134.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:21:59 srv01 postfix/smtpd\[10075\]: warning: unknown\[114.104.134.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:22:17 srv01 postfix/smtpd\[10075\]: warning: unknown\[114.104.134.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:22:28 srv01 postfix/smtpd\[10075\]: warning: unknown\[114.104.134.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-23 03:42:25
114.104.134.142 attackbotsspam
Honeypot hit.
2020-04-29 08:41:44
114.104.134.28 attackspam
2020-01-10 22:46:51 dovecot_login authenticator failed for (vlduv) [114.104.134.28]:60364 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liuxiaohai@lerctr.org)
2020-01-10 22:46:58 dovecot_login authenticator failed for (mocei) [114.104.134.28]:60364 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liuxiaohai@lerctr.org)
2020-01-10 22:47:10 dovecot_login authenticator failed for (rrzav) [114.104.134.28]:60364 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=liuxiaohai@lerctr.org)
...
2020-01-11 20:28:33
114.104.134.72 attackbots
2019-12-28T15:28:22.690749 X postfix/smtpd[11424]: lost connection after AUTH from unknown[114.104.134.72]
2019-12-28T15:28:24.291496 X postfix/smtpd[8015]: lost connection after AUTH from unknown[114.104.134.72]
2019-12-28T15:28:24.390820 X postfix/smtpd[11424]: lost connection after AUTH from unknown[114.104.134.72]
2019-12-29 00:28:03
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.104.134.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.104.134.108.		IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:33:29 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 108.134.104.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.134.104.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.171.32.56 attackspambots
Apr  9 12:50:20 marvibiene sshd[24686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56  user=root
Apr  9 12:50:23 marvibiene sshd[24686]: Failed password for root from 223.171.32.56 port 4133 ssh2
Apr  9 13:03:27 marvibiene sshd[24984]: Invalid user teampspeak3 from 223.171.32.56 port 4133
...
2020-04-09 22:07:10
181.65.164.179 attack
Apr  9 14:59:25 haigwepa sshd[18678]: Failed password for root from 181.65.164.179 port 36026 ssh2
...
2020-04-09 21:19:00
159.89.197.1 attackspambots
Lines containing failures of 159.89.197.1
Apr  9 03:07:41 neweola sshd[31550]: Invalid user admin from 159.89.197.1 port 45324
Apr  9 03:07:41 neweola sshd[31550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.197.1 
Apr  9 03:07:43 neweola sshd[31550]: Failed password for invalid user admin from 159.89.197.1 port 45324 ssh2
Apr  9 03:07:45 neweola sshd[31550]: Received disconnect from 159.89.197.1 port 45324:11: Bye Bye [preauth]
Apr  9 03:07:45 neweola sshd[31550]: Disconnected from invalid user admin 159.89.197.1 port 45324 [preauth]
Apr  9 03:22:29 neweola sshd[379]: Invalid user emil from 159.89.197.1 port 35990
Apr  9 03:22:29 neweola sshd[379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.197.1 
Apr  9 03:22:31 neweola sshd[379]: Failed password for invalid user emil from 159.89.197.1 port 35990 ssh2
Apr  9 03:22:31 neweola sshd[379]: Received disconnect from 159.89.........
------------------------------
2020-04-09 21:13:07
118.25.151.40 attackbotsspam
Apr  9 20:03:49 itv-usvr-01 sshd[13869]: Invalid user deploy from 118.25.151.40
2020-04-09 21:29:25
122.51.45.200 attackbotsspam
Apr  9 14:58:28 v22019038103785759 sshd\[30351\]: Invalid user ubuntu from 122.51.45.200 port 57158
Apr  9 14:58:28 v22019038103785759 sshd\[30351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.45.200
Apr  9 14:58:31 v22019038103785759 sshd\[30351\]: Failed password for invalid user ubuntu from 122.51.45.200 port 57158 ssh2
Apr  9 15:03:30 v22019038103785759 sshd\[30651\]: Invalid user git-administrator2 from 122.51.45.200 port 52448
Apr  9 15:03:30 v22019038103785759 sshd\[30651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.45.200
...
