必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.203.242.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.203.242.220.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:05:38 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 220.242.203.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.242.203.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.231.41.90 attack
Brute force attempt
2020-04-18 15:30:04
80.98.249.181 attackspam
k+ssh-bruteforce
2020-04-18 15:01:39
185.36.72.157 attackspambots
port
2020-04-18 15:32:28
190.85.54.158 attackspam
$f2bV_matches
2020-04-18 15:02:00
118.27.13.124 attack
$f2bV_matches
2020-04-18 15:05:48
27.1.253.142 attackbotsspam
$f2bV_matches
2020-04-18 15:31:29
192.99.15.15 attack
Automatic report - WordPress Brute Force
2020-04-18 15:14:02
3.21.143.45 attackspam
Apr 17 19:28:03 tdfoods sshd\[21980\]: Invalid user ii from 3.21.143.45
Apr 17 19:28:03 tdfoods sshd\[21980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-21-143-45.us-east-2.compute.amazonaws.com
Apr 17 19:28:05 tdfoods sshd\[21980\]: Failed password for invalid user ii from 3.21.143.45 port 40474 ssh2
Apr 17 19:34:52 tdfoods sshd\[22376\]: Invalid user nn from 3.21.143.45
Apr 17 19:34:52 tdfoods sshd\[22376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-21-143-45.us-east-2.compute.amazonaws.com
2020-04-18 15:00:50
14.29.214.207 attackspam
Invalid user postgres from 14.29.214.207 port 55515
2020-04-18 15:18:05
171.231.244.12 spamattack
Mail hack
2020-04-18 15:02:16
177.155.36.84 attackbotsspam
Automatic report - Port Scan Attack
2020-04-18 14:57:03
77.232.100.160 attack
Invalid user postgres from 77.232.100.160 port 45500
2020-04-18 15:30:21
134.122.76.222 attackbots
$f2bV_matches
2020-04-18 14:58:53
181.118.94.57 attackspambots
Invalid user cy from 181.118.94.57 port 44484
2020-04-18 15:29:02
142.44.240.12 attack
Apr 17 19:25:37 hpm sshd\[17424\]: Invalid user test from 142.44.240.12
Apr 17 19:25:37 hpm sshd\[17424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=irc.zonenet.org
Apr 17 19:25:40 hpm sshd\[17424\]: Failed password for invalid user test from 142.44.240.12 port 60162 ssh2
Apr 17 19:28:18 hpm sshd\[17610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=irc.zonenet.org  user=root
Apr 17 19:28:19 hpm sshd\[17610\]: Failed password for root from 142.44.240.12 port 35900 ssh2
2020-04-18 15:12:22

最近上报的IP列表

237.114.199.198 195.246.135.226 239.122.231.3 169.246.48.90
30.218.36.80 45.139.114.161 114.90.142.83 202.26.24.73
96.30.190.94 59.253.129.62 71.137.215.3 104.24.213.74
208.120.63.248 40.67.12.12 197.20.97.24 181.46.132.4
184.179.72.247 252.230.82.234 28.142.237.34 24.106.187.108