必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): velia.net Internetdienste GmbH

主机名(hostname): unknown

机构(organization): velia.net Internetdienste GmbH

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
Port Scan: TCP/80
2019-08-24 15:28:11
attackspam
Port Scan: TCP/80
2019-08-17 00:09:42
相同子网IP讨论:
IP 类型 评论内容 时间
134.119.216.167 attackbotsspam
Unauthorized access detected from black listed ip!
2020-07-25 01:54:14
134.119.216.241 attackbots
[H1] Blocked by UFW
2020-06-06 18:32:10
134.119.216.82 attackbots
May  4 22:56:04 icecube sshd[35887]: Failed password for invalid user sdbadmin from 134.119.216.82 port 41224 ssh2
2020-05-05 05:18:25
134.119.216.241 attackbotsspam
*Port Scan* detected from 134.119.216.241 (FR/France/-). 11 hits in the last 225 seconds
2020-04-25 12:37:30
134.119.216.74 attackbotsspam
ssh brute force
2020-02-14 02:44:33
134.119.216.167 attack
Unauthorized access detected from banned ip
2019-08-12 08:50:46
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.216.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25667
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.119.216.249.		IN	A

;; AUTHORITY SECTION:
.			2161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081600 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 17 00:09:25 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 249.216.119.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 249.216.119.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.89.58.27 attack
Unauthorized connection attempt detected from IP address 180.89.58.27 to port 2220 [J]
2020-01-23 19:07:33
223.255.243.115 attackbots
"SSH brute force auth login attempt."
2020-01-23 18:56:49
103.107.228.150 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-23 18:48:57
106.12.125.241 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 19:15:22
106.13.190.122 attack
Jan 23 10:36:48 server sshd\[12805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.190.122  user=root
Jan 23 10:36:50 server sshd\[12805\]: Failed password for root from 106.13.190.122 port 46662 ssh2
Jan 23 10:51:19 server sshd\[16303\]: Invalid user nian from 106.13.190.122
Jan 23 10:51:19 server sshd\[16303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.190.122 
Jan 23 10:51:21 server sshd\[16303\]: Failed password for invalid user nian from 106.13.190.122 port 34742 ssh2
...
2020-01-23 18:50:34
66.249.155.244 attackbots
"SSH brute force auth login attempt."
2020-01-23 19:17:34
196.38.70.24 attackbots
Unauthorized connection attempt detected from IP address 196.38.70.24 to port 2220 [J]
2020-01-23 18:57:21
91.92.186.47 attack
"SMTP brute force auth login attempt."
2020-01-23 19:04:06
128.199.166.224 attackspambots
Unauthorized connection attempt detected from IP address 128.199.166.224 to port 2220 [J]
2020-01-23 19:03:27
115.29.3.34 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 18:47:41
110.5.46.249 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 18:48:22
104.248.170.45 attackspam
"SSH brute force auth login attempt."
2020-01-23 19:22:25
175.6.133.182 attackbots
2020-01-23T11:25:24.275125www postfix/smtpd[19969]: warning: unknown[175.6.133.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-23T11:25:33.260552www postfix/smtpd[19969]: warning: unknown[175.6.133.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-23T11:25:46.092703www postfix/smtpd[19969]: warning: unknown[175.6.133.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-23 18:54:03
206.189.98.225 attackspambots
"SSH brute force auth login attempt."
2020-01-23 19:05:19
188.127.190.65 attackspambots
"SSH brute force auth login attempt."
2020-01-23 18:47:01

最近上报的IP列表

134.73.88.232 158.62.237.92 132.148.142.246 229.69.210.155
124.115.48.189 51.168.169.85 10.126.254.179 73.11.237.130
123.144.248.140 121.23.22.157 37.125.225.232 116.26.126.88
119.235.144.43 126.56.83.204 110.185.168.131 104.38.143.121
108.191.21.166 35.168.227.43 75.55.27.147 108.162.246.20