必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
134.0.119.111 attackbotsspam
$f2bV_matches
2020-09-28 03:36:57
134.0.119.111 attackspambots
2020-09-27T07:53:03.378773abusebot-3.cloudsearch.cf sshd[3898]: Invalid user personal from 134.0.119.111 port 54676
2020-09-27T07:53:03.384318abusebot-3.cloudsearch.cf sshd[3898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134-0-119-111.cloudvps.regruhosting.ru
2020-09-27T07:53:03.378773abusebot-3.cloudsearch.cf sshd[3898]: Invalid user personal from 134.0.119.111 port 54676
2020-09-27T07:53:04.956642abusebot-3.cloudsearch.cf sshd[3898]: Failed password for invalid user personal from 134.0.119.111 port 54676 ssh2
2020-09-27T07:56:41.704949abusebot-3.cloudsearch.cf sshd[3973]: Invalid user vinay from 134.0.119.111 port 34704
2020-09-27T07:56:41.711357abusebot-3.cloudsearch.cf sshd[3973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134-0-119-111.cloudvps.regruhosting.ru
2020-09-27T07:56:41.704949abusebot-3.cloudsearch.cf sshd[3973]: Invalid user vinay from 134.0.119.111 port 34704
2020-09-27T07:56:43
...
2020-09-27 19:49:54
134.0.119.111 attack
Sep 24 22:11:44 sshgateway sshd\[2165\]: Invalid user postgres from 134.0.119.111
Sep 24 22:11:44 sshgateway sshd\[2165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134-0-119-111.cloudvps.regruhosting.ru
Sep 24 22:11:46 sshgateway sshd\[2165\]: Failed password for invalid user postgres from 134.0.119.111 port 42476 ssh2
2020-09-25 04:38:34
134.0.119.111 attackbots
134.0.119.111 (RU/Russia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 24 09:54:49 server5 sshd[24884]: Failed password for root from 54.37.71.207 port 58842 ssh2
Sep 24 10:11:21 server5 sshd[31851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.0.119.111  user=root
Sep 24 10:01:13 server5 sshd[27514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.129  user=root
Sep 24 10:01:15 server5 sshd[27514]: Failed password for root from 157.245.204.129 port 36112 ssh2
Sep 24 09:59:23 server5 sshd[26655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.152.17  user=root
Sep 24 09:59:26 server5 sshd[26655]: Failed password for root from 180.76.152.17 port 56656 ssh2

IP Addresses Blocked:

54.37.71.207 (FR/France/-)
2020-09-25 03:10:28
134.0.119.111 attackbots
Invalid user kong from 134.0.119.111 port 53342
2020-09-24 18:53:29
134.0.119.111 attackbots
Invalid user natasha from 134.0.119.111 port 35178
2020-05-29 13:51:18
134.0.119.111 attack
2020-05-27T22:52:55.506374abusebot.cloudsearch.cf sshd[14911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134-0-119-111.cloudvps.regruhosting.ru  user=root
2020-05-27T22:52:57.436532abusebot.cloudsearch.cf sshd[14911]: Failed password for root from 134.0.119.111 port 55302 ssh2
2020-05-27T22:56:15.153242abusebot.cloudsearch.cf sshd[15196]: Invalid user eachbytr from 134.0.119.111 port 60400
2020-05-27T22:56:15.157651abusebot.cloudsearch.cf sshd[15196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134-0-119-111.cloudvps.regruhosting.ru
2020-05-27T22:56:15.153242abusebot.cloudsearch.cf sshd[15196]: Invalid user eachbytr from 134.0.119.111 port 60400
2020-05-27T22:56:16.547365abusebot.cloudsearch.cf sshd[15196]: Failed password for invalid user eachbytr from 134.0.119.111 port 60400 ssh2
2020-05-27T22:59:26.888044abusebot.cloudsearch.cf sshd[15448]: pam_unix(sshd:auth): authentication failure; logname=
...
2020-05-28 07:50:00
134.0.113.108 attack
Apr  9 14:32:28 *** sshd[25434]: Invalid user apache from 134.0.113.108
Apr  9 14:32:30 *** sshd[25434]: Failed password for invalid user apache from 134.0.113.108 port 40760 ssh2
Apr  9 14:41:26 *** sshd[26407]: Invalid user jenkins from 134.0.113.108


