必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.102.211.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56415
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.102.211.164.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:01:08 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 164.211.102.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.211.102.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
52.152.172.146 attack
2020-07-14T09:55:34.263287abusebot-5.cloudsearch.cf sshd[15904]: Invalid user jqliu from 52.152.172.146 port 40572
2020-07-14T09:55:34.269831abusebot-5.cloudsearch.cf sshd[15904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.152.172.146
2020-07-14T09:55:34.263287abusebot-5.cloudsearch.cf sshd[15904]: Invalid user jqliu from 52.152.172.146 port 40572
2020-07-14T09:55:36.199176abusebot-5.cloudsearch.cf sshd[15904]: Failed password for invalid user jqliu from 52.152.172.146 port 40572 ssh2
2020-07-14T09:58:11.320960abusebot-5.cloudsearch.cf sshd[16003]: Invalid user umeno from 52.152.172.146 port 52550
2020-07-14T09:58:11.326278abusebot-5.cloudsearch.cf sshd[16003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.152.172.146
2020-07-14T09:58:11.320960abusebot-5.cloudsearch.cf sshd[16003]: Invalid user umeno from 52.152.172.146 port 52550
2020-07-14T09:58:12.810524abusebot-5.cloudsearch.cf sshd[16003]:
...
2020-07-14 18:57:06
103.99.3.172 attackspambots
[H1.VM4] Blocked by UFW
2020-07-14 18:55:23
125.212.154.102 attack
2020-07-13 22:34:13.177060-0500  localhost smtpd[19546]: NOQUEUE: reject: RCPT from unknown[125.212.154.102]: 554 5.7.1 Service unavailable; Client host [125.212.154.102] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/125.212.154.102; from= to= proto=ESMTP helo=<[125.212.154.102]>
2020-07-14 18:58:43
109.173.64.123 attackbots
Unauthorized access to SSH at 14/Jul/2020:03:48:07 +0000.
Received:  (SSH-2.0-libssh2_1.7.0)
2020-07-14 18:56:32
49.232.5.172 attackspam
2020-07-13 UTC: (39x) - ab,admin,berit,bmc,christian,devhdfc,df,dowon,dsl,ftpuser,gitadmin,hamada,irs,jacosta,jboss,kusum,linux,ll,lma,master,minecraft,monte,nagios1,ora,pelayo,pyp,reena,robin,sims,staff,t,test,test123,teste1,user,user1,wbc,yang,zabbix
2020-07-14 18:45:19
139.198.124.14 attackbotsspam
Invalid user tia from 139.198.124.14 port 48120
2020-07-14 18:43:16
80.82.64.98 attack
SMTP blocked logins: 60. Dates: 13-7-2020 / 14-7-2020
2020-07-14 19:08:28
91.121.164.188 attackspam
Jul 14 12:18:24 vps sshd[649607]: Failed password for invalid user ark from 91.121.164.188 port 55028 ssh2
Jul 14 12:21:19 vps sshd[665315]: Invalid user ts3 from 91.121.164.188 port 50606
Jul 14 12:21:19 vps sshd[665315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns360710.ip-91-121-164.eu
Jul 14 12:21:22 vps sshd[665315]: Failed password for invalid user ts3 from 91.121.164.188 port 50606 ssh2
Jul 14 12:24:15 vps sshd[676592]: Invalid user client from 91.121.164.188 port 46168
...
2020-07-14 18:31:59
80.82.65.187 attackbotsspam
SMTP blocked logins: 54. Dates: 13-7-2020 / 14-7-2020
2020-07-14 19:07:59
89.23.37.77 attackbots
89.23.37.77 - - [14/Jul/2020:08:38:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
89.23.37.77 - - [14/Jul/2020:08:38:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
89.23.37.77 - - [14/Jul/2020:08:38:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-14 19:03:35
114.67.77.159 attack
Failed password for invalid user git from 114.67.77.159 port 59360 ssh2
2020-07-14 18:35:08
176.149.136.104 attackbots
Jul 14 10:26:43 nextcloud sshd\[24596\]: Invalid user keystone from 176.149.136.104
Jul 14 10:26:43 nextcloud sshd\[24596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.149.136.104
Jul 14 10:26:46 nextcloud sshd\[24596\]: Failed password for invalid user keystone from 176.149.136.104 port 33308 ssh2
2020-07-14 18:37:02
27.115.127.210 attackbots
Jul 14 11:51:30 web sshd[25587]: Invalid user postgres from 27.115.127.210 port 45530
Jul 14 11:51:32 web sshd[25587]: Failed password for invalid user postgres from 27.115.127.210 port 45530 ssh2
Jul 14 11:53:13 web sshd[25592]: Invalid user screener from 27.115.127.210 port 59186
...
2020-07-14 18:40:34
13.232.101.122 attackbots
2020-07-14T11:47:38+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-14 18:30:34
189.135.197.7 attackspam
Jul 14 06:48:33 nextcloud sshd\[19311\]: Invalid user fld from 189.135.197.7
Jul 14 06:48:33 nextcloud sshd\[19311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.135.197.7
Jul 14 06:48:35 nextcloud sshd\[19311\]: Failed password for invalid user fld from 189.135.197.7 port 41296 ssh2
2020-07-14 18:53:40

最近上报的IP列表

119.35.129.38 47.241.128.83 207.55.63.246 239.84.213.101
141.69.248.164 54.201.170.145 61.104.184.27 125.156.31.116
75.101.114.11 13.166.92.77 9.174.27.197 135.133.237.53
251.149.108.149 9.80.114.226 127.143.55.125 22.1.116.71
40.100.103.189 94.20.97.16 250.215.18.77 144.28.194.66