必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.11.24.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.11.24.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:11:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 149.24.11.134.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 134.11.24.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.224.177.6 attackbotsspam
[Thu May 14 08:18:03 2020] - Syn Flood From IP: 171.224.177.6 Port: 48776
2020-05-15 04:18:03
67.78.68.198 attackspambots
Unauthorized connection attempt detected from IP address 67.78.68.198 to port 23
2020-05-15 03:49:03
185.176.27.98 attack
05/14/2020-14:54:03.918233 185.176.27.98 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-15 04:13:23
167.99.186.215 attackbots
Fail2Ban Ban Triggered
2020-05-15 03:47:48
87.251.74.197 attackbots
May 14 22:10:39 debian-2gb-nbg1-2 kernel: \[11745891.860173\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.197 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=23015 PROTO=TCP SPT=49249 DPT=11261 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-15 04:17:23
222.117.7.182 attackbotsspam
firewall-block, port(s): 81/tcp
2020-05-15 03:57:21
62.234.182.174 attackspambots
May 14 21:46:26 OPSO sshd\[12641\]: Invalid user fpt from 62.234.182.174 port 40500
May 14 21:46:26 OPSO sshd\[12641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.182.174
May 14 21:46:28 OPSO sshd\[12641\]: Failed password for invalid user fpt from 62.234.182.174 port 40500 ssh2
May 14 21:50:54 OPSO sshd\[13578\]: Invalid user ts3bot from 62.234.182.174 port 59754
May 14 21:50:54 OPSO sshd\[13578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.182.174
2020-05-15 03:52:43
218.78.84.162 attackbotsspam
odoo8
...
2020-05-15 04:00:33
106.12.80.138 attackspam
2020-05-14T14:20:11.1675111240 sshd\[2038\]: Invalid user support from 106.12.80.138 port 47392
2020-05-14T14:20:11.1723681240 sshd\[2038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.80.138
2020-05-14T14:20:13.1762671240 sshd\[2038\]: Failed password for invalid user support from 106.12.80.138 port 47392 ssh2
...
2020-05-15 04:09:14
118.98.80.2 attackbots
firewall-block, port(s): 5038/tcp
2020-05-15 04:12:11
138.118.4.168 attack
Invalid user user from 138.118.4.168 port 36674
2020-05-15 04:22:38
14.247.175.124 attackbotsspam
Invalid user test from 14.247.175.124 port 55531
2020-05-15 04:01:29
8.252.241.254 attackspam
"BROWSER-IE Microsoft Edge App-v vbs command attempt"
2020-05-15 04:21:56
49.68.223.77 attack
Email rejected due to spam filtering
2020-05-15 03:57:05
47.240.20.196 attackspam
20 attempts against mh-ssh on sea
2020-05-15 03:56:44

最近上报的IP列表

174.231.90.7 162.90.178.169 109.244.4.152 206.30.78.17
41.126.209.237 18.233.30.161 103.239.65.63 89.113.139.156
236.19.167.43 35.130.204.123 207.223.116.137 84.108.238.104
244.16.46.251 194.102.175.33 70.252.101.68 205.108.168.148
140.51.164.137 118.200.182.133 86.67.37.55 4.184.181.20