必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.19.12.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.19.12.198.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 16:03:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 198.12.19.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.12.19.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.243.128.8 attack
SSH Invalid Login
2020-03-10 09:23:33
111.229.144.67 attackspambots
Feb 17 10:08:25 woltan sshd[3835]: Failed password for invalid user leslie from 111.229.144.67 port 52096 ssh2
2020-03-10 09:17:46
211.104.171.239 attack
2020-03-10T04:47:16.151923vps773228.ovh.net sshd[2507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239  user=root
2020-03-10T04:47:18.296245vps773228.ovh.net sshd[2507]: Failed password for root from 211.104.171.239 port 47060 ssh2
2020-03-10T04:51:15.957086vps773228.ovh.net sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239  user=root
2020-03-10T04:51:17.910921vps773228.ovh.net sshd[2539]: Failed password for root from 211.104.171.239 port 57455 ssh2
2020-03-10T04:55:12.787925vps773228.ovh.net sshd[2582]: Invalid user tomcat from 211.104.171.239 port 39615
2020-03-10T04:55:12.808420vps773228.ovh.net sshd[2582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239
2020-03-10T04:55:12.787925vps773228.ovh.net sshd[2582]: Invalid user tomcat from 211.104.171.239 port 39615
2020-03-10T04:55:15.298726vps773228.ovh.net ss
...
2020-03-10 12:01:33
111.229.119.3 attack
Jan 31 10:29:39 woltan sshd[17338]: Failed password for invalid user shoeb from 111.229.119.3 port 44366 ssh2
2020-03-10 09:22:43
125.215.207.40 attackspam
SSH Invalid Login
2020-03-10 09:15:08
206.189.193.135 attackspam
Mar 10 04:51:56 lnxded64 sshd[6530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.193.135
Mar 10 04:51:59 lnxded64 sshd[6530]: Failed password for invalid user opton from 206.189.193.135 port 50436 ssh2
Mar 10 04:56:26 lnxded64 sshd[7417]: Failed password for root from 206.189.193.135 port 53168 ssh2
2020-03-10 12:07:44
193.176.181.214 attack
Mar 10 00:50:00 sso sshd[20675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.176.181.214
Mar 10 00:50:02 sso sshd[20675]: Failed password for invalid user william from 193.176.181.214 port 48082 ssh2
...
2020-03-10 09:21:06
46.101.73.64 attackbots
2020-03-10T04:49:27.802356vps751288.ovh.net sshd\[6147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64  user=root
2020-03-10T04:49:29.931295vps751288.ovh.net sshd\[6147\]: Failed password for root from 46.101.73.64 port 60264 ssh2
2020-03-10T04:56:24.526008vps751288.ovh.net sshd\[6188\]: Invalid user 123456 from 46.101.73.64 port 41908
2020-03-10T04:56:24.536480vps751288.ovh.net sshd\[6188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64
2020-03-10T04:56:26.575396vps751288.ovh.net sshd\[6188\]: Failed password for invalid user 123456 from 46.101.73.64 port 41908 ssh2
2020-03-10 12:08:45
197.242.200.242 attack
Aug 11 03:39:47 ms-srv sshd[15868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.242.200.242
Aug 11 03:39:49 ms-srv sshd[15868]: Failed password for invalid user ftpuser from 197.242.200.242 port 50472 ssh2
2020-03-10 08:59:47
206.189.91.97 attackbots
2020-03-10T04:06:49.210684shield sshd\[21571\]: Invalid user ts3server from 206.189.91.97 port 38532
2020-03-10T04:06:49.217807shield sshd\[21571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97
2020-03-10T04:06:51.392153shield sshd\[21571\]: Failed password for invalid user ts3server from 206.189.91.97 port 38532 ssh2
2020-03-10T04:08:35.641550shield sshd\[21892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97  user=root
2020-03-10T04:08:38.036352shield sshd\[21892\]: Failed password for root from 206.189.91.97 port 34330 ssh2
2020-03-10 12:10:24
222.186.175.216 attack
2020-03-09T23:56:03.218912xentho-1 sshd[310781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2020-03-09T23:56:05.378907xentho-1 sshd[310781]: Failed password for root from 222.186.175.216 port 53544 ssh2
2020-03-09T23:56:03.218912xentho-1 sshd[310781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2020-03-09T23:56:05.378907xentho-1 sshd[310781]: Failed password for root from 222.186.175.216 port 53544 ssh2
2020-03-09T23:56:09.359827xentho-1 sshd[310781]: Failed password for root from 222.186.175.216 port 53544 ssh2
2020-03-09T23:56:21.393359xentho-1 sshd[310786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2020-03-09T23:56:23.689670xentho-1 sshd[310786]: Failed password for root from 222.186.175.216 port 50184 ssh2
2020-03-09T23:56:21.393359xentho-1 sshd[310786]: pam_unix(sshd:a
...
2020-03-10 12:06:52
198.54.126.140 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-03-10 12:11:12
103.83.130.196 attack
Subject: YOUR FUND IS OVER DUE
2020-03-10 09:09:21
95.49.81.128 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/95.49.81.128/ 
 
 PL - 1H : (38)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 95.49.81.128 
 
 CIDR : 95.48.0.0/14 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 9 
 24H - 15 
 
 DateTime : 2020-03-10 04:56:37 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-10 12:03:13
185.176.27.38 attack
Mar 10 04:56:29 debian-2gb-nbg1-2 kernel: \[6071738.547120\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.38 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=4992 PROTO=TCP SPT=58555 DPT=34792 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-10 12:05:44

最近上报的IP列表

125.7.152.111 71.204.90.230 69.23.99.76 3.186.105.93
54.79.12.153 144.134.155.38 205.186.109.99 194.105.236.64
83.40.219.253 162.37.33.222 24.89.65.161 98.51.231.94
168.119.170.194 203.216.62.53 88.159.141.84 148.66.220.230
77.228.65.32 173.222.83.252 30.99.55.101 40.87.37.120