必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.45.229.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.45.229.34.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 19:05:04 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 34.229.45.131.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 131.45.229.34.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.81.181 attackspambots
Lines containing failures of 106.13.81.181
Feb 19 16:13:25 shared10 sshd[1470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.181  user=proxy
Feb 19 16:13:27 shared10 sshd[1470]: Failed password for proxy from 106.13.81.181 port 47260 ssh2
Feb 19 16:13:28 shared10 sshd[1470]: Received disconnect from 106.13.81.181 port 47260:11: Bye Bye [preauth]
Feb 19 16:13:28 shared10 sshd[1470]: Disconnected from authenticating user proxy 106.13.81.181 port 47260 [preauth]
Feb 19 16:32:45 shared10 sshd[7929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.181  user=games
Feb 19 16:32:47 shared10 sshd[7929]: Failed password for games from 106.13.81.181 port 46232 ssh2
Feb 19 16:32:48 shared10 sshd[7929]: Received disconnect from 106.13.81.181 port 46232:11: Bye Bye [preauth]
Feb 19 16:32:48 shared10 sshd[7929]: Disconnected from authenticating user games 106.13.81.181 port 46232 [pre........
------------------------------
2020-02-21 17:41:30
182.61.190.191 attackspambots
Invalid user chef from 182.61.190.191 port 45872
2020-02-21 17:26:10
212.124.0.243 attack
Lines containing failures of 212.124.0.243
Feb 17 20:57:24  cube sshd[50849]: Did not receive identification string from 212.124.0.243 port 50780
Feb 17 20:57:25  cube sshd[50850]: Invalid user admin from 212.124.0.243 port 52264
Feb 17 20:57:25  cube sshd[50850]: Received disconnect from 212.124.0.243 port 52264:11: Bye Bye [preauth]
Feb 17 20:57:25  cube sshd[50850]: Disconnected from invalid user admin 212.124.0.243 port 52264 [preauth]
Feb 17 20:57:26  cube sshd[50852]: Invalid user support from 212.124.0.243 port 53301
Feb 17 20:57:26  cube sshd[50852]: Received disconnect from 212.124.0.243 port 53301:11: Bye Bye [preauth]
Feb 17 20:57:26  cube sshd[50852]: Disconnected from invalid user support 212.124.0.243 port 53301 [preauth]
Feb 17 20:57:28  cube sshd[50854]: Invalid user admin from 212.124.0.243 port 55651
Feb 17 20:57:28  cube sshd[50854]: Received disconnect f........
------------------------------
2020-02-21 17:14:05
77.28.99.94 attack
Automatic report - Banned IP Access
2020-02-21 17:48:08
185.164.72.136 attackspambots
Port scan: Attack repeated for 24 hours
2020-02-21 17:43:53
84.214.176.227 attack
Feb 20 22:49:39 kapalua sshd\[18527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.214.176.227.getinternet.no  user=lp
Feb 20 22:49:41 kapalua sshd\[18527\]: Failed password for lp from 84.214.176.227 port 55474 ssh2
Feb 20 22:52:44 kapalua sshd\[18788\]: Invalid user cnc from 84.214.176.227
Feb 20 22:52:44 kapalua sshd\[18788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.214.176.227.getinternet.no
Feb 20 22:52:46 kapalua sshd\[18788\]: Failed password for invalid user cnc from 84.214.176.227 port 55014 ssh2
2020-02-21 17:46:08
200.124.228.231 attackspam
Automatic report - Port Scan Attack
2020-02-21 17:53:09
190.52.166.83 attackspambots
Invalid user web from 190.52.166.83 port 36328
2020-02-21 17:46:32
80.23.235.225 attackspambots
Feb 21 09:22:16 web8 sshd\[17664\]: Invalid user HTTP from 80.23.235.225
Feb 21 09:22:16 web8 sshd\[17664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.23.235.225
Feb 21 09:22:18 web8 sshd\[17664\]: Failed password for invalid user HTTP from 80.23.235.225 port 63417 ssh2
Feb 21 09:25:42 web8 sshd\[19412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.23.235.225  user=list
Feb 21 09:25:44 web8 sshd\[19412\]: Failed password for list from 80.23.235.225 port 58001 ssh2
2020-02-21 17:29:01
49.233.148.2 attackspambots
Feb 21 03:46:53 ny01 sshd[21387]: Failed password for bin from 49.233.148.2 port 55602 ssh2
Feb 21 03:51:40 ny01 sshd[23318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.148.2
Feb 21 03:51:42 ny01 sshd[23318]: Failed password for invalid user lzhou from 49.233.148.2 port 52862 ssh2
2020-02-21 17:47:19
77.40.100.47 attack
failed_logins
2020-02-21 17:39:52
195.228.137.52 spambotsattackproxynormal
50
2020-02-21 17:43:08
189.220.202.100 attackbotsspam
189.220.202.100 - - \[20/Feb/2020:20:52:44 -0800\] "POST /index.php/admin/ HTTP/1.1" 404 20574189.220.202.100 - qwerty \[20/Feb/2020:20:52:44 -0800\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25189.220.202.100 - - \[20/Feb/2020:20:52:44 -0800\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 20622
...
2020-02-21 17:28:10
14.63.174.149 attackspam
Automatic report - Banned IP Access
2020-02-21 17:30:39
165.227.210.71 attackbotsspam
Feb 20 22:36:31 sachi sshd\[23855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=www-data
Feb 20 22:36:33 sachi sshd\[23855\]: Failed password for www-data from 165.227.210.71 port 52344 ssh2
Feb 20 22:39:27 sachi sshd\[24214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=daemon
Feb 20 22:39:29 sachi sshd\[24214\]: Failed password for daemon from 165.227.210.71 port 51872 ssh2
Feb 20 22:42:14 sachi sshd\[24451\]: Invalid user ubuntu from 165.227.210.71
2020-02-21 17:43:32

最近上报的IP列表

30.10.169.179 71.237.79.54 217.151.119.232 95.228.236.36
92.108.135.51 156.144.104.95 52.241.18.32 195.235.240.216
255.181.229.19 220.198.112.152 227.94.118.213 41.57.80.243
136.229.152.64 16.197.193.180 101.125.161.215 52.88.195.167
91.160.35.92 6.48.31.112 119.174.62.245 230.202.119.78