必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.134.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.134.105.		IN	A

;; AUTHORITY SECTION:
.			529	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:40:01 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
105.134.202.116.in-addr.arpa domain name pointer optimus.myhostingdomain.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.134.202.116.in-addr.arpa	name = optimus.myhostingdomain.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.172.166.134 attack
Sep  3 18:47:50 pixelmemory sshd[3481509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.172.166.134 
Sep  3 18:47:50 pixelmemory sshd[3481509]: Invalid user le from 114.172.166.134 port 60131
Sep  3 18:47:52 pixelmemory sshd[3481509]: Failed password for invalid user le from 114.172.166.134 port 60131 ssh2
Sep  3 18:50:50 pixelmemory sshd[3481873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.172.166.134  user=root
Sep  3 18:50:51 pixelmemory sshd[3481873]: Failed password for root from 114.172.166.134 port 54326 ssh2
...
2020-09-05 03:48:31
45.95.168.190 attackbotsspam
2020-09-04T19:30:13.410494shield sshd\[25536\]: Invalid user ftpuser from 45.95.168.190 port 39638
2020-09-04T19:30:13.421941shield sshd\[25536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.190
2020-09-04T19:30:15.907470shield sshd\[25536\]: Failed password for invalid user ftpuser from 45.95.168.190 port 39638 ssh2
2020-09-04T19:31:15.525093shield sshd\[25613\]: Invalid user postgres from 45.95.168.190 port 59968
2020-09-04T19:31:15.544048shield sshd\[25613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.190
2020-09-05 03:31:41
181.114.70.201 attack
Lines containing failures of 181.114.70.201
Sep  3 18:39:46 omfg postfix/smtpd[15260]: connect from host-181-114-70-201.supernet.com.bo[181.114.70.201]
Sep x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.114.70.201
2020-09-05 03:36:47
134.175.231.167 attackbotsspam
Sep  4 19:23:48 OPSO sshd\[19669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.231.167  user=root
Sep  4 19:23:49 OPSO sshd\[19669\]: Failed password for root from 134.175.231.167 port 45798 ssh2
Sep  4 19:27:19 OPSO sshd\[20133\]: Invalid user debian from 134.175.231.167 port 53780
Sep  4 19:27:19 OPSO sshd\[20133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.231.167
Sep  4 19:27:21 OPSO sshd\[20133\]: Failed password for invalid user debian from 134.175.231.167 port 53780 ssh2
2020-09-05 03:30:41
193.33.240.91 attack
Sep  3 19:53:10 h2646465 sshd[6830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.240.91  user=root
Sep  3 19:53:12 h2646465 sshd[6830]: Failed password for root from 193.33.240.91 port 46452 ssh2
Sep  3 20:05:19 h2646465 sshd[9079]: Invalid user user3 from 193.33.240.91
Sep  3 20:05:19 h2646465 sshd[9079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.240.91
Sep  3 20:05:19 h2646465 sshd[9079]: Invalid user user3 from 193.33.240.91
Sep  3 20:05:21 h2646465 sshd[9079]: Failed password for invalid user user3 from 193.33.240.91 port 55803 ssh2
Sep  3 20:12:21 h2646465 sshd[9873]: Invalid user mona from 193.33.240.91
Sep  3 20:12:21 h2646465 sshd[9873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.240.91
Sep  3 20:12:21 h2646465 sshd[9873]: Invalid user mona from 193.33.240.91
Sep  3 20:12:23 h2646465 sshd[9873]: Failed password for invalid user mona from 193.33.240
2020-09-05 03:28:19
39.153.252.94 attackspam
Sep  2 19:43:54 www3-7 sshd[25235]: Did not receive identification string from 39.153.252.94 port 40327
Sep  3 11:50:01 www3-7 sshd[13399]: Did not receive identification string from 39.153.252.94 port 48125
Sep  3 11:50:08 www3-7 sshd[13482]: Invalid user user from 39.153.252.94 port 54153
Sep  3 11:50:09 www3-7 sshd[13482]: Connection closed by 39.153.252.94 port 54153 [preauth]
Sep  3 11:51:03 www3-7 sshd[13486]: Invalid user oracle from 39.153.252.94 port 38673
Sep  3 11:51:07 www3-7 sshd[13486]: Connection closed by 39.153.252.94 port 38673 [preauth]
Sep  3 11:51:09 www3-7 sshd[13545]: Invalid user admin from 39.153.252.94 port 49882
Sep  3 11:51:10 www3-7 sshd[13545]: Connection closed by 39.153.252.94 port 49882 [preauth]
Sep  3 11:51:19 www3-7 sshd[13547]: Invalid user test from 39.153.252.94 port 53810
Sep  3 11:51:27 www3-7 sshd[13547]: Connection closed by 39.153.252.94 port 53810 [preauth]
Sep  3 11:51:50 www3-7 sshd[13554]: Invalid user hadoop from 39.153.2........
-------------------------------
2020-09-05 03:34:11
81.193.146.213 attackbotsspam
Automatic report - Port Scan Attack
2020-09-05 03:27:18
54.39.16.73 attackbotsspam
Sep  4 17:00:15 neko-world sshd[15975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.16.73  user=root
Sep  4 17:00:17 neko-world sshd[15975]: Failed password for invalid user root from 54.39.16.73 port 46402 ssh2
2020-09-05 03:38:28
207.244.70.35 attackbotsspam
Automatic report - Banned IP Access
2020-09-05 03:50:22
1.214.156.164 attackspam
2020-09-04T21:02:02+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-09-05 03:29:31
49.234.96.210 attack
2020-09-05T01:48:30.371457hostname sshd[2275]: Invalid user zt from 49.234.96.210 port 51714
2020-09-05T01:48:32.242754hostname sshd[2275]: Failed password for invalid user zt from 49.234.96.210 port 51714 ssh2
2020-09-05T01:54:24.041539hostname sshd[3009]: Invalid user ftp1 from 49.234.96.210 port 52920
...
2020-09-05 03:31:12
194.67.210.77 attackspam
Automated report (2020-09-04T13:25:33+08:00). Faked user agent detected.
2020-09-05 03:30:12
49.234.52.176 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-04T18:49:07Z and 2020-09-04T18:52:54Z
2020-09-05 03:24:15
190.74.164.58 attackspambots
Honeypot attack, port: 445, PTR: 190.74-164-58.dyn.dsl.cantv.net.
2020-09-05 03:45:57
188.122.82.146 attackbotsspam
0,19-02/03 [bc01/m20] PostRequest-Spammer scoring: zurich
2020-09-05 03:59:48

最近上报的IP列表

116.202.145.225 116.202.146.49 116.202.131.123 116.202.160.114
116.202.133.133 116.202.160.184 116.202.162.232 116.202.175.240
116.202.162.130 116.202.169.24 116.202.192.240 116.202.192.13
116.202.192.24 116.202.193.189 116.202.193.204 116.202.198.146
116.202.193.168 116.202.187.195 116.202.198.105 116.202.193.203