必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.205.40.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.205.40.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:04:31 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 105.40.205.134.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 134.205.40.105.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.88.192.97 attackbots
Icarus honeypot on github
2020-09-07 14:43:34
118.71.164.229 attack
Icarus honeypot on github
2020-09-07 14:05:51
98.143.148.45 attackspambots
$f2bV_matches
2020-09-07 14:28:18
222.186.180.41 attack
Sep  7 02:29:15 ny01 sshd[21482]: Failed password for root from 222.186.180.41 port 12984 ssh2
Sep  7 02:29:29 ny01 sshd[21482]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 12984 ssh2 [preauth]
Sep  7 02:29:41 ny01 sshd[21526]: Failed password for root from 222.186.180.41 port 43368 ssh2
2020-09-07 14:33:16
95.156.102.158 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 14:25:13
5.102.4.181 attackspam
Port Scan: TCP/443
2020-09-07 14:35:06
58.215.57.240 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 14:39:26
218.2.197.240 attackbots
Sep  7 07:30:08 root sshd[11341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.197.240 
...
2020-09-07 14:14:00
123.206.190.82 attackspambots
(sshd) Failed SSH login from 123.206.190.82 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  6 12:19:48 server sshd[517]: Invalid user nemesis from 123.206.190.82 port 55540
Sep  6 12:19:50 server sshd[517]: Failed password for invalid user nemesis from 123.206.190.82 port 55540 ssh2
Sep  6 12:47:12 server sshd[8290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82  user=root
Sep  6 12:47:14 server sshd[8290]: Failed password for root from 123.206.190.82 port 53902 ssh2
Sep  6 12:52:02 server sshd[9572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82  user=root
2020-09-07 14:39:56
175.192.183.81 attackspambots
Automatic report - Banned IP Access
2020-09-07 14:14:47
69.50.220.176 attackspambots
Sep  6 16:48:46 plex-server sshd[2275551]: Failed password for invalid user diradmin from 69.50.220.176 port 52334 ssh2
Sep  6 16:52:33 plex-server sshd[2277127]: Invalid user configure from 69.50.220.176 port 58700
Sep  6 16:52:33 plex-server sshd[2277127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.50.220.176 
Sep  6 16:52:33 plex-server sshd[2277127]: Invalid user configure from 69.50.220.176 port 58700
Sep  6 16:52:34 plex-server sshd[2277127]: Failed password for invalid user configure from 69.50.220.176 port 58700 ssh2
...
2020-09-07 14:19:58
40.124.48.111 attackbots
C1,WP GET //wp-includes/wlwmanifest.xml
2020-09-07 14:21:55
132.232.11.218 attackbots
Sep 07 00:52:55 askasleikir sshd[71253]: Failed password for root from 132.232.11.218 port 59128 ssh2
2020-09-07 14:37:43
180.190.238.157 attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-09-07 14:45:59
190.27.104.203 attack
Unauthorized connection attempt from IP address 190.27.104.203 on Port 445(SMB)
2020-09-07 14:20:18

最近上报的IP列表

252.58.63.13 86.99.146.219 206.58.162.153 242.127.21.255
187.49.162.116 71.244.32.140 137.119.91.13 219.108.123.84
215.7.156.152 191.114.114.23 29.23.243.238 36.0.8.63
115.156.157.197 230.191.179.178 56.45.149.163 69.14.86.111
33.147.238.43 74.168.239.110 166.177.3.133 147.185.239.35