必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.0.0.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.0.0.0.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020202 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 03 07:40:55 CST 2022
;; MSG SIZE  rcvd: 102
HOST信息:
Host 0.0.0.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.0.0.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.192.218.45 attackbotsspam
Unauthorized connection attempt detected from IP address 159.192.218.45 to port 445
2019-12-18 14:48:15
188.19.13.50 attackbotsspam
Unauthorized connection attempt detected from IP address 188.19.13.50 to port 445
2019-12-18 14:46:41
162.221.88.250 attackspambots
Host Scan
2019-12-18 15:13:48
218.92.0.168 attackspam
Dec 18 13:58:33 webhost01 sshd[18302]: Failed password for root from 218.92.0.168 port 60898 ssh2
Dec 18 13:58:47 webhost01 sshd[18302]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 60898 ssh2 [preauth]
...
2019-12-18 15:01:48
79.137.116.6 attackspam
Brute-force attempt banned
2019-12-18 14:59:30
115.236.168.35 attack
Dec 18 07:19:04 markkoudstaal sshd[20118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.168.35
Dec 18 07:19:06 markkoudstaal sshd[20118]: Failed password for invalid user guest from 115.236.168.35 port 35936 ssh2
Dec 18 07:25:21 markkoudstaal sshd[20847]: Failed password for nobody from 115.236.168.35 port 59784 ssh2
2019-12-18 14:26:45
18.232.1.62 attack
Port scan on 1 port(s): 53
2019-12-18 14:27:47
196.15.168.139 attack
Unauthorised access (Dec 18) SRC=196.15.168.139 LEN=52 TTL=113 ID=11088 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-18 14:45:27
213.217.5.23 attack
Dec 18 06:25:39 yesfletchmain sshd\[16220\]: Invalid user kleimen from 213.217.5.23 port 37458
Dec 18 06:25:39 yesfletchmain sshd\[16220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.217.5.23
Dec 18 06:25:41 yesfletchmain sshd\[16220\]: Failed password for invalid user kleimen from 213.217.5.23 port 37458 ssh2
Dec 18 06:30:37 yesfletchmain sshd\[16344\]: Invalid user www from 213.217.5.23 port 47806
Dec 18 06:30:37 yesfletchmain sshd\[16344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.217.5.23
...
2019-12-18 14:44:22
222.186.180.6 attackbots
Dec 17 20:30:09 wbs sshd\[26079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Dec 17 20:30:11 wbs sshd\[26079\]: Failed password for root from 222.186.180.6 port 47234 ssh2
Dec 17 20:30:14 wbs sshd\[26079\]: Failed password for root from 222.186.180.6 port 47234 ssh2
Dec 17 20:30:27 wbs sshd\[26103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Dec 17 20:30:29 wbs sshd\[26103\]: Failed password for root from 222.186.180.6 port 57816 ssh2
2019-12-18 14:43:45
190.64.64.74 attackbots
Lines containing failures of 190.64.64.74
Dec 18 04:38:55 kopano sshd[10730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.64.74  user=r.r
Dec 18 04:38:57 kopano sshd[10730]: Failed password for r.r from 190.64.64.74 port 47595 ssh2
Dec 18 04:38:57 kopano sshd[10730]: Received disconnect from 190.64.64.74 port 47595:11: Bye Bye [preauth]
Dec 18 04:38:57 kopano sshd[10730]: Disconnected from authenticating user r.r 190.64.64.74 port 47595 [preauth]
Dec 18 04:51:35 kopano sshd[11465]: Invalid user redmine from 190.64.64.74 port 60929
Dec 18 04:51:35 kopano sshd[11465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.64.74
Dec 18 04:51:36 kopano sshd[11465]: Failed password for invalid user redmine from 190.64.64.74 port 60929 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.64.64.74
2019-12-18 15:12:16
154.126.32.138 attack
Dec 18 07:21:09 vps691689 sshd[2566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.126.32.138
Dec 18 07:21:11 vps691689 sshd[2566]: Failed password for invalid user host from 154.126.32.138 port 45854 ssh2
...
2019-12-18 14:56:00
106.13.122.102 attackspam
Dec 18 08:05:51 [host] sshd[26549]: Invalid user server from 106.13.122.102
Dec 18 08:05:51 [host] sshd[26549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.122.102
Dec 18 08:05:53 [host] sshd[26549]: Failed password for invalid user server from 106.13.122.102 port 55376 ssh2
2019-12-18 15:07:42
49.88.112.64 attackspambots
2019-12-18T07:00:04.715603homeassistant sshd[17899]: Failed none for root from 49.88.112.64 port 30177 ssh2
2019-12-18T07:00:04.927433homeassistant sshd[17899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.64  user=root
...
2019-12-18 15:00:34
54.39.44.47 attackbotsspam
Dec 18 01:25:15 ny01 sshd[18711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.44.47
Dec 18 01:25:17 ny01 sshd[18711]: Failed password for invalid user lashell from 54.39.44.47 port 57492 ssh2
Dec 18 01:30:27 ny01 sshd[19410]: Failed password for root from 54.39.44.47 port 35734 ssh2
2019-12-18 14:52:04

最近上报的IP列表

159.40.249.218 136.27.159.156 61.28.166.40 19.109.86.135
134.209.255.170 205.66.234.217 85.209.185.171 40.188.64.115
23.149.180.210 255.5.239.120 157.189.6.83 111.115.69.6
100.15.28.211 212.141.177.119 212.247.56.156 89.36.181.3
173.65.16.171 134.184.231.47 20.75.230.14 58.64.51.128