必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.199.32.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.199.32.48.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:00:06 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 48.32.199.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.32.199.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
133.130.121.206 attackbotsspam
Aug 25 18:18:43 hanapaa sshd\[23784\]: Invalid user four from 133.130.121.206
Aug 25 18:18:43 hanapaa sshd\[23784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-121-206.a04c.g.tyo1.static.cnode.io
Aug 25 18:18:44 hanapaa sshd\[23784\]: Failed password for invalid user four from 133.130.121.206 port 42270 ssh2
Aug 25 18:23:24 hanapaa sshd\[24141\]: Invalid user lang from 133.130.121.206
Aug 25 18:23:24 hanapaa sshd\[24141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-121-206.a04c.g.tyo1.static.cnode.io
2019-08-26 12:35:15
61.163.190.49 attack
Aug 25 18:18:54 lcdev sshd\[8957\]: Invalid user mktg1 from 61.163.190.49
Aug 25 18:18:54 lcdev sshd\[8957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.163.190.49
Aug 25 18:18:56 lcdev sshd\[8957\]: Failed password for invalid user mktg1 from 61.163.190.49 port 58328 ssh2
Aug 25 18:23:50 lcdev sshd\[9366\]: Invalid user diogo from 61.163.190.49
Aug 25 18:23:50 lcdev sshd\[9366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.163.190.49
2019-08-26 12:24:33
187.86.200.34 attackspam
Honeypot attack, port: 445, PTR: 187-86-200-34.navegamais.com.br.
2019-08-26 12:31:36
67.55.92.88 attackbots
Aug 26 03:28:41 marvibiene sshd[45481]: Invalid user lian from 67.55.92.88 port 44976
Aug 26 03:28:41 marvibiene sshd[45481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.88
Aug 26 03:28:41 marvibiene sshd[45481]: Invalid user lian from 67.55.92.88 port 44976
Aug 26 03:28:43 marvibiene sshd[45481]: Failed password for invalid user lian from 67.55.92.88 port 44976 ssh2
...
2019-08-26 12:31:18
142.44.160.173 attackbots
Aug 25 18:45:56 php2 sshd\[31505\]: Invalid user zzz from 142.44.160.173
Aug 25 18:45:56 php2 sshd\[31505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-142-44-160.net
Aug 25 18:45:58 php2 sshd\[31505\]: Failed password for invalid user zzz from 142.44.160.173 port 44172 ssh2
Aug 25 18:50:10 php2 sshd\[31905\]: Invalid user stanley from 142.44.160.173
Aug 25 18:50:10 php2 sshd\[31905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-142-44-160.net
2019-08-26 12:54:33
187.111.23.14 attackspam
Aug 26 05:29:01 DAAP sshd[21477]: Invalid user ami from 187.111.23.14 port 58658
Aug 26 05:29:01 DAAP sshd[21477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.23.14
Aug 26 05:29:01 DAAP sshd[21477]: Invalid user ami from 187.111.23.14 port 58658
Aug 26 05:29:03 DAAP sshd[21477]: Failed password for invalid user ami from 187.111.23.14 port 58658 ssh2
...
2019-08-26 12:14:54
207.46.13.177 attackspambots
Automatic report - Banned IP Access
2019-08-26 12:10:17
106.248.249.26 attack
Aug 26 06:31:54 s64-1 sshd[10856]: Failed password for backup from 106.248.249.26 port 44770 ssh2
Aug 26 06:37:58 s64-1 sshd[10885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.249.26
Aug 26 06:38:00 s64-1 sshd[10885]: Failed password for invalid user postgresql from 106.248.249.26 port 37084 ssh2
...
2019-08-26 12:41:59
182.61.11.3 attack
Invalid user wordpress from 182.61.11.3 port 33714
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.11.3
Failed password for invalid user wordpress from 182.61.11.3 port 33714 ssh2
Invalid user nd from 182.61.11.3 port 48736
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.11.3
2019-08-26 12:31:57
212.154.86.139 attackspambots
Aug 26 04:38:16 hb sshd\[21127\]: Invalid user webuser from 212.154.86.139
Aug 26 04:38:16 hb sshd\[21127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.154.86.139
Aug 26 04:38:18 hb sshd\[21127\]: Failed password for invalid user webuser from 212.154.86.139 port 44510 ssh2
Aug 26 04:42:57 hb sshd\[21541\]: Invalid user installer from 212.154.86.139
Aug 26 04:42:57 hb sshd\[21541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.154.86.139
2019-08-26 12:47:09
180.163.220.97 attackspam
Automatic report - Banned IP Access
2019-08-26 12:11:17
213.139.144.10 attackspam
Aug 26 07:29:56 srv-4 sshd\[31444\]: Invalid user ams from 213.139.144.10
Aug 26 07:29:56 srv-4 sshd\[31444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
Aug 26 07:29:59 srv-4 sshd\[31444\]: Failed password for invalid user ams from 213.139.144.10 port 62250 ssh2
...
2019-08-26 12:45:12
45.249.111.40 attackspam
Aug 26 05:54:05 dedicated sshd[16607]: Invalid user dms from 45.249.111.40 port 50696
2019-08-26 12:10:42
222.186.52.89 attack
Aug 26 06:01:05 ovpn sshd\[13230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
Aug 26 06:01:07 ovpn sshd\[13230\]: Failed password for root from 222.186.52.89 port 21722 ssh2
Aug 26 06:01:13 ovpn sshd\[13251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
Aug 26 06:01:15 ovpn sshd\[13251\]: Failed password for root from 222.186.52.89 port 64744 ssh2
Aug 26 06:01:22 ovpn sshd\[13289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
2019-08-26 12:37:37
110.164.67.47 attackspam
Aug 26 03:20:41 ip-172-31-62-245 sshd\[26092\]: Invalid user faye from 110.164.67.47\
Aug 26 03:20:43 ip-172-31-62-245 sshd\[26092\]: Failed password for invalid user faye from 110.164.67.47 port 49047 ssh2\
Aug 26 03:24:48 ip-172-31-62-245 sshd\[26111\]: Invalid user sysadmin from 110.164.67.47\
Aug 26 03:24:51 ip-172-31-62-245 sshd\[26111\]: Failed password for invalid user sysadmin from 110.164.67.47 port 42091 ssh2\
Aug 26 03:28:51 ip-172-31-62-245 sshd\[26118\]: Invalid user support from 110.164.67.47\
2019-08-26 12:23:41

最近上报的IP列表

175.40.199.252 156.201.79.104 1.208.69.226 217.167.128.71
10.143.51.99 170.157.188.225 166.106.147.113 12.187.206.110
146.107.98.247 126.130.144.60 144.203.57.97 145.64.137.235
138.138.251.42 197.231.75.75 121.97.228.147 112.183.160.207
113.123.35.201 137.70.69.192 105.9.115.148 170.65.128.164