必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.120.169.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.120.169.139.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 22:29:29 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
Host 139.169.120.134.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 139.169.120.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.98.76.172 attackbots
Sep 21 08:29:16 raspberrypi sshd[14360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.98.76.172  user=root
Sep 21 08:29:19 raspberrypi sshd[14360]: Failed password for invalid user root from 203.98.76.172 port 34370 ssh2
...
2020-09-21 15:02:47
195.24.207.199 attack
2020-09-21T09:11:16.732914mail.standpoint.com.ua sshd[19475]: Failed password for invalid user admin from 195.24.207.199 port 58902 ssh2
2020-09-21T09:15:52.072541mail.standpoint.com.ua sshd[20030]: Invalid user oracle from 195.24.207.199 port 43442
2020-09-21T09:15:52.076512mail.standpoint.com.ua sshd[20030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.207.199
2020-09-21T09:15:52.072541mail.standpoint.com.ua sshd[20030]: Invalid user oracle from 195.24.207.199 port 43442
2020-09-21T09:15:53.528751mail.standpoint.com.ua sshd[20030]: Failed password for invalid user oracle from 195.24.207.199 port 43442 ssh2
...
2020-09-21 15:07:04
68.183.55.125 attackbots
<6 unauthorized SSH connections
2020-09-21 15:13:37
119.45.206.87 attackspam
Sep 21 08:25:03 host1 sshd[367955]: Invalid user myroot from 119.45.206.87 port 41312
Sep 21 08:25:04 host1 sshd[367955]: Failed password for invalid user myroot from 119.45.206.87 port 41312 ssh2
Sep 21 08:25:03 host1 sshd[367955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.206.87 
Sep 21 08:25:03 host1 sshd[367955]: Invalid user myroot from 119.45.206.87 port 41312
Sep 21 08:25:04 host1 sshd[367955]: Failed password for invalid user myroot from 119.45.206.87 port 41312 ssh2
...
2020-09-21 14:59:59
60.167.182.184 attackbotsspam
(sshd) Failed SSH login from 60.167.182.184 (CN/China/Anhui/Rongcheng/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 21 01:37:21 atlas sshd[23537]: Invalid user system from 60.167.182.184 port 50658
Sep 21 01:37:23 atlas sshd[23537]: Failed password for invalid user system from 60.167.182.184 port 50658 ssh2
Sep 21 02:10:43 atlas sshd[31842]: Invalid user admin from 60.167.182.184 port 47442
Sep 21 02:10:45 atlas sshd[31842]: Failed password for invalid user admin from 60.167.182.184 port 47442 ssh2
Sep 21 02:24:01 atlas sshd[2977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.184  user=root
2020-09-21 15:30:59
64.227.10.134 attack
2020-09-21T04:57:37.112426abusebot-5.cloudsearch.cf sshd[2110]: Invalid user jenkins from 64.227.10.134 port 45916
2020-09-21T04:57:37.120586abusebot-5.cloudsearch.cf sshd[2110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.10.134
2020-09-21T04:57:37.112426abusebot-5.cloudsearch.cf sshd[2110]: Invalid user jenkins from 64.227.10.134 port 45916
2020-09-21T04:57:39.698361abusebot-5.cloudsearch.cf sshd[2110]: Failed password for invalid user jenkins from 64.227.10.134 port 45916 ssh2
2020-09-21T05:02:58.398326abusebot-5.cloudsearch.cf sshd[2138]: Invalid user hadoop2 from 64.227.10.134 port 56604
2020-09-21T05:02:58.405164abusebot-5.cloudsearch.cf sshd[2138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.10.134
2020-09-21T05:02:58.398326abusebot-5.cloudsearch.cf sshd[2138]: Invalid user hadoop2 from 64.227.10.134 port 56604
2020-09-21T05:03:00.049582abusebot-5.cloudsearch.cf sshd[2138]: Fail
...
2020-09-21 15:24:21
34.80.223.251 attack
Sep 21 03:51:42 vps-51d81928 sshd[243703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.223.251 
Sep 21 03:51:42 vps-51d81928 sshd[243703]: Invalid user teste from 34.80.223.251 port 11856
Sep 21 03:51:44 vps-51d81928 sshd[243703]: Failed password for invalid user teste from 34.80.223.251 port 11856 ssh2
Sep 21 03:53:43 vps-51d81928 sshd[243774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.223.251  user=root
Sep 21 03:53:44 vps-51d81928 sshd[243774]: Failed password for root from 34.80.223.251 port 39436 ssh2
...
2020-09-21 15:18:31
114.248.163.89 attackbotsspam
DATE:2020-09-21 08:14:39, IP:114.248.163.89, PORT:ssh SSH brute force auth (docker-dc)
2020-09-21 15:13:22
121.204.59.179 attackbotsspam
(sshd) Failed SSH login from 121.204.59.179 (CN/China/179.59.204.121.board.fz.fj.dynamic.163data.com.cn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 19:01:16 rainbow sshd[7503]: Invalid user nagios from 121.204.59.179 port 44007
Sep 20 19:01:16 rainbow sshd[7503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.59.179 
Sep 20 19:01:16 rainbow sshd[7501]: Invalid user cablecom from 121.204.59.179 port 43995
Sep 20 19:01:16 rainbow sshd[7501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.59.179 
Sep 20 19:01:17 rainbow sshd[7507]: Invalid user netman from 121.204.59.179 port 44010
2020-09-21 15:09:30
115.20.154.2 attack
2020-09-20T17:01:23.607743Z 072b560c2df3 New connection: 115.20.154.2:6891 (172.17.0.5:2222) [session: 072b560c2df3]
2020-09-20T17:01:23.609087Z 29060788f68f New connection: 115.20.154.2:6932 (172.17.0.5:2222) [session: 29060788f68f]
2020-09-21 15:04:29
192.241.238.43 attack
Port scan denied
2020-09-21 15:27:48
223.16.156.13 attackbotsspam
$f2bV_matches
2020-09-21 15:26:15
186.249.192.66 attack
Unauthorized connection attempt from IP address 186.249.192.66 on Port 445(SMB)
2020-09-21 15:16:27
122.51.254.221 attack
Sep 20 20:12:34 mockhub sshd[347486]: Failed password for invalid user postgres from 122.51.254.221 port 51688 ssh2
Sep 20 20:17:16 mockhub sshd[347678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.254.221  user=root
Sep 20 20:17:18 mockhub sshd[347678]: Failed password for root from 122.51.254.221 port 46388 ssh2
...
2020-09-21 15:20:42
104.198.228.2 attackspam
Sep 20 19:40:42 sachi sshd\[23404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.228.2  user=root
Sep 20 19:40:44 sachi sshd\[23404\]: Failed password for root from 104.198.228.2 port 54182 ssh2
Sep 20 19:44:32 sachi sshd\[23663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.228.2  user=root
Sep 20 19:44:35 sachi sshd\[23663\]: Failed password for root from 104.198.228.2 port 36632 ssh2
Sep 20 19:48:20 sachi sshd\[23991\]: Invalid user alex from 104.198.228.2
2020-09-21 15:30:19

最近上报的IP列表

76.216.122.224 139.151.56.156 225.14.4.50 49.50.202.115
172.38.65.201 143.148.209.125 136.95.223.187 4.70.138.119
155.241.249.158 23.11.197.141 172.100.211.12 166.115.231.8
195.62.104.39 21.77.58.238 3.116.191.253 220.230.94.169
197.90.53.160 40.45.81.210 104.166.133.128 240.247.57.115