必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.99.234.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.99.234.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 14:01:36 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 28.234.99.133.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.234.99.133.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.192.160.40 attack
Mar 13 08:43:26 odroid64 sshd\[29323\]: User root from 201.192.160.40 not allowed because not listed in AllowUsers
Mar 13 08:43:26 odroid64 sshd\[29323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.192.160.40  user=root
Mar 13 08:43:28 odroid64 sshd\[29323\]: Failed password for invalid user root from 201.192.160.40 port 53198 ssh2
Mar 24 07:23:27 odroid64 sshd\[11615\]: User root from 201.192.160.40 not allowed because not listed in AllowUsers
Mar 24 07:23:27 odroid64 sshd\[11615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.192.160.40  user=root
Mar 24 07:23:29 odroid64 sshd\[11615\]: Failed password for invalid user root from 201.192.160.40 port 45334 ssh2
Apr 22 03:52:04 odroid64 sshd\[12257\]: Invalid user pentaho from 201.192.160.40
Apr 22 03:52:04 odroid64 sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.192.160.40
A
...
2019-10-18 06:19:57
201.182.221.252 attackbots
Apr  2 13:37:36 odroid64 sshd\[8537\]: User root from 201.182.221.252 not allowed because not listed in AllowUsers
Apr  2 13:37:36 odroid64 sshd\[8537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.221.252  user=root
Apr  2 13:37:38 odroid64 sshd\[8537\]: Failed password for invalid user root from 201.182.221.252 port 48014 ssh2
...
2019-10-18 06:33:20
69.90.16.116 attackbots
Invalid user 123 from 69.90.16.116 port 44712
2019-10-18 06:41:47
182.253.71.242 attackbotsspam
Oct 17 17:59:00 debian sshd\[9600\]: Invalid user mathematics from 182.253.71.242 port 54646
Oct 17 17:59:00 debian sshd\[9600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.71.242
Oct 17 17:59:02 debian sshd\[9600\]: Failed password for invalid user mathematics from 182.253.71.242 port 54646 ssh2
...
2019-10-18 06:34:35
201.176.27.160 attack
May 20 01:35:30 odroid64 sshd\[8758\]: User root from 201.176.27.160 not allowed because not listed in AllowUsers
May 20 01:35:30 odroid64 sshd\[8758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.176.27.160  user=root
May 20 01:35:32 odroid64 sshd\[8758\]: Failed password for invalid user root from 201.176.27.160 port 56636 ssh2
...
2019-10-18 06:40:06
129.211.24.104 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-10-18 06:46:07
201.20.29.212 attackspambots
May 12 16:06:51 odroid64 sshd\[27237\]: User backup from 201.20.29.212 not allowed because not listed in AllowUsers
May 12 16:06:51 odroid64 sshd\[27237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.29.212  user=backup
May 12 16:06:53 odroid64 sshd\[27237\]: Failed password for invalid user backup from 201.20.29.212 port 21001 ssh2
...
2019-10-18 06:15:18
178.128.81.60 attackspam
Oct 17 12:03:24 hanapaa sshd\[4131\]: Invalid user idckj from 178.128.81.60
Oct 17 12:03:24 hanapaa sshd\[4131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
Oct 17 12:03:26 hanapaa sshd\[4131\]: Failed password for invalid user idckj from 178.128.81.60 port 46960 ssh2
Oct 17 12:07:57 hanapaa sshd\[4501\]: Invalid user bernadine from 178.128.81.60
Oct 17 12:07:57 hanapaa sshd\[4501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
2019-10-18 06:24:08
201.206.194.71 attack
Dec  2 11:47:00 odroid64 sshd\[3362\]: User root from 201.206.194.71 not allowed because not listed in AllowUsers
Dec  2 11:47:00 odroid64 sshd\[3362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.206.194.71  user=root
Dec  2 11:47:03 odroid64 sshd\[3362\]: Failed password for invalid user root from 201.206.194.71 port 33226 ssh2
Mar 28 06:34:58 odroid64 sshd\[23712\]: Invalid user admin from 201.206.194.71
Mar 28 06:34:58 odroid64 sshd\[23712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.206.194.71
Mar 28 06:35:00 odroid64 sshd\[23712\]: Failed password for invalid user admin from 201.206.194.71 port 33026 ssh2
...
2019-10-18 06:08:03
117.50.43.236 attackbotsspam
Lines containing failures of 117.50.43.236
Oct 17 20:43:38 *** sshd[124781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.43.236  user=r.r
Oct 17 20:43:41 *** sshd[124781]: Failed password for r.r from 117.50.43.236 port 38146 ssh2
Oct 17 20:43:41 *** sshd[124781]: Received disconnect from 117.50.43.236 port 38146:11: Bye Bye [preauth]
Oct 17 20:43:41 *** sshd[124781]: Disconnected from authenticating user r.r 117.50.43.236 port 38146 [preauth]
Oct 17 21:09:43 *** sshd[126580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.43.236  user=r.r
Oct 17 21:09:46 *** sshd[126580]: Failed password for r.r from 117.50.43.236 port 48554 ssh2
Oct 17 21:09:46 *** sshd[126580]: Received disconnect from 117.50.43.236 port 48554:11: Bye Bye [preauth]
Oct 17 21:09:46 *** sshd[126580]: Disconnected from authenticating user r.r 117.50.43.236 port 48554 [preauth]
Oct 17 21:15:00 *** sshd[12682........
------------------------------
2019-10-18 06:16:11
2.141.66.247 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.141.66.247/ 
 ES - 1H : (52)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN3352 
 
