必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.99.122.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.99.122.134.			IN	A

;; AUTHORITY SECTION:
.			75	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 10:21:31 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.122.99.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.122.99.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.97.53.81 attackbots
Dec 14 21:22:20 sachi sshd\[23820\]: Invalid user spygirl from 23.97.53.81
Dec 14 21:22:20 sachi sshd\[23820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.53.81
Dec 14 21:22:23 sachi sshd\[23820\]: Failed password for invalid user spygirl from 23.97.53.81 port 38258 ssh2
Dec 14 21:28:40 sachi sshd\[24365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.53.81  user=root
Dec 14 21:28:42 sachi sshd\[24365\]: Failed password for root from 23.97.53.81 port 49070 ssh2
2019-12-15 15:34:03
136.36.12.55 attackbots
Dec 15 08:36:24 loxhost sshd\[15939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.36.12.55  user=root
Dec 15 08:36:26 loxhost sshd\[15939\]: Failed password for root from 136.36.12.55 port 57274 ssh2
Dec 15 08:42:40 loxhost sshd\[16101\]: Invalid user hung from 136.36.12.55 port 37962
Dec 15 08:42:40 loxhost sshd\[16101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.36.12.55
Dec 15 08:42:41 loxhost sshd\[16101\]: Failed password for invalid user hung from 136.36.12.55 port 37962 ssh2
...
2019-12-15 15:59:30
134.175.133.74 attackspam
Dec 15 08:19:58 vps647732 sshd[12678]: Failed password for root from 134.175.133.74 port 37398 ssh2
...
2019-12-15 15:55:59
121.165.33.239 attackbots
Dec 15 07:29:30 srv01 sshd[11837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.33.239  user=root
Dec 15 07:29:32 srv01 sshd[11837]: Failed password for root from 121.165.33.239 port 57724 ssh2
Dec 15 07:29:30 srv01 sshd[11837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.33.239  user=root
Dec 15 07:29:32 srv01 sshd[11837]: Failed password for root from 121.165.33.239 port 57724 ssh2
Dec 15 07:29:35 srv01 sshd[11842]: Invalid user ethos from 121.165.33.239 port 57938
...
2019-12-15 15:49:21
62.234.146.92 attackbots
SSH Brute-Force reported by Fail2Ban
2019-12-15 15:50:34
181.41.216.142 attackbots
Dec 15 07:29:42 relay postfix/smtpd\[21871\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.142\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.130\]\>
Dec 15 07:29:42 relay postfix/smtpd\[21871\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.142\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.130\]\>
Dec 15 07:29:42 relay postfix/smtpd\[21871\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.142\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.130\]\>
Dec 15 07:29:42 relay postfix/smtpd\[21871\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.142\]: 554 5.7.1 \
2019-12-15 15:42:33
213.194.162.226 attackbotsspam
port scan and connect, tcp 81 (hosts2-ns)
2019-12-15 15:26:52
50.193.109.165 attackbotsspam
Dec 15 08:18:10 ns41 sshd[31848]: Failed password for root from 50.193.109.165 port 43956 ssh2
Dec 15 08:18:10 ns41 sshd[31848]: Failed password for root from 50.193.109.165 port 43956 ssh2
Dec 15 08:23:23 ns41 sshd[32057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.109.165
2019-12-15 15:32:27
101.227.243.56 attack
"SSH brute force auth login attempt."
2019-12-15 15:28:24
89.237.192.217 attackspambots
Automatic report - Port Scan Attack
2019-12-15 15:56:39
210.177.54.141 attackspam
Dec 15 08:23:00 pkdns2 sshd\[7534\]: Invalid user qazwsx from 210.177.54.141Dec 15 08:23:02 pkdns2 sshd\[7534\]: Failed password for invalid user qazwsx from 210.177.54.141 port 44052 ssh2Dec 15 08:26:47 pkdns2 sshd\[7765\]: Invalid user ADPING!@\#$ from 210.177.54.141Dec 15 08:26:49 pkdns2 sshd\[7765\]: Failed password for invalid user ADPING!@\#$ from 210.177.54.141 port 52986 ssh2Dec 15 08:29:40 pkdns2 sshd\[7933\]: Invalid user moosehea from 210.177.54.141Dec 15 08:29:42 pkdns2 sshd\[7933\]: Failed password for invalid user moosehea from 210.177.54.141 port 44468 ssh2
...
2019-12-15 15:41:56
13.80.112.16 attackbots
Dec 15 08:46:13 OPSO sshd\[1784\]: Invalid user pugliese from 13.80.112.16 port 48392
Dec 15 08:46:13 OPSO sshd\[1784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.112.16
Dec 15 08:46:15 OPSO sshd\[1784\]: Failed password for invalid user pugliese from 13.80.112.16 port 48392 ssh2
Dec 15 08:52:00 OPSO sshd\[3164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.112.16  user=root
Dec 15 08:52:02 OPSO sshd\[3164\]: Failed password for root from 13.80.112.16 port 58368 ssh2
2019-12-15 15:57:22
120.52.121.86 attack
Dec 15 02:26:31 linuxvps sshd\[20592\]: Invalid user lagomarsino from 120.52.121.86
Dec 15 02:26:31 linuxvps sshd\[20592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86
Dec 15 02:26:33 linuxvps sshd\[20592\]: Failed password for invalid user lagomarsino from 120.52.121.86 port 35536 ssh2
Dec 15 02:33:56 linuxvps sshd\[25606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86  user=root
Dec 15 02:33:58 linuxvps sshd\[25606\]: Failed password for root from 120.52.121.86 port 52454 ssh2
2019-12-15 15:39:56
80.17.244.2 attackspambots
Dec 15 06:35:01 vtv3 sshd[26082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2 
Dec 15 06:35:03 vtv3 sshd[26082]: Failed password for invalid user admin from 80.17.244.2 port 36826 ssh2
Dec 15 06:42:23 vtv3 sshd[29800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2 
Dec 15 07:25:32 vtv3 sshd[17103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2 
Dec 15 07:25:35 vtv3 sshd[17103]: Failed password for invalid user verset from 80.17.244.2 port 46972 ssh2
Dec 15 07:32:46 vtv3 sshd[20170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2 
Dec 15 07:47:10 vtv3 sshd[26904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2 
Dec 15 07:47:12 vtv3 sshd[26904]: Failed password for invalid user medie from 80.17.244.2 port 51322 ssh2
Dec 15 07:54:38 vtv3 sshd[3015
2019-12-15 15:48:53
106.13.142.247 attack
Dec 15 08:35:52 localhost sshd\[3825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.142.247  user=root
Dec 15 08:35:55 localhost sshd\[3825\]: Failed password for root from 106.13.142.247 port 38596 ssh2
Dec 15 08:42:44 localhost sshd\[4671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.142.247  user=root
2019-12-15 15:43:46

最近上报的IP列表

118.99.122.132 118.99.122.136 118.99.122.138 118.99.122.141
118.99.122.142 118.99.122.145 118.99.122.146 118.99.122.148
118.99.122.15 118.99.122.150 118.99.122.152 118.99.122.154
118.99.122.156 118.99.122.16 118.99.122.161 118.99.122.162
118.99.122.164 87.164.26.200 118.99.122.166 118.99.122.170