必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.130.14.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3031
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.130.14.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 01:58:57 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
73.14.130.134.in-addr.arpa domain name pointer med3-lammert.mk3.rwth-aachen.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.14.130.134.in-addr.arpa	name = med3-lammert.mk3.rwth-aachen.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
219.235.6.221 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-04 05:43:05
157.230.32.164 attackbots
May  3 20:30:28 localhost sshd[65552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.32.164  user=root
May  3 20:30:30 localhost sshd[65552]: Failed password for root from 157.230.32.164 port 47720 ssh2
May  3 20:35:12 localhost sshd[87012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.32.164  user=root
May  3 20:35:14 localhost sshd[87012]: Failed password for root from 157.230.32.164 port 57538 ssh2
May  3 20:39:42 localhost sshd[92101]: Invalid user shi from 157.230.32.164 port 39136
...
2020-05-04 05:29:59
1.162.144.100 attack
Telnet Server BruteForce Attack
2020-05-04 05:18:35
206.189.92.162 attackspambots
May  3 23:39:19 home sshd[26486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.92.162
May  3 23:39:21 home sshd[26486]: Failed password for invalid user sauve from 206.189.92.162 port 52664 ssh2
May  3 23:43:20 home sshd[27248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.92.162
...
2020-05-04 05:48:28
153.37.192.4 attackbots
May  3 22:25:19 mail sshd[10739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.37.192.4  user=root
May  3 22:25:21 mail sshd[10739]: Failed password for root from 153.37.192.4 port 35646 ssh2
May  3 22:39:45 mail sshd[12682]: Invalid user sean from 153.37.192.4
May  3 22:39:45 mail sshd[12682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.37.192.4
May  3 22:39:45 mail sshd[12682]: Invalid user sean from 153.37.192.4
May  3 22:39:47 mail sshd[12682]: Failed password for invalid user sean from 153.37.192.4 port 38348 ssh2
...
2020-05-04 05:27:06
37.213.49.192 attackspam
May  3 22:35:16 xeon postfix/smtpd[30600]: warning: mm-192-49-213-37.grodno.dynamic.pppoe.byfly.by[37.213.49.192]: SASL PLAIN authentication failed: authentication failure
2020-05-04 05:17:28
200.24.78.24 attackbots
May  3 23:11:07 [host] sshd[26821]: pam_unix(sshd:
May  3 23:11:09 [host] sshd[26821]: Failed passwor
May  3 23:16:31 [host] sshd[27048]: Invalid user i
2020-05-04 05:49:46
51.15.85.14 attackbotsspam
2020/05/03 20:39:28 [info] 4089#0: *7523 client sent invalid request while reading client request line, client: 51.15.85.14, server: mail.hermescis.com, request: "GET login.cgi HTTP/1.1"
2020-05-04 05:37:14
182.61.3.223 attackspambots
Brute-force attempt banned
2020-05-04 05:50:00
157.230.153.75 attackspambots
May  3 21:41:58 scw-6657dc sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.153.75
May  3 21:41:58 scw-6657dc sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.153.75
May  3 21:41:59 scw-6657dc sshd[23236]: Failed password for invalid user flor from 157.230.153.75 port 38978 ssh2
...
2020-05-04 05:47:32
64.227.21.199 attackspambots
firewall-block, port(s): 12177/tcp
2020-05-04 05:16:58
140.143.211.45 attack
2020-05-03T15:41:33.777128linuxbox-skyline sshd[149117]: Invalid user seitz from 140.143.211.45 port 33190
...
2020-05-04 05:48:49
222.186.173.215 attack
May  3 23:29:17 legacy sshd[8501]: Failed password for root from 222.186.173.215 port 30270 ssh2
May  3 23:29:30 legacy sshd[8501]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 30270 ssh2 [preauth]
May  3 23:29:36 legacy sshd[8504]: Failed password for root from 222.186.173.215 port 11744 ssh2
...
2020-05-04 05:33:44
148.70.125.42 attackbotsspam
2020-05-03T14:39:41.415197linuxbox-skyline sshd[147811]: Invalid user unt from 148.70.125.42 port 60258
...
2020-05-04 05:31:13
159.203.27.146 attack
2020-05-03T20:30:50.433108abusebot-4.cloudsearch.cf sshd[29723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.27.146  user=root
2020-05-03T20:30:52.530438abusebot-4.cloudsearch.cf sshd[29723]: Failed password for root from 159.203.27.146 port 56256 ssh2
2020-05-03T20:37:09.891823abusebot-4.cloudsearch.cf sshd[30140]: Invalid user kai from 159.203.27.146 port 32772
2020-05-03T20:37:09.898567abusebot-4.cloudsearch.cf sshd[30140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.27.146
2020-05-03T20:37:09.891823abusebot-4.cloudsearch.cf sshd[30140]: Invalid user kai from 159.203.27.146 port 32772
2020-05-03T20:37:11.694282abusebot-4.cloudsearch.cf sshd[30140]: Failed password for invalid user kai from 159.203.27.146 port 32772 ssh2
2020-05-03T20:39:14.272406abusebot-4.cloudsearch.cf sshd[30262]: Invalid user janna from 159.203.27.146 port 40832
...
2020-05-04 05:53:50

最近上报的IP列表

23.252.121.98 51.129.249.186 239.229.54.13 198.105.225.111
202.161.160.81 178.126.158.152 125.133.100.44 226.121.146.241
43.197.145.149 225.188.123.150 41.135.130.223 246.129.199.140
61.35.34.227 25.84.97.242 166.242.252.178 225.131.23.255
98.151.123.149 72.161.15.163 122.7.195.190 217.130.81.98