必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sacramento

省份(region): California

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.194.34.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.194.34.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 20 21:55:00 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 201.34.194.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.34.194.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.144.151.45 attackbots
Sep 25 14:54:50 vtv3 sshd\[16207\]: Invalid user testuser from 58.144.151.45 port 49776
Sep 25 14:54:50 vtv3 sshd\[16207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.45
Sep 25 14:54:52 vtv3 sshd\[16207\]: Failed password for invalid user testuser from 58.144.151.45 port 49776 ssh2
Sep 25 14:59:30 vtv3 sshd\[18467\]: Invalid user vnc from 58.144.151.45 port 44716
Sep 25 14:59:30 vtv3 sshd\[18467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.45
Sep 25 15:12:04 vtv3 sshd\[25040\]: Invalid user user from 58.144.151.45 port 37874
Sep 25 15:12:04 vtv3 sshd\[25040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.45
Sep 25 15:12:06 vtv3 sshd\[25040\]: Failed password for invalid user user from 58.144.151.45 port 37874 ssh2
Sep 25 15:16:27 vtv3 sshd\[27452\]: Invalid user go from 58.144.151.45 port 57340
Sep 25 15:16:27 vtv3 sshd\[27452\]: pam_un
2019-09-26 03:01:04
5.57.33.71 attackbotsspam
Sep 25 18:24:00 vps691689 sshd[32286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71
Sep 25 18:24:02 vps691689 sshd[32286]: Failed password for invalid user nagios from 5.57.33.71 port 30533 ssh2
...
2019-09-26 03:06:29
124.18.110.211 attackspambots
Unauthorised access (Sep 25) SRC=124.18.110.211 LEN=40 TTL=50 ID=45749 TCP DPT=8080 WINDOW=21498 SYN 
Unauthorised access (Sep 25) SRC=124.18.110.211 LEN=40 TTL=49 ID=59402 TCP DPT=8080 WINDOW=21498 SYN 
Unauthorised access (Sep 25) SRC=124.18.110.211 LEN=40 TTL=49 ID=46259 TCP DPT=8080 WINDOW=21498 SYN 
Unauthorised access (Sep 24) SRC=124.18.110.211 LEN=40 TTL=49 ID=12993 TCP DPT=8080 WINDOW=21498 SYN 
Unauthorised access (Sep 24) SRC=124.18.110.211 LEN=40 TTL=49 ID=64317 TCP DPT=8080 WINDOW=21498 SYN 
Unauthorised access (Sep 24) SRC=124.18.110.211 LEN=40 TTL=49 ID=57023 TCP DPT=8080 WINDOW=21498 SYN 
Unauthorised access (Sep 23) SRC=124.18.110.211 LEN=40 TTL=49 ID=38710 TCP DPT=8080 WINDOW=21498 SYN
2019-09-26 03:25:38
106.53.69.173 attackbots
2019-09-25T19:26:06.748911abusebot-4.cloudsearch.cf sshd\[8990\]: Invalid user baldwin from 106.53.69.173 port 52534
2019-09-26 03:34:47
188.16.146.207 attackspam
2323/tcp
[2019-09-25]1pkt
2019-09-26 03:08:00
222.186.173.183 attackspam
Sep 25 13:58:53 aat-srv002 sshd[18323]: Failed password for root from 222.186.173.183 port 22472 ssh2
Sep 25 13:59:09 aat-srv002 sshd[18323]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 22472 ssh2 [preauth]
Sep 25 13:59:20 aat-srv002 sshd[18330]: Failed password for root from 222.186.173.183 port 36462 ssh2
Sep 25 13:59:24 aat-srv002 sshd[18330]: Failed password for root from 222.186.173.183 port 36462 ssh2
...
2019-09-26 03:01:42
173.231.138.192 attackbots
Message ID	
Created at:	Wed, Sep 25, 2019 at 6:42 AM (Delivered after -27 seconds)
From:	Heart Healthy Tip 
To:	
Subject:	NEVER Do THIS During a Heart Attack (increases your chances of death)
SPF:	SOFTFAIL with IP 185.112.250.28
2019-09-26 03:37:52
176.237.22.236 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2019-09-26 03:09:34
109.94.123.46 attackbots
port scan and connect, tcp 80 (http)
2019-09-26 03:30:38
70.71.148.228 attack
2019-09-25T08:23:44.3208941495-001 sshd\[51785\]: Failed password for invalid user oracle from 70.71.148.228 port 55659 ssh2
2019-09-25T08:35:48.7504331495-001 sshd\[52992\]: Invalid user odroid from 70.71.148.228 port 32900
2019-09-25T08:35:48.7596951495-001 sshd\[52992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s01063c37866eee85.vs.shawcable.net
2019-09-25T08:35:50.5470491495-001 sshd\[52992\]: Failed password for invalid user odroid from 70.71.148.228 port 32900 ssh2
2019-09-25T08:39:58.2438281495-001 sshd\[53289\]: Invalid user xy from 70.71.148.228 port 53542
2019-09-25T08:39:58.2516071495-001 sshd\[53289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s01063c37866eee85.vs.shawcable.net
...
2019-09-26 03:06:58
130.61.72.90 attack
Triggered by Fail2Ban at Vostok web server
2019-09-26 03:26:05
59.126.199.119 attackspambots
34567/tcp
[2019-09-25]1pkt
2019-09-26 03:32:14
45.165.126.149 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.165.126.149/ 
 BR - 1H : (827)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN268700 
 
 IP : 45.165.126.149 
 
 CIDR : 45.165.124.0/22 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 1024 
 
 
 WYKRYTE ATAKI Z ASN268700 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-26 03:26:40
160.178.244.84 attackspambots
Automatic report - Port Scan Attack
2019-09-26 03:18:40
108.59.8.70 attackspam
Automatic report - Banned IP Access
2019-09-26 03:28:22

最近上报的IP列表

151.148.52.189 5.78.110.222 103.180.213.167 206.168.34.71
231.4.234.133 99.159.254.10 91.196.152.52 222.243.55.86
27.30.218.65 26.18.37.22 205.104.243.27 144.148.230.154
239.121.39.167 3.212.246.0 242.25.58.167 94.73.41.26
92.253.201.13 127.250.5.197 7.213.56.184 121.168.161.6