必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.34.13.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47217
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.34.13.6.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:29:50 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
b';; connection timed out; no servers could be reached
'
NSLOOKUP信息:
server can't find 117.34.13.6.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.53.57 attack
Aug  4 07:32:48 firewall sshd[25070]: Failed password for root from 157.230.53.57 port 54602 ssh2
Aug  4 07:36:42 firewall sshd[26917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.53.57  user=root
Aug  4 07:36:44 firewall sshd[26917]: Failed password for root from 157.230.53.57 port 37768 ssh2
...
2020-08-04 19:26:44
218.92.0.249 attackbots
Aug  4 21:31:24 localhost sshd[1844941]: Unable to negotiate with 218.92.0.249 port 25276: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-08-04 19:35:00
218.92.0.165 attackbotsspam
Aug  4 12:54:35 sso sshd[15522]: Failed password for root from 218.92.0.165 port 23239 ssh2
Aug  4 12:54:42 sso sshd[15522]: Failed password for root from 218.92.0.165 port 23239 ssh2
...
2020-08-04 19:35:19
95.245.4.149 attackspambots
Aug  2 09:12:48 xxxxxxx8 sshd[25730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.245.4.149  user=r.r
Aug  2 09:12:50 xxxxxxx8 sshd[25730]: Failed password for r.r from 95.245.4.149 port 41880 ssh2
Aug  2 09:28:08 xxxxxxx8 sshd[26764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.245.4.149  user=r.r
Aug  2 09:28:10 xxxxxxx8 sshd[26764]: Failed password for r.r from 95.245.4.149 port 32928 ssh2
Aug  2 09:37:52 xxxxxxx8 sshd[27417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.245.4.149  user=r.r
Aug  2 09:37:54 xxxxxxx8 sshd[27417]: Failed password for r.r from 95.245.4.149 port 38866 ssh2
Aug  2 09:41:17 xxxxxxx8 sshd[27921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.245.4.149  user=r.r
Aug  2 09:41:20 xxxxxxx8 sshd[27921]: Failed password for r.r from 95.245.4.149 port 40836 ssh2
Aug  ........
------------------------------
2020-08-04 19:42:12
101.37.21.63 attackbotsspam
Unauthorized connection attempt detected from IP address 101.37.21.63 to port 80
2020-08-04 19:40:51
104.243.25.75 attack
Aug  3 09:42:03 ns sshd[17065]: Connection from 104.243.25.75 port 33118 on 134.119.36.27 port 22
Aug  3 09:42:05 ns sshd[17065]: User r.r from 104.243.25.75 not allowed because not listed in AllowUsers
Aug  3 09:42:05 ns sshd[17065]: Failed password for invalid user r.r from 104.243.25.75 port 33118 ssh2
Aug  3 09:42:05 ns sshd[17065]: Received disconnect from 104.243.25.75 port 33118:11: Bye Bye [preauth]
Aug  3 09:42:05 ns sshd[17065]: Disconnected from 104.243.25.75 port 33118 [preauth]
Aug  3 10:08:02 ns sshd[1110]: Connection from 104.243.25.75 port 58222 on 134.119.36.27 port 22
Aug  3 10:08:28 ns sshd[1110]: Connection closed by 104.243.25.75 port 58222 [preauth]
Aug  3 10:20:46 ns sshd[24354]: Connection from 104.243.25.75 port 50234 on 134.119.36.27 port 22
Aug  3 10:20:50 ns sshd[24354]: User r.r from 104.243.25.75 not allowed because not listed in AllowUsers
Aug  3 10:20:50 ns sshd[24354]: Failed password for invalid user r.r from 104.243.25.75 port 50234 ss........
-------------------------------
2020-08-04 19:23:46
116.248.19.6 attackspam
Port probing on unauthorized port 5555
2020-08-04 19:13:13
78.156.121.246 attack
Aug  4 12:39:16 journals sshd\[38391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.156.121.246  user=root
Aug  4 12:39:17 journals sshd\[38391\]: Failed password for root from 78.156.121.246 port 40256 ssh2
Aug  4 12:43:35 journals sshd\[38896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.156.121.246  user=root
Aug  4 12:43:36 journals sshd\[38896\]: Failed password for root from 78.156.121.246 port 51880 ssh2
Aug  4 12:47:47 journals sshd\[39352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.156.121.246  user=root
...
2020-08-04 19:32:17
196.1.97.216 attackspambots
Aug  4 00:13:31 web1 sshd\[25933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216  user=root
Aug  4 00:13:33 web1 sshd\[25933\]: Failed password for root from 196.1.97.216 port 50860 ssh2
Aug  4 00:17:14 web1 sshd\[26242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216  user=root
Aug  4 00:17:16 web1 sshd\[26242\]: Failed password for root from 196.1.97.216 port 46174 ssh2
Aug  4 00:20:46 web1 sshd\[26534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216  user=root
2020-08-04 19:19:29
138.204.140.199 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-08-04 19:08:15
170.84.239.172 attackspam
Automatic report - XMLRPC Attack
2020-08-04 19:43:50
46.105.102.68 attackspam
WordPress wp-login brute force :: 46.105.102.68 0.088 - [04/Aug/2020:10:17:51  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1837 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-08-04 19:27:51
222.186.180.6 attack
2020-08-04T14:32:41.091983afi-git.jinr.ru sshd[27024]: Failed password for root from 222.186.180.6 port 62060 ssh2
2020-08-04T14:32:44.971398afi-git.jinr.ru sshd[27024]: Failed password for root from 222.186.180.6 port 62060 ssh2
2020-08-04T14:32:48.398569afi-git.jinr.ru sshd[27024]: Failed password for root from 222.186.180.6 port 62060 ssh2
2020-08-04T14:32:48.398704afi-git.jinr.ru sshd[27024]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 62060 ssh2 [preauth]
2020-08-04T14:32:48.398738afi-git.jinr.ru sshd[27024]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-04 19:37:24
185.97.119.150 attack
Aug  4 10:52:49 game-panel sshd[24592]: Failed password for root from 185.97.119.150 port 52222 ssh2
Aug  4 10:57:17 game-panel sshd[24835]: Failed password for root from 185.97.119.150 port 60738 ssh2
2020-08-04 19:09:31
116.247.108.10 attackspam
Aug  4 12:53:34 piServer sshd[32040]: Failed password for root from 116.247.108.10 port 36004 ssh2
Aug  4 12:56:52 piServer sshd[32467]: Failed password for root from 116.247.108.10 port 55458 ssh2
...
2020-08-04 19:11:27

最近上报的IP列表

117.34.13.60 117.34.13.20 117.34.13.50 117.34.13.78
117.34.13.75 117.34.13.9 117.36.116.112 117.36.117.140
117.35.201.67 117.35.158.74 117.36.2.250 117.37.205.131
117.39.63.162 117.4.186.92 117.4.139.127 117.4.163.22
117.4.201.195 117.4.192.69 117.4.84.187 117.4.245.124