 IP : 2.141.66.247 
 
 CIDR : 2.141.0.0/16 
 
 PREFIX COUNT : 662 
 
 UNIQUE IP COUNT : 10540800 
 
 
 WYKRYTE ATAKI Z ASN3352 :  
  1H - 1 
  3H - 4 
  6H - 6 
 12H - 11 
 24H - 21 
 
 DateTime : 2019-10-17 21:50:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 06:30:57
201.17.146.80 attack
Feb 28 17:09:37 odroid64 sshd\[24587\]: Invalid user pablo from 201.17.146.80
Feb 28 17:09:37 odroid64 sshd\[24587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80
Feb 28 17:09:40 odroid64 sshd\[24587\]: Failed password for invalid user pablo from 201.17.146.80 port 10463 ssh2
Mar  6 10:32:21 odroid64 sshd\[2714\]: User root from 201.17.146.80 not allowed because not listed in AllowUsers
Mar  6 10:32:21 odroid64 sshd\[2714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80  user=root
Mar  6 10:32:23 odroid64 sshd\[2714\]: Failed password for invalid user root from 201.17.146.80 port 46146 ssh2
Mar  9 07:16:00 odroid64 sshd\[19038\]: Invalid user eazye from 201.17.146.80
Mar  9 07:16:00 odroid64 sshd\[19038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80
Mar  9 07:16:02 odroid64 sshd\[19038\]: Failed password for 
...
2019-10-18 06:45:52
92.242.240.17 attack
Oct 17 21:50:47 vpn01 sshd[30484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17
Oct 17 21:50:49 vpn01 sshd[30484]: Failed password for invalid user webdata from 92.242.240.17 port 51052 ssh2
...
2019-10-18 06:24:53
201.17.24.195 attackspam
Mar  2 02:15:45 odroid64 sshd\[28136\]: Invalid user admin from 201.17.24.195
Mar  2 02:15:45 odroid64 sshd\[28136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.24.195
Mar  2 02:15:47 odroid64 sshd\[28136\]: Failed password for invalid user admin from 201.17.24.195 port 51728 ssh2
Mar 10 18:02:44 odroid64 sshd\[2563\]: Invalid user jester from 201.17.24.195
Mar 10 18:02:44 odroid64 sshd\[2563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.24.195
Mar 10 18:02:46 odroid64 sshd\[2563\]: Failed password for invalid user jester from 201.17.24.195 port 46332 ssh2
Mar 16 09:17:27 odroid64 sshd\[2786\]: Invalid user sebastian from 201.17.24.195
Mar 16 09:17:28 odroid64 sshd\[2786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.24.195
Mar 16 09:17:30 odroid64 sshd\[2786\]: Failed password for invalid user sebastian from 201.17.24.195 p
...
2019-10-18 06:44:44
54.36.182.244 attackbots
Automatic report - Banned IP Access
2019-10-18 06:38:12

最近上报的IP列表

62.180.25.224 68.87.46.86 143.252.148.103 51.181.90.96
235.128.84.7 90.131.245.81 238.48.134.224 212.136.209.185
217.185.54.45 145.12.93.65 95.169.204.188 0.12.130.216
60.44.83.74 82.233.6.92 79.151.190.152 56.15.72.119
167.102.226.15 129.59.75.234 26.77.167.163 76.150.81.177