必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.133.29.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.133.29.27.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:58:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'27.29.133.134.in-addr.arpa has no PTR record
'
NSLOOKUP信息:
b'
Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.178.27.237 attackspam
May 21 05:50:40 ns382633 sshd\[31610\]: Invalid user yzd from 51.178.27.237 port 39262
May 21 05:50:40 ns382633 sshd\[31610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.237
May 21 05:50:42 ns382633 sshd\[31610\]: Failed password for invalid user yzd from 51.178.27.237 port 39262 ssh2
May 21 05:59:39 ns382633 sshd\[436\]: Invalid user xwy from 51.178.27.237 port 57106
May 21 05:59:39 ns382633 sshd\[436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.237
2020-05-21 12:11:14
51.38.126.92 attackbots
2020-05-21T12:56:03.745481vivaldi2.tree2.info sshd[16899]: Invalid user jpj from 51.38.126.92
2020-05-21T12:56:03.761660vivaldi2.tree2.info sshd[16899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.ip-51-38-126.eu
2020-05-21T12:56:03.745481vivaldi2.tree2.info sshd[16899]: Invalid user jpj from 51.38.126.92
2020-05-21T12:56:05.415247vivaldi2.tree2.info sshd[16899]: Failed password for invalid user jpj from 51.38.126.92 port 51260 ssh2
2020-05-21T12:59:42.981437vivaldi2.tree2.info sshd[17090]: Invalid user adl from 51.38.126.92
...
2020-05-21 12:09:13
183.88.234.246 attackspam
Dovecot Invalid User Login Attempt.
2020-05-21 08:23:57
183.195.62.123 attackbots
May 21 05:59:37 andromeda sshd\[553\]: Invalid user 888888 from 183.195.62.123 port 19513
May 21 05:59:37 andromeda sshd\[553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.195.62.123
May 21 05:59:39 andromeda sshd\[553\]: Failed password for invalid user 888888 from 183.195.62.123 port 19513 ssh2
2020-05-21 12:10:23
101.207.113.73 attack
(sshd) Failed SSH login from 101.207.113.73 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 21 00:00:34 andromeda sshd[1009]: Invalid user uad from 101.207.113.73 port 45004
May 21 00:00:37 andromeda sshd[1009]: Failed password for invalid user uad from 101.207.113.73 port 45004 ssh2
May 21 00:03:42 andromeda sshd[1148]: Invalid user ipg from 101.207.113.73 port 53608
2020-05-21 08:28:01
14.29.148.204 attack
May 21 05:59:52 plex sshd[25346]: Invalid user euu from 14.29.148.204 port 50594
2020-05-21 12:01:09
134.122.120.74 attackspambots
134.122.120.74 - - [21/May/2020:06:00:10 +0200] "GET /wp-login.php HTTP/1.1" 200 6042 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.122.120.74 - - [21/May/2020:06:00:16 +0200] "POST /wp-login.php HTTP/1.1" 200 6293 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.122.120.74 - - [21/May/2020:06:00:18 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-21 12:20:50
114.80.94.228 attackspambots
May 21 05:51:52 Ubuntu-1404-trusty-64-minimal sshd\[994\]: Invalid user cjc from 114.80.94.228
May 21 05:51:52 Ubuntu-1404-trusty-64-minimal sshd\[994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.80.94.228
May 21 05:51:54 Ubuntu-1404-trusty-64-minimal sshd\[994\]: Failed password for invalid user cjc from 114.80.94.228 port 10523 ssh2
May 21 06:12:54 Ubuntu-1404-trusty-64-minimal sshd\[15595\]: Invalid user wqz from 114.80.94.228
May 21 06:12:54 Ubuntu-1404-trusty-64-minimal sshd\[15595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.80.94.228
2020-05-21 12:18:40
118.71.75.141 attackspambots
" "
2020-05-21 12:07:44
138.68.75.113 attackbots
May 21 06:08:19 meumeu sshd[69450]: Invalid user xcl from 138.68.75.113 port 56832
May 21 06:08:19 meumeu sshd[69450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.75.113 
May 21 06:08:19 meumeu sshd[69450]: Invalid user xcl from 138.68.75.113 port 56832
May 21 06:08:21 meumeu sshd[69450]: Failed password for invalid user xcl from 138.68.75.113 port 56832 ssh2
May 21 06:11:24 meumeu sshd[69839]: Invalid user jinwen from 138.68.75.113 port 46000
May 21 06:11:24 meumeu sshd[69839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.75.113 
May 21 06:11:24 meumeu sshd[69839]: Invalid user jinwen from 138.68.75.113 port 46000
May 21 06:11:26 meumeu sshd[69839]: Failed password for invalid user jinwen from 138.68.75.113 port 46000 ssh2
May 21 06:14:37 meumeu sshd[70251]: Invalid user llo from 138.68.75.113 port 35170
...
