必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.30.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.119.30.203.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:55:37 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
203.30.119.134.in-addr.arpa domain name pointer emsrv7.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
203.30.119.134.in-addr.arpa	name = emsrv7.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.245.101.31 attack
$f2bV_matches
2020-09-12 02:38:01
74.120.14.50 attack
Unauthorized connection attempt detected port 8080
2020-09-12 02:34:52
93.174.93.31 attackbotsspam
Sep  8 19:53:47 web01.agentur-b-2.de postfix/smtps/smtpd[3222064]: warning: unknown[93.174.93.31]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:55:33 web01.agentur-b-2.de postfix/smtps/smtpd[3222064]: warning: unknown[93.174.93.31]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:55:42 web01.agentur-b-2.de postfix/smtps/smtpd[3222064]: warning: unknown[93.174.93.31]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:56:20 web01.agentur-b-2.de postfix/smtps/smtpd[3222064]: warning: unknown[93.174.93.31]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:58:13 web01.agentur-b-2.de postfix/smtps/smtpd[3223750]: warning: unknown[93.174.93.31]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-12 02:21:31
78.128.113.120 attack
abuse-sasl
2020-09-12 02:14:48
88.79.208.11 attack
 TCP (SYN) 88.79.208.11:42499 -> port 445, len 44
2020-09-12 02:24:26
192.99.175.86 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-12 02:33:14
142.93.35.169 attackbotsspam
xmlrpc attack
2020-09-12 02:21:01
206.189.124.26 attackbots
Sep 11 15:12:24 vps46666688 sshd[13906]: Failed password for root from 206.189.124.26 port 51346 ssh2
Sep 11 15:16:11 vps46666688 sshd[14003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.124.26
...
2020-09-12 02:30:39
91.235.0.104 attackbotsspam
Sep  8 20:37:36 mail.srvfarm.net postfix/smtps/smtpd[1957217]: warning: 91-235-0-104.static.ip.netia.com.pl[91.235.0.104]: SASL PLAIN authentication failed: 
Sep  8 20:37:36 mail.srvfarm.net postfix/smtps/smtpd[1957217]: lost connection after AUTH from 91-235-0-104.static.ip.netia.com.pl[91.235.0.104]
Sep  8 20:38:13 mail.srvfarm.net postfix/smtpd[1954569]: warning: 91-235-0-104.static.ip.netia.com.pl[91.235.0.104]: SASL PLAIN authentication failed: 
Sep  8 20:38:13 mail.srvfarm.net postfix/smtpd[1954569]: lost connection after AUTH from 91-235-0-104.static.ip.netia.com.pl[91.235.0.104]
Sep  8 20:43:50 mail.srvfarm.net postfix/smtpd[1954281]: warning: 91-235-0-104.static.ip.netia.com.pl[91.235.0.104]: SASL PLAIN authentication failed:
2020-09-12 02:13:26
118.129.34.166 attackbots
Sep 11 10:24:11 vps-51d81928 sshd[9559]: Failed password for invalid user usuario from 118.129.34.166 port 27218 ssh2
Sep 11 10:29:00 vps-51d81928 sshd[9574]: Invalid user wangxue from 118.129.34.166 port 42035
Sep 11 10:29:00 vps-51d81928 sshd[9574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.129.34.166 
Sep 11 10:29:00 vps-51d81928 sshd[9574]: Invalid user wangxue from 118.129.34.166 port 42035
Sep 11 10:29:02 vps-51d81928 sshd[9574]: Failed password for invalid user wangxue from 118.129.34.166 port 42035 ssh2
...
