必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.42.31.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.42.31.134.			IN	A

;; AUTHORITY SECTION:
.			66	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 05:33:16 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 134.31.42.132.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
server can't find 132.42.31.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.218.199.121 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/81.218.199.121/ 
 IL - 1H : (16)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IL 
 NAME ASN : ASN8551 
 
 IP : 81.218.199.121 
 
 CIDR : 81.218.192.0/20 
 
 PREFIX COUNT : 3249 
 
 UNIQUE IP COUNT : 1550848 
 
 
 WYKRYTE ATAKI Z ASN8551 :  
  1H - 1 
  3H - 2 
  6H - 3 
 12H - 3 
 24H - 7 
 
 DateTime : 2019-10-10 22:09:28 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-11 05:43:06
185.176.27.174 attackspambots
10/10/2019-22:10:10.888657 185.176.27.174 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-11 05:22:36
109.87.200.193 attackspam
fail2ban honeypot
2019-10-11 05:49:00
218.92.0.200 attackspambots
Oct 10 21:18:29 venus sshd\[24454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Oct 10 21:18:31 venus sshd\[24454\]: Failed password for root from 218.92.0.200 port 11783 ssh2
Oct 10 21:18:33 venus sshd\[24454\]: Failed password for root from 218.92.0.200 port 11783 ssh2
...
2019-10-11 05:21:27
23.129.64.100 attack
2019-10-10T20:09:36.741678abusebot.cloudsearch.cf sshd\[26333\]: Invalid user vijay from 23.129.64.100 port 35376
2019-10-11 05:39:21
148.72.28.31 attack
Automated report (2019-10-10T20:08:48+00:00). Non-escaped characters in POST detected (bot indicator).
2019-10-11 05:55:19
51.75.163.218 attack
Oct 10 23:31:17 SilenceServices sshd[22307]: Failed password for root from 51.75.163.218 port 35432 ssh2
Oct 10 23:34:48 SilenceServices sshd[24500]: Failed password for root from 51.75.163.218 port 46356 ssh2
2019-10-11 05:49:53
222.186.175.167 attackbotsspam
Oct 10 23:35:57 dcd-gentoo sshd[13125]: User root from 222.186.175.167 not allowed because none of user's groups are listed in AllowGroups
Oct 10 23:36:02 dcd-gentoo sshd[13125]: error: PAM: Authentication failure for illegal user root from 222.186.175.167
Oct 10 23:35:57 dcd-gentoo sshd[13125]: User root from 222.186.175.167 not allowed because none of user's groups are listed in AllowGroups
Oct 10 23:36:02 dcd-gentoo sshd[13125]: error: PAM: Authentication failure for illegal user root from 222.186.175.167
Oct 10 23:35:57 dcd-gentoo sshd[13125]: User root from 222.186.175.167 not allowed because none of user's groups are listed in AllowGroups
Oct 10 23:36:02 dcd-gentoo sshd[13125]: error: PAM: Authentication failure for illegal user root from 222.186.175.167
Oct 10 23:36:02 dcd-gentoo sshd[13125]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.167 port 5166 ssh2
...
2019-10-11 05:46:23
111.67.193.34 attackbotsspam
Lines containing failures of 111.67.193.34
Oct  9 08:38:00 shared05 sshd[19756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.193.34  user=r.r
Oct  9 08:38:02 shared05 sshd[19756]: Failed password for r.r from 111.67.193.34 port 47999 ssh2
Oct  9 08:38:02 shared05 sshd[19756]: Received disconnect from 111.67.193.34 port 47999:11: Bye Bye [preauth]
Oct  9 08:38:02 shared05 sshd[19756]: Disconnected from authenticating user r.r 111.67.193.34 port 47999 [preauth]
Oct  9 09:09:43 shared05 sshd[30974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.193.34  user=r.r
Oct  9 09:09:45 shared05 sshd[30974]: Failed password for r.r from 111.67.193.34 port 60126 ssh2
Oct  9 09:09:46 shared05 sshd[30974]: Received disconnect from 111.67.193.34 port 60126:11: Bye Bye [preauth]
Oct  9 09:09:46 shared05 sshd[30974]: Disconnected from authenticating user r.r 111.67.193.34 port 60126 [preauth........
------------------------------
2019-10-11 05:38:56
61.163.229.226 attackspam
Dovecot Brute-Force
2019-10-11 05:28:36
198.199.84.154 attackbots
Oct 10 23:16:01 eventyay sshd[28154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
Oct 10 23:16:03 eventyay sshd[28154]: Failed password for invalid user Qwert@1234 from 198.199.84.154 port 47093 ssh2
Oct 10 23:20:03 eventyay sshd[28231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
...
2019-10-11 05:58:32
119.29.243.100 attackbotsspam
Oct 10 11:24:15 hpm sshd\[13363\]: Invalid user P@\$\$w0rt@abc from 119.29.243.100
Oct 10 11:24:15 hpm sshd\[13363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.243.100
Oct 10 11:24:16 hpm sshd\[13363\]: Failed password for invalid user P@\$\$w0rt@abc from 119.29.243.100 port 47476 ssh2
Oct 10 11:28:13 hpm sshd\[13696\]: Invalid user 123Classic from 119.29.243.100
Oct 10 11:28:13 hpm sshd\[13696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.243.100
2019-10-11 05:34:12
164.52.35.246 attackbots
2019-10-10T21:10:32.989519abusebot-6.cloudsearch.cf sshd\[15294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.52.35.246  user=root
2019-10-11 05:40:31
138.197.129.38 attackbotsspam
Oct 10 23:10:32 MK-Soft-VM7 sshd[28617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38 
Oct 10 23:10:34 MK-Soft-VM7 sshd[28617]: Failed password for invalid user 345ERTDFG from 138.197.129.38 port 45394 ssh2
...
2019-10-11 05:54:29
103.60.126.80 attackspam
Oct 10 23:50:45 vps647732 sshd[14665]: Failed password for root from 103.60.126.80 port 52164 ssh2
...
2019-10-11 05:57:25

最近上报的IP列表

199.126.244.67 213.30.251.85 23.99.207.33 253.180.87.143
199.4.169.107 69.61.134.88 146.23.160.58 239.152.220.84
153.127.135.153 225.235.57.1 13.25.155.26 128.247.209.3
160.58.196.144 208.4.147.84 218.66.107.31 132.211.242.101
54.195.159.9 244.157.237.2 135.49.104.117 148.208.189.211