2020-05-21 12:20:12
178.142.126.34 attackspambots
May 21 01:44:34 pl3server sshd[27297]: Invalid user pi from 178.142.126.34 port 57838
May 21 01:44:34 pl3server sshd[27298]: Invalid user pi from 178.142.126.34 port 57840
May 21 01:44:34 pl3server sshd[27297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.126.34
May 21 01:44:34 pl3server sshd[27298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.126.34
May 21 01:44:36 pl3server sshd[27297]: Failed password for invalid user pi from 178.142.126.34 port 57838 ssh2
May 21 01:44:37 pl3server sshd[27298]: Failed password for invalid user pi from 178.142.126.34 port 57840 ssh2
May 21 01:44:37 pl3server sshd[27297]: Connection closed by 178.142.126.34 port 57838 [preauth]
May 21 01:44:37 pl3server sshd[27298]: Connection closed by 178.142.126.34 port 57840 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.142.126.34
2020-05-21 08:20:25
101.231.146.34 attack
May 21 10:59:28 webhost01 sshd[29044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.34
May 21 10:59:30 webhost01 sshd[29044]: Failed password for invalid user zhangkai from 101.231.146.34 port 56317 ssh2
...
2020-05-21 12:15:30
111.10.43.244 attack
May 21 05:51:04 vps sshd[560549]: Failed password for invalid user xpl from 111.10.43.244 port 54161 ssh2
May 21 05:55:06 vps sshd[577529]: Invalid user haoliyang from 111.10.43.244 port 48479
May 21 05:55:06 vps sshd[577529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.10.43.244
May 21 05:55:08 vps sshd[577529]: Failed password for invalid user haoliyang from 111.10.43.244 port 48479 ssh2
May 21 05:59:26 vps sshd[597006]: Invalid user jeg from 111.10.43.244 port 42795
...
2020-05-21 12:18:56
182.253.68.122 attackspambots
May 21 03:56:02 ip-172-31-61-156 sshd[16492]: Failed password for invalid user cabel from 182.253.68.122 port 57976 ssh2
May 21 03:55:59 ip-172-31-61-156 sshd[16492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122
May 21 03:55:59 ip-172-31-61-156 sshd[16492]: Invalid user cabel from 182.253.68.122
May 21 03:56:02 ip-172-31-61-156 sshd[16492]: Failed password for invalid user cabel from 182.253.68.122 port 57976 ssh2
May 21 03:59:50 ip-172-31-61-156 sshd[16719]: Invalid user xbp from 182.253.68.122
...
2020-05-21 12:02:40
46.101.40.21 attackbotsspam
May 20 23:59:25 lanister sshd[2390]: Invalid user ggf from 46.101.40.21
May 20 23:59:25 lanister sshd[2390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21
May 20 23:59:25 lanister sshd[2390]: Invalid user ggf from 46.101.40.21
May 20 23:59:26 lanister sshd[2390]: Failed password for invalid user ggf from 46.101.40.21 port 51778 ssh2
2020-05-21 12:19:42

最近上报的IP列表

113.61.229.179 204.187.191.233 25.240.173.236 221.8.237.20
138.8.56.64 106.200.21.177 218.213.126.19 72.50.204.189
40.3.202.121 173.110.155.54 212.229.139.104 172.246.72.183
104.209.185.229 82.66.153.126 166.199.163.215 249.15.167.170
15.246.162.25 50.37.178.114 167.26.60.240 133.74.230.235