2020-04-09 22:03:10
106.13.19.6 attackspam
2020-04-09T07:04:07.860876linuxbox-skyline sshd[44352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.6  user=root
2020-04-09T07:04:09.874745linuxbox-skyline sshd[44352]: Failed password for root from 106.13.19.6 port 43154 ssh2
...
2020-04-09 21:12:41
200.156.28.25 attackspam
Apr  9 14:58:42 sticky sshd\[10859\]: Invalid user ubuntu from 200.156.28.25 port 60456
Apr  9 14:58:42 sticky sshd\[10859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.156.28.25
Apr  9 14:58:44 sticky sshd\[10859\]: Failed password for invalid user ubuntu from 200.156.28.25 port 60456 ssh2
Apr  9 15:04:56 sticky sshd\[10881\]: Invalid user user from 200.156.28.25 port 43296
Apr  9 15:04:56 sticky sshd\[10881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.156.28.25
...
2020-04-09 21:15:39
129.204.109.127 attack
Apr  9 15:01:02 localhost sshd\[19750\]: Invalid user hbase from 129.204.109.127
Apr  9 15:01:02 localhost sshd\[19750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.109.127
Apr  9 15:01:04 localhost sshd\[19750\]: Failed password for invalid user hbase from 129.204.109.127 port 49460 ssh2
Apr  9 15:04:13 localhost sshd\[19860\]: Invalid user admin from 129.204.109.127
Apr  9 15:04:13 localhost sshd\[19860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.109.127
...
2020-04-09 21:08:52
159.89.114.40 attackspambots
Apr  9 14:59:51 v22018086721571380 sshd[23482]: Failed password for invalid user product from 159.89.114.40 port 42354 ssh2
2020-04-09 21:30:25
187.162.250.205 attackspam
Automatic report - Port Scan Attack
2020-04-09 21:28:39
104.236.22.133 attack
Apr  9 15:03:48 nextcloud sshd\[14760\]: Invalid user sftptest from 104.236.22.133
Apr  9 15:03:48 nextcloud sshd\[14760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133
Apr  9 15:03:51 nextcloud sshd\[14760\]: Failed password for invalid user sftptest from 104.236.22.133 port 42438 ssh2
2020-04-09 21:29:45
123.207.39.49 attackspam
SSH Bruteforce attack
2020-04-09 22:04:39
129.211.63.79 attackspambots
$f2bV_matches
2020-04-09 21:17:01
45.142.195.2 attack
SASL broute force
2020-04-09 22:06:03
51.38.129.120 attackbots
Apr  9 15:01:21 srv01 sshd[30743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120  user=postgres
Apr  9 15:01:23 srv01 sshd[30743]: Failed password for postgres from 51.38.129.120 port 52116 ssh2
Apr  9 15:04:10 srv01 sshd[30952]: Invalid user ubnt from 51.38.129.120 port 42388
Apr  9 15:04:10 srv01 sshd[30952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120
Apr  9 15:04:10 srv01 sshd[30952]: Invalid user ubnt from 51.38.129.120 port 42388
Apr  9 15:04:12 srv01 sshd[30952]: Failed password for invalid user ubnt from 51.38.129.120 port 42388 ssh2
...
2020-04-09 21:11:46

最近上报的IP列表

114.104.134.110 114.104.131.72 114.104.134.12 114.104.134.114
114.104.134.122 114.104.134.118 114.104.134.116 114.104.134.113
114.104.134.125 114.104.134.134 114.104.134.128 113.250.157.187
114.104.134.132 114.104.134.139 114.104.134.137 114.104.134.149
114.104.134.148 114.104.134.144 114.104.134.140 113.250.157.188