2020-09-12 02:26:02
77.57.204.34 attackspam
Sep 11 19:14:11 sshgateway sshd\[30018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77-57-204-34.dclient.hispeed.ch  user=root
Sep 11 19:14:13 sshgateway sshd\[30018\]: Failed password for root from 77.57.204.34 port 39335 ssh2
Sep 11 19:17:09 sshgateway sshd\[30382\]: Invalid user diane from 77.57.204.34
Sep 11 19:17:09 sshgateway sshd\[30382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77-57-204-34.dclient.hispeed.ch
2020-09-12 02:25:48
45.224.161.251 attackbots
Sep  7 12:57:08 mail.srvfarm.net postfix/smtps/smtpd[1056821]: warning: unknown[45.224.161.251]: SASL PLAIN authentication failed: 
Sep  7 12:57:09 mail.srvfarm.net postfix/smtps/smtpd[1056821]: lost connection after AUTH from unknown[45.224.161.251]
Sep  7 13:00:12 mail.srvfarm.net postfix/smtps/smtpd[1056821]: warning: unknown[45.224.161.251]: SASL PLAIN authentication failed: 
Sep  7 13:00:13 mail.srvfarm.net postfix/smtps/smtpd[1056821]: lost connection after AUTH from unknown[45.224.161.251]
Sep  7 13:00:37 mail.srvfarm.net postfix/smtps/smtpd[1056821]: warning: unknown[45.224.161.251]: SASL PLAIN authentication failed:
2020-09-12 02:15:07
103.19.201.83 attack
Sep  7 12:52:47 mail.srvfarm.net postfix/smtps/smtpd[1059471]: warning: unknown[103.19.201.83]: SASL PLAIN authentication failed: 
Sep  7 12:52:47 mail.srvfarm.net postfix/smtps/smtpd[1059471]: lost connection after AUTH from unknown[103.19.201.83]
Sep  7 12:54:28 mail.srvfarm.net postfix/smtpd[1058623]: warning: unknown[103.19.201.83]: SASL PLAIN authentication failed: 
Sep  7 12:54:29 mail.srvfarm.net postfix/smtpd[1058623]: lost connection after AUTH from unknown[103.19.201.83]
Sep  7 12:58:10 mail.srvfarm.net postfix/smtps/smtpd[1056884]: warning: unknown[103.19.201.83]: SASL PLAIN authentication failed:
2020-09-12 02:11:18
89.248.168.107 attackspambots
Sep  8 19:30:35 web01.agentur-b-2.de postfix/smtps/smtpd[3217555]: warning: unknown[89.248.168.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:30:40 web01.agentur-b-2.de postfix/smtps/smtpd[3218209]: warning: unknown[89.248.168.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:32:35 web01.agentur-b-2.de postfix/smtps/smtpd[3218487]: warning: unknown[89.248.168.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:33:36 web01.agentur-b-2.de postfix/smtps/smtpd[3218487]: warning: unknown[89.248.168.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 19:33:48 web01.agentur-b-2.de postfix/smtps/smtpd[3218569]: warning: unknown[89.248.168.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-12 02:13:51
176.109.0.30 attackspam
Lines containing failures of 176.109.0.30
Sep  9 13:30:23 shared03 sshd[6732]: Invalid user fileserver from 176.109.0.30 port 54224
Sep  9 13:30:23 shared03 sshd[6732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.109.0.30
Sep  9 13:30:25 shared03 sshd[6732]: Failed password for invalid user fileserver from 176.109.0.30 port 54224 ssh2
Sep  9 13:30:25 shared03 sshd[6732]: Received disconnect from 176.109.0.30 port 54224:11: Bye Bye [preauth]
Sep  9 13:30:25 shared03 sshd[6732]: Disconnected from invalid user fileserver 176.109.0.30 port 54224 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.109.0.30
2020-09-12 02:35:14

最近上报的IP列表

134.119.40.192 134.119.39.207 134.119.42.127 134.119.43.40
134.119.43.67 134.119.45.157 134.119.45.5 134.119.45.171
134.119.45.135 134.119.45.203 134.119.45.87 134.119.52.92
134.119.58.12 134.119.62.95 134.119.5.216 134.119.65.230
134.122.101.16 134.122.104.55 134.122.105.223 134.119.73.74