必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.26.138.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.26.138.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 22:26:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
34.138.26.119.in-addr.arpa domain name pointer zaq771a8a22.rev.zaq.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.138.26.119.in-addr.arpa	name = zaq771a8a22.rev.zaq.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.15.217 attack
2019-07-12T07:55:02.626855scmdmz1 sshd\[17563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.217  user=root
2019-07-12T07:55:04.767478scmdmz1 sshd\[17563\]: Failed password for root from 222.186.15.217 port 64663 ssh2
2019-07-12T07:55:07.064745scmdmz1 sshd\[17563\]: Failed password for root from 222.186.15.217 port 64663 ssh2
...
2019-07-12 14:15:41
61.191.252.74 attackspambots
Jul 12 01:58:41 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:61.191.252.74\]
...
2019-07-12 13:40:55
182.162.101.80 attackspam
Jul 12 10:26:18 vibhu-HP-Z238-Microtower-Workstation sshd\[15801\]: Invalid user mall from 182.162.101.80
Jul 12 10:26:18 vibhu-HP-Z238-Microtower-Workstation sshd\[15801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.101.80
Jul 12 10:26:20 vibhu-HP-Z238-Microtower-Workstation sshd\[15801\]: Failed password for invalid user mall from 182.162.101.80 port 44434 ssh2
Jul 12 10:32:21 vibhu-HP-Z238-Microtower-Workstation sshd\[17011\]: Invalid user ramesh from 182.162.101.80
Jul 12 10:32:21 vibhu-HP-Z238-Microtower-Workstation sshd\[17011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.101.80
...
2019-07-12 13:18:56
163.47.214.155 attackspam
Jul 12 07:12:31 eventyay sshd[22432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.155
Jul 12 07:12:33 eventyay sshd[22432]: Failed password for invalid user superman from 163.47.214.155 port 53364 ssh2
Jul 12 07:18:57 eventyay sshd[24075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.155
...
2019-07-12 13:36:06
157.55.39.214 attackbots
Automatic report - Web App Attack
2019-07-12 14:13:48
220.74.112.178 attack
DATE:2019-07-12 01:57:10, IP:220.74.112.178, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-12 14:12:09
54.37.232.137 attackspambots
Jul 12 05:13:48 localhost sshd\[8294\]: Invalid user testid from 54.37.232.137 port 32788
Jul 12 05:13:48 localhost sshd\[8294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.137
Jul 12 05:13:51 localhost sshd\[8294\]: Failed password for invalid user testid from 54.37.232.137 port 32788 ssh2
Jul 12 05:18:42 localhost sshd\[8350\]: Invalid user bigman from 54.37.232.137 port 33360
Jul 12 05:18:42 localhost sshd\[8350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.137
...
2019-07-12 13:39:29
201.49.127.212 attackbots
Jul 12 08:04:06 MK-Soft-Root1 sshd\[15611\]: Invalid user flor from 201.49.127.212 port 47098
Jul 12 08:04:06 MK-Soft-Root1 sshd\[15611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
Jul 12 08:04:08 MK-Soft-Root1 sshd\[15611\]: Failed password for invalid user flor from 201.49.127.212 port 47098 ssh2
...
2019-07-12 14:20:17
153.36.242.114 attack
Jul 12 09:13:31 hosting sshd[931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.114  user=root
Jul 12 09:13:33 hosting sshd[931]: Failed password for root from 153.36.242.114 port 52813 ssh2
...
2019-07-12 14:32:09
104.248.121.159 attackbotsspam
miraniessen.de 104.248.121.159 \[12/Jul/2019:01:59:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 5972 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
miraniessen.de 104.248.121.159 \[12/Jul/2019:01:59:30 +0200\] "POST /wp-login.php HTTP/1.1" 200 5976 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
miraniessen.de 104.248.121.159 \[12/Jul/2019:01:59:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 5967 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-12 13:28:11
112.217.225.59 attackspam
Jul 12 01:16:56 vps200512 sshd\[6129\]: Invalid user lpadmin from 112.217.225.59
Jul 12 01:16:56 vps200512 sshd\[6129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.59
Jul 12 01:16:58 vps200512 sshd\[6129\]: Failed password for invalid user lpadmin from 112.217.225.59 port 58944 ssh2
Jul 12 01:22:43 vps200512 sshd\[6371\]: Invalid user renato from 112.217.225.59
Jul 12 01:22:43 vps200512 sshd\[6371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.59
2019-07-12 13:26:12
118.107.233.29 attack
Jul 12 01:59:56 vps200512 sshd\[7473\]: Invalid user admin2 from 118.107.233.29
Jul 12 01:59:56 vps200512 sshd\[7473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.107.233.29
Jul 12 01:59:58 vps200512 sshd\[7473\]: Failed password for invalid user admin2 from 118.107.233.29 port 35860 ssh2
Jul 12 02:06:15 vps200512 sshd\[7702\]: Invalid user atlas from 118.107.233.29
Jul 12 02:06:15 vps200512 sshd\[7702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.107.233.29
2019-07-12 14:06:52
92.118.161.13 attackbotsspam
Unauthorised access (Jul 12) SRC=92.118.161.13 LEN=44 TTL=238 ID=54248 TCP DPT=138 WINDOW=1024 SYN
2019-07-12 13:50:51
185.126.199.90 attack
[ ?? ] From bounce5@corretor-10-online.com.br Thu Jul 11 20:57:12 2019
 Received: from host6.corretor-10-online.com.br ([185.126.199.90]:35770)
2019-07-12 14:12:41
218.92.0.173 attackspam
Jul 12 08:15:03 fr01 sshd[7137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Jul 12 08:15:05 fr01 sshd[7137]: Failed password for root from 218.92.0.173 port 32182 ssh2
Jul 12 08:15:08 fr01 sshd[7137]: Failed password for root from 218.92.0.173 port 32182 ssh2
Jul 12 08:15:03 fr01 sshd[7137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Jul 12 08:15:05 fr01 sshd[7137]: Failed password for root from 218.92.0.173 port 32182 ssh2
Jul 12 08:15:08 fr01 sshd[7137]: Failed password for root from 218.92.0.173 port 32182 ssh2
Jul 12 08:15:03 fr01 sshd[7137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Jul 12 08:15:05 fr01 sshd[7137]: Failed password for root from 218.92.0.173 port 32182 ssh2
Jul 12 08:15:08 fr01 sshd[7137]: Failed password for root from 218.92.0.173 port 32182 ssh2
Jul 12 08:15:10 fr01 sshd[7137]: Fail
2019-07-12 14:18:54

最近上报的IP列表

24.143.20.237 88.19.138.115 48.248.132.143 125.201.154.175
127.3.175.78 15.38.173.17 85.46.80.53 139.32.40.218
89.197.173.149 21.105.50.219 20.36.114.68 49.9.177.229
253.14.150.119 75.141.62.50 180.254.188.250 150.19.227.112
42.230.40.161 223.115.109.141 206.181.86.216 208.76.175.218