必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.134.94.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.134.94.0.			IN	A

;; AUTHORITY SECTION:
.			351	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 07:33:26 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 0.94.134.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.94.134.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.134.211.228 attackbotsspam
Jul 13 17:11:41 minden010 sshd[18429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.228
Jul 13 17:11:42 minden010 sshd[18429]: Failed password for invalid user teamspeak@123 from 113.134.211.228 port 43682 ssh2
Jul 13 17:16:37 minden010 sshd[20235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.134.211.228
...
2019-07-13 23:46:01
190.210.42.83 attackspambots
Jul 13 16:36:44 localhost sshd\[57901\]: Invalid user vnc from 190.210.42.83 port 35812
Jul 13 16:36:44 localhost sshd\[57901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.83
...
2019-07-13 23:47:56
41.221.168.167 attackbotsspam
Jul 13 17:29:45 vps691689 sshd[13803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
Jul 13 17:29:47 vps691689 sshd[13803]: Failed password for invalid user mega from 41.221.168.167 port 40210 ssh2
...
2019-07-13 23:52:10
50.254.208.254 attackspam
SSH Bruteforce
2019-07-14 00:36:44
46.3.96.67 attackbots
13.07.2019 15:16:34 Connection to port 2979 blocked by firewall
2019-07-14 00:04:21
186.5.204.2 attackspam
proto=tcp  .  spt=38632  .  dpt=25  .     (listed on Blocklist de  Jul 12)     (454)
2019-07-14 00:25:50
118.70.182.185 attack
Jul 13 16:37:10 localhost sshd\[57986\]: Invalid user es from 118.70.182.185 port 47198
Jul 13 16:37:10 localhost sshd\[57986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.182.185
...
2019-07-13 23:57:32
213.32.122.83 attack
Avertissement
Connexion
2019-07-13 06:45:14
anonymous
User [anonymous] from [213.32.122.83] failed to log in via [FTP] due to authorization failure
2019-07-14 00:17:47
134.209.98.186 attackbotsspam
2019-07-13T15:16:48.480814abusebot-5.cloudsearch.cf sshd\[17360\]: Invalid user bulilan777 from 134.209.98.186 port 45939
2019-07-13 23:49:34
79.133.118.52 attackbots
Jul 13 16:44:17 Ubuntu-1404-trusty-64-minimal sshd\[23274\]: Invalid user kira from 79.133.118.52
Jul 13 16:56:50 Ubuntu-1404-trusty-64-minimal sshd\[31840\]: Invalid user impala from 79.133.118.52
Jul 13 16:57:14 Ubuntu-1404-trusty-64-minimal sshd\[32755\]: Invalid user hk from 79.133.118.52
Jul 13 16:57:44 Ubuntu-1404-trusty-64-minimal sshd\[413\]: Invalid user imss from 79.133.118.52
Jul 13 17:15:20 Ubuntu-1404-trusty-64-minimal sshd\[14336\]: Invalid user dario from 79.133.118.52
2019-07-14 00:54:09
84.253.165.69 attack
Jul 13 18:05:51 fr01 sshd[26637]: Invalid user ubnt from 84.253.165.69
Jul 13 18:05:51 fr01 sshd[26637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.253.165.69
Jul 13 18:05:51 fr01 sshd[26637]: Invalid user ubnt from 84.253.165.69
Jul 13 18:05:54 fr01 sshd[26637]: Failed password for invalid user ubnt from 84.253.165.69 port 58346 ssh2
Jul 13 18:05:51 fr01 sshd[26637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.253.165.69
Jul 13 18:05:51 fr01 sshd[26637]: Invalid user ubnt from 84.253.165.69
Jul 13 18:05:54 fr01 sshd[26637]: Failed password for invalid user ubnt from 84.253.165.69 port 58346 ssh2
...
2019-07-14 00:15:26
220.142.19.125 attackspambots
Automatic report - Port Scan Attack
2019-07-13 23:59:03
125.209.123.181 attackspam
Jul 13 19:20:55 srv-4 sshd\[20060\]: Invalid user mike from 125.209.123.181
Jul 13 19:20:55 srv-4 sshd\[20060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.209.123.181
Jul 13 19:20:57 srv-4 sshd\[20060\]: Failed password for invalid user mike from 125.209.123.181 port 49328 ssh2
...
2019-07-14 00:48:58
45.121.43.226 attackspam
proto=tcp  .  spt=42314  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (462)
2019-07-14 00:09:30
54.36.175.30 attackspambots
Jul 13 16:16:35 mail sshd\[530\]: Invalid user ts2 from 54.36.175.30 port 38716
Jul 13 16:16:35 mail sshd\[530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.175.30
...
2019-07-14 00:01:02

最近上报的IP列表

122.191.118.195 116.50.120.197 23.146.241.12 235.98.227.78
223.24.191.221 199.232.74.145 141.0.8.239 3.71.169.66
218.119.106.157 36.103.217.145 197.70.237.226 15.50.252.122
33.13.48.42 142.81.83.192 213.27.117.44 109.232.4.154
175.31.40.188 236.109.18.72 35.115.7.54 233.43.26.220