必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.54.94.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.54.94.134.			IN	A

;; AUTHORITY SECTION:
.			591	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:35:57 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.94.54.116.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 116.54.94.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.50.169.201 attack
Dec 18 05:09:24 hanapaa sshd\[24814\]: Invalid user deppon\(\* from 27.50.169.201
Dec 18 05:09:24 hanapaa sshd\[24814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.169.201
Dec 18 05:09:26 hanapaa sshd\[24814\]: Failed password for invalid user deppon\(\* from 27.50.169.201 port 37299 ssh2
Dec 18 05:16:16 hanapaa sshd\[25370\]: Invalid user koke from 27.50.169.201
Dec 18 05:16:16 hanapaa sshd\[25370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.169.201
2019-12-19 01:20:09
195.208.136.114 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 14:35:10.
2019-12-19 01:29:05
192.144.129.98 attack
Dec 18 18:16:11 OPSO sshd\[15751\]: Invalid user test from 192.144.129.98 port 56334
Dec 18 18:16:11 OPSO sshd\[15751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.129.98
Dec 18 18:16:14 OPSO sshd\[15751\]: Failed password for invalid user test from 192.144.129.98 port 56334 ssh2
Dec 18 18:23:53 OPSO sshd\[17085\]: Invalid user guest from 192.144.129.98 port 54644
Dec 18 18:23:53 OPSO sshd\[17085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.129.98
2019-12-19 01:34:25
40.92.73.14 attackspambots
Dec 18 17:35:25 debian-2gb-vpn-nbg1-1 kernel: [1058089.795204] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.73.14 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=111 ID=12156 DF PROTO=TCP SPT=35203 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-19 01:16:15
103.132.244.215 attack
1576679702 - 12/18/2019 15:35:02 Host: 103.132.244.215/103.132.244.215 Port: 445 TCP Blocked
2019-12-19 01:40:17
123.30.149.76 attackspam
Dec 18 14:34:56 sshgateway sshd\[14421\]: Invalid user guest from 123.30.149.76
Dec 18 14:34:56 sshgateway sshd\[14421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.76
Dec 18 14:34:58 sshgateway sshd\[14421\]: Failed password for invalid user guest from 123.30.149.76 port 56850 ssh2
2019-12-19 01:43:57
116.196.117.154 attackbotsspam
Dec 18 17:50:11 lnxmail61 sshd[20806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.117.154
Dec 18 17:50:13 lnxmail61 sshd[20806]: Failed password for invalid user erpelding from 116.196.117.154 port 57970 ssh2
Dec 18 17:56:41 lnxmail61 sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.117.154
2019-12-19 01:14:42
37.98.224.105 attackspam
Dec 18 11:23:36 Tower sshd[16243]: Connection from 37.98.224.105 port 57772 on 192.168.10.220 port 22
Dec 18 11:23:37 Tower sshd[16243]: Invalid user ssh from 37.98.224.105 port 57772
Dec 18 11:23:37 Tower sshd[16243]: error: Could not get shadow information for NOUSER
Dec 18 11:23:37 Tower sshd[16243]: Failed password for invalid user ssh from 37.98.224.105 port 57772 ssh2
Dec 18 11:23:37 Tower sshd[16243]: Received disconnect from 37.98.224.105 port 57772:11: Bye Bye [preauth]
Dec 18 11:23:37 Tower sshd[16243]: Disconnected from invalid user ssh 37.98.224.105 port 57772 [preauth]
2019-12-19 01:15:37
106.12.48.216 attackspambots
Dec 18 14:35:28 marvibiene sshd[51480]: Invalid user ploger from 106.12.48.216 port 50768
Dec 18 14:35:28 marvibiene sshd[51480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.216
Dec 18 14:35:28 marvibiene sshd[51480]: Invalid user ploger from 106.12.48.216 port 50768
Dec 18 14:35:30 marvibiene sshd[51480]: Failed password for invalid user ploger from 106.12.48.216 port 50768 ssh2
...
2019-12-19 01:13:23
61.84.196.50 attackbots
Dec 18 15:48:42 legacy sshd[21718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
Dec 18 15:48:44 legacy sshd[21718]: Failed password for invalid user armey from 61.84.196.50 port 47422 ssh2
Dec 18 15:55:34 legacy sshd[21976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
...
2019-12-19 01:35:32
75.80.193.222 attackspam
Dec 18 17:57:21 legacy sshd[26654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.80.193.222
Dec 18 17:57:23 legacy sshd[26654]: Failed password for invalid user juliejung from 75.80.193.222 port 33760 ssh2
Dec 18 18:04:42 legacy sshd[26887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.80.193.222
...
2019-12-19 01:23:30
157.230.235.233 attackbots
Dec 18 18:02:27 localhost sshd\[8993\]: Invalid user 123456 from 157.230.235.233 port 37302
Dec 18 18:02:27 localhost sshd\[8993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Dec 18 18:02:29 localhost sshd\[8993\]: Failed password for invalid user 123456 from 157.230.235.233 port 37302 ssh2
2019-12-19 01:18:11
193.32.163.44 attackspam
33894/tcp 33896/tcp 33987/tcp...
[2019-10-18/12-18]718pkt,192pt.(tcp)
2019-12-19 01:40:36
123.185.9.104 attack
Automatic report - Port Scan Attack
2019-12-19 01:39:51
106.75.10.4 attackspam
$f2bV_matches
2019-12-19 01:17:08

最近上报的IP列表

146.70.52.58 45.229.54.238 178.168.10.186 34.150.187.160
106.198.12.182 64.227.76.157 156.211.147.163 189.171.38.118
153.34.138.112 119.160.69.21 209.127.164.78 92.119.70.229
49.205.82.80 5.181.86.10 94.174.102.70 191.253.192.196
202.164.56.83 188.162.144.243 142.93.152.16 117.179.111.181