必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 127.145.134.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;127.145.134.70.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:42:20 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 70.134.145.127.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.134.145.127.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
168.62.213.253 attackspambots
(mod_security) mod_security (id:210492) triggered by 168.62.213.253 (US/United States/-): 5 in the last 300 secs
2020-08-17 20:07:21
34.80.223.251 attackspam
Aug 17 14:02:10 haigwepa sshd[24482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.223.251 
Aug 17 14:02:13 haigwepa sshd[24482]: Failed password for invalid user adv from 34.80.223.251 port 54022 ssh2
...
2020-08-17 20:08:17
49.235.253.61 attackbotsspam
Aug 17 07:06:57 vps sshd[59281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.253.61
Aug 17 07:07:00 vps sshd[59281]: Failed password for invalid user owncloud from 49.235.253.61 port 33180 ssh2
Aug 17 07:08:07 vps sshd[65648]: Invalid user uma from 49.235.253.61 port 44424
Aug 17 07:08:07 vps sshd[65648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.253.61
Aug 17 07:08:09 vps sshd[65648]: Failed password for invalid user uma from 49.235.253.61 port 44424 ssh2
...
2020-08-17 20:05:54
111.229.43.27 attackbotsspam
Aug 17 04:42:28 mockhub sshd[28626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.43.27
Aug 17 04:42:29 mockhub sshd[28626]: Failed password for invalid user nisha from 111.229.43.27 port 37044 ssh2
...
2020-08-17 19:59:28
106.12.113.204 attackspam
Invalid user ina from 106.12.113.204 port 60676
2020-08-17 20:04:40
172.81.243.232 attackbots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-17 20:20:26
61.222.240.214 attackbots
Unauthorised access (Aug 17) SRC=61.222.240.214 LEN=52 TTL=45 ID=1120 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-17 20:02:38
51.75.249.224 attackbotsspam
$f2bV_matches
2020-08-17 19:43:45
85.209.0.130 attackspam
Aug 17 06:54:16 master sshd[4394]: Did not receive identification string from 85.209.0.130
Aug 17 06:54:27 master sshd[4395]: Failed password for root from 85.209.0.130 port 37360 ssh2
Aug 17 06:54:27 master sshd[4396]: Failed password for root from 85.209.0.130 port 37430 ssh2
2020-08-17 20:09:02
178.128.248.121 attackspambots
"$f2bV_matches"
2020-08-17 20:00:39
178.62.49.137 attack
Aug 17 13:53:49 ns392434 sshd[11257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.49.137  user=root
Aug 17 13:53:51 ns392434 sshd[11257]: Failed password for root from 178.62.49.137 port 55886 ssh2
Aug 17 14:05:10 ns392434 sshd[11614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.49.137  user=root
Aug 17 14:05:12 ns392434 sshd[11614]: Failed password for root from 178.62.49.137 port 48130 ssh2
Aug 17 14:11:16 ns392434 sshd[11882]: Invalid user hxz from 178.62.49.137 port 56986
Aug 17 14:11:16 ns392434 sshd[11882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.49.137
Aug 17 14:11:16 ns392434 sshd[11882]: Invalid user hxz from 178.62.49.137 port 56986
Aug 17 14:11:19 ns392434 sshd[11882]: Failed password for invalid user hxz from 178.62.49.137 port 56986 ssh2
Aug 17 14:17:08 ns392434 sshd[12132]: Invalid user mininet from 178.62.49.137 port 37616
2020-08-17 20:22:06
196.200.181.3 attackbots
sshd jail - ssh hack attempt
2020-08-17 19:50:52
51.178.78.153 attackspam
 TCP (SYN) 51.178.78.153:34866 -> port 1433, len 44
2020-08-17 19:43:14
134.175.2.7 attackspambots
2020-08-17T08:32:38.786999mail.standpoint.com.ua sshd[30557]: Failed password for root from 134.175.2.7 port 56236 ssh2
2020-08-17T08:36:17.088416mail.standpoint.com.ua sshd[31643]: Invalid user peter from 134.175.2.7 port 39608
2020-08-17T08:36:17.092412mail.standpoint.com.ua sshd[31643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.2.7
2020-08-17T08:36:17.088416mail.standpoint.com.ua sshd[31643]: Invalid user peter from 134.175.2.7 port 39608
2020-08-17T08:36:18.966699mail.standpoint.com.ua sshd[31643]: Failed password for invalid user peter from 134.175.2.7 port 39608 ssh2
...
2020-08-17 20:08:32
118.25.124.182 attackbots
frenzy
2020-08-17 20:17:27

最近上报的IP列表

60.124.125.89 114.72.131.76 145.145.192.166 160.158.186.55
180.166.255.70 65.137.31.38 31.129.46.225 171.38.199.57
230.198.85.214 59.216.165.156 34.47.243.24 116.73.198.132
198.100.167.138 27.98.158.34 36.64.164.144 245.116.128.219
189.9.10.28 122.32.226.55 157.183.39.138 52.14.249.138