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.0.113.108
2020-04-09 23:04:56
134.0.119.93 attackbots
Automatic report - Banned IP Access
2019-07-29 00:51:29
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.0.11.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.0.11.203.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 21:01:30 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
203.11.0.134.in-addr.arpa domain name pointer vxhcg-30.srv.cat.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
203.11.0.134.in-addr.arpa	name = vxhcg-30.srv.cat.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.19.29.200 attack
Unauthorized connection attempt detected from IP address 94.19.29.200 to port 26
2020-07-22 19:00:11
222.186.42.155 attackbotsspam
Jul 22 04:05:00 dignus sshd[15327]: Failed password for root from 222.186.42.155 port 54902 ssh2
Jul 22 04:05:03 dignus sshd[15356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Jul 22 04:05:05 dignus sshd[15356]: Failed password for root from 222.186.42.155 port 41456 ssh2
Jul 22 04:05:12 dignus sshd[15383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Jul 22 04:05:14 dignus sshd[15383]: Failed password for root from 222.186.42.155 port 13172 ssh2
...
2020-07-22 19:09:25
156.96.118.42 attack
firewall-block, port(s): 23/tcp
2020-07-22 18:55:10
81.156.142.137 attack
Invalid user postgres from 81.156.142.137 port 51916
2020-07-22 19:21:40
171.212.253.132 attackspam
Unauthorized connection attempt detected from IP address 171.212.253.132 to port 1433
2020-07-22 18:53:58
191.232.184.32 attackbotsspam
 TCP (SYN) 191.232.184.32:9195 -> port 23, len 44
2020-07-22 19:13:53
52.148.202.239 attack
Unauthorized connection attempt detected from IP address 52.148.202.239 to port 1433
2020-07-22 19:05:24
194.105.205.42 attackbotsspam
5x Failed Password
2020-07-22 19:12:59
171.112.145.157 attackbotsspam
Unauthorized connection attempt detected from IP address 171.112.145.157 to port 5555
2020-07-22 18:54:13
49.235.152.2 attackspam
Unauthorized connection attempt detected from IP address 49.235.152.2 to port 23
2020-07-22 19:25:20
162.243.128.227 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-22 18:54:35
96.92.139.225 attackspambots
Unauthorized connection attempt detected from IP address 96.92.139.225 to port 85
2020-07-22 18:59:21
218.92.0.215 attack
Jul 22 12:44:27 vps sshd[211353]: Failed password for root from 218.92.0.215 port 14039 ssh2
Jul 22 12:44:30 vps sshd[211353]: Failed password for root from 218.92.0.215 port 14039 ssh2
Jul 22 12:44:34 vps sshd[211819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215  user=root
Jul 22 12:44:37 vps sshd[211819]: Failed password for root from 218.92.0.215 port 24153 ssh2
Jul 22 12:44:39 vps sshd[211819]: Failed password for root from 218.92.0.215 port 24153 ssh2
...
2020-07-22 18:48:03
47.106.113.196 attackbots
Unauthorized connection attempt detected from IP address 47.106.113.196 to port 80
2020-07-22 19:25:45
185.220.100.255 attack
Unauthorized connection attempt detected from IP address 185.220.100.255 to port 80
2020-07-22 18:51:14

最近上报的IP列表

134.0.10.166 133.94.1.4 27.38.163.123 134.0.10.171
134.0.115.113 134.0.42.108 134.0.117.36 134.0.14.217
134.0.114.111 134.0.14.152 104.21.94.174 134.0.42.90
134.0.14.69 134.0.14.58 134.0.14.84 134.0.42.56
134.0.77.18 134.0.63.2 134.0.78.241 134.0.9.174