必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.56.134.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.56.134.139.			IN	A

;; AUTHORITY SECTION:
.			354	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 08:56:56 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.134.56.123.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.134.56.123.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.83.69.183 attackspam
Oct 11 00:15:47 root sshd[31510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.69.183 
Oct 11 00:15:49 root sshd[31510]: Failed password for invalid user UIOP7890 from 51.83.69.183 port 51718 ssh2
Oct 11 00:19:13 root sshd[31559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.69.183 
...
2019-10-11 06:24:42
64.252.141.86 attack
Automatic report generated by Wazuh
2019-10-11 06:23:32
222.186.175.161 attack
10/10/2019-18:27:23.689188 222.186.175.161 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-11 06:46:04
77.22.231.137 attack
Invalid user pi from 77.22.231.137 port 44600
2019-10-11 06:29:11
42.159.113.152 attackbots
Oct 11 01:31:45 server sshd\[1614\]: Invalid user Tutorial123 from 42.159.113.152 port 24017
Oct 11 01:31:45 server sshd\[1614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.113.152
Oct 11 01:31:47 server sshd\[1614\]: Failed password for invalid user Tutorial123 from 42.159.113.152 port 24017 ssh2
Oct 11 01:36:52 server sshd\[10338\]: Invalid user Parola@2016 from 42.159.113.152 port 61729
Oct 11 01:36:52 server sshd\[10338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.113.152
2019-10-11 06:43:26
42.51.13.102 attackbots
Oct 10 10:50:01 myhostname sshd[20963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.102  user=r.r
Oct 10 10:50:03 myhostname sshd[20963]: Failed password for r.r from 42.51.13.102 port 57284 ssh2
Oct 10 10:50:03 myhostname sshd[20963]: Received disconnect from 42.51.13.102 port 57284:11: Bye Bye [preauth]
Oct 10 10:50:03 myhostname sshd[20963]: Disconnected from 42.51.13.102 port 57284 [preauth]
Oct 10 11:14:57 myhostname sshd[21029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.102  user=r.r
Oct 10 11:14:59 myhostname sshd[21029]: Failed password for r.r from 42.51.13.102 port 43249 ssh2
Oct 10 11:14:59 myhostname sshd[21029]: Received disconnect from 42.51.13.102 port 43249:11: Bye Bye [preauth]
Oct 10 11:14:59 myhostname sshd[21029]: Disconnected from 42.51.13.102 port 43249 [preauth]
Oct 10 11:19:42 myhostname sshd[21038]: pam_unix(sshd:auth): authentication fail........
-------------------------------
2019-10-11 06:48:52
142.93.83.218 attackspam
Oct 10 01:13:27 host2 sshd[31453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218  user=r.r
Oct 10 01:13:29 host2 sshd[31453]: Failed password for r.r from 142.93.83.218 port 41578 ssh2
Oct 10 01:13:29 host2 sshd[31453]: Received disconnect from 142.93.83.218: 11: Bye Bye [preauth]
Oct 10 01:33:01 host2 sshd[13546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218  user=r.r
Oct 10 01:33:03 host2 sshd[13546]: Failed password for r.r from 142.93.83.218 port 56574 ssh2
Oct 10 01:33:03 host2 sshd[13546]: Received disconnect from 142.93.83.218: 11: Bye Bye [preauth]
Oct 10 01:36:55 host2 sshd[28153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.83.218  user=r.r
Oct 10 01:36:57 host2 sshd[28153]: Failed password for r.r from 142.93.83.218 port 42228 ssh2
Oct 10 01:36:57 host2 sshd[28153]: Received disconnect from 142.93.........
-------------------------------
2019-10-11 06:46:58
176.56.236.21 attack
Oct 10 12:23:40 kapalua sshd\[2595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.56.236.21  user=root
Oct 10 12:23:42 kapalua sshd\[2595\]: Failed password for root from 176.56.236.21 port 40364 ssh2
Oct 10 12:27:12 kapalua sshd\[2912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.56.236.21  user=root
Oct 10 12:27:14 kapalua sshd\[2912\]: Failed password for root from 176.56.236.21 port 55672 ssh2
Oct 10 12:30:39 kapalua sshd\[3213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.56.236.21  user=root
2019-10-11 06:43:39
51.38.186.244 attack
Oct 10 12:00:52 wbs sshd\[24208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-38-186.eu  user=root
Oct 10 12:00:54 wbs sshd\[24208\]: Failed password for root from 51.38.186.244 port 53686 ssh2
Oct 10 12:04:53 wbs sshd\[24559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-38-186.eu  user=root
Oct 10 12:04:55 wbs sshd\[24559\]: Failed password for root from 51.38.186.244 port 37308 ssh2
Oct 10 12:08:57 wbs sshd\[24898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-38-186.eu  user=root
2019-10-11 06:25:01
104.131.37.34 attackspam
Oct 11 00:15:55 ns381471 sshd[12624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.37.34
Oct 11 00:15:56 ns381471 sshd[12624]: Failed password for invalid user p@$$w0rd2017 from 104.131.37.34 port 56753 ssh2
Oct 11 00:20:47 ns381471 sshd[12753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.37.34
2019-10-11 06:27:59
106.13.16.205 attackbots
Oct 11 01:09:05 www sshd\[88945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.16.205  user=root
Oct 11 01:09:07 www sshd\[88945\]: Failed password for root from 106.13.16.205 port 51776 ssh2
Oct 11 01:12:37 www sshd\[88959\]: Invalid user 123 from 106.13.16.205
...
2019-10-11 06:22:50
211.64.67.48 attackspambots
Oct 11 00:19:57 vps691689 sshd[5081]: Failed password for root from 211.64.67.48 port 42200 ssh2
Oct 11 00:23:55 vps691689 sshd[5173]: Failed password for root from 211.64.67.48 port 45400 ssh2
...
2019-10-11 06:40:51
106.51.80.198 attack
Oct 11 01:42:37 sauna sshd[89800]: Failed password for root from 106.51.80.198 port 49812 ssh2
...
2019-10-11 07:00:37
81.17.92.4 attackbotsspam
10/10/2019-16:07:27.573521 81.17.92.4 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-11 06:39:11
92.222.216.81 attackspambots
Oct 10 12:27:53 hpm sshd\[19480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.ip-92-222-216.eu  user=root
Oct 10 12:27:55 hpm sshd\[19480\]: Failed password for root from 92.222.216.81 port 37388 ssh2
Oct 10 12:31:46 hpm sshd\[19854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.ip-92-222-216.eu  user=root
Oct 10 12:31:48 hpm sshd\[19854\]: Failed password for root from 92.222.216.81 port 57035 ssh2
Oct 10 12:35:39 hpm sshd\[20194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.ip-92-222-216.eu  user=root
2019-10-11 06:50:50

最近上报的IP列表

123.56.123.216 123.56.15.122 123.56.158.112 123.56.166.39
123.56.170.127 123.56.178.65 123.56.182.220 123.56.20.50
123.56.206.97 123.56.21.171 123.56.21.243 123.56.216.7
123.56.218.192 123.56.221.255 123.56.222.50 123.56.223.20
123.56.223.224 123.56.223.28 123.56.224.107 123.56.225.51