必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shoufeng

省份(region): Hualien

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.208.24.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.208.24.72.			IN	A

;; AUTHORITY SECTION:
.			143	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062802 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 29 09:05:25 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
72.24.208.134.in-addr.arpa domain name pointer 134-208-24-72.ndhu.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.24.208.134.in-addr.arpa	name = 134-208-24-72.ndhu.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.206.128.2 attackbots
20/9/12@11:01:50: FAIL: Alarm-Intrusion address from=104.206.128.2
...
2020-09-12 23:37:38
115.97.164.46 attack
port scan and connect, tcp 80 (http)
2020-09-13 00:20:01
177.58.235.11 attack
2020-09-11T18:53:53.912988amanda2.illicoweb.com sshd\[8652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-58-235-11.3g.claro.net.br  user=root
2020-09-11T18:53:55.528087amanda2.illicoweb.com sshd\[8652\]: Failed password for root from 177.58.235.11 port 1128 ssh2
2020-09-11T18:53:57.697157amanda2.illicoweb.com sshd\[8654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-58-235-11.3g.claro.net.br  user=root
2020-09-11T18:53:59.528077amanda2.illicoweb.com sshd\[8654\]: Failed password for root from 177.58.235.11 port 1129 ssh2
2020-09-11T18:54:01.452685amanda2.illicoweb.com sshd\[8656\]: Invalid user ubnt from 177.58.235.11 port 1130
...
2020-09-12 23:51:57
128.199.54.199 attackspam
Port 22 Scan, PTR: None
2020-09-13 00:00:05
95.9.142.34 attackbots
Automatic report - Banned IP Access
2020-09-13 00:17:23
157.230.109.166 attackspam
Sep 12 12:24:37 ip-172-31-42-142 sshd\[7925\]: Failed password for root from 157.230.109.166 port 56538 ssh2\
Sep 12 12:28:02 ip-172-31-42-142 sshd\[7953\]: Invalid user cyber from 157.230.109.166\
Sep 12 12:28:04 ip-172-31-42-142 sshd\[7953\]: Failed password for invalid user cyber from 157.230.109.166 port 60450 ssh2\
Sep 12 12:31:35 ip-172-31-42-142 sshd\[7989\]: Invalid user msagent from 157.230.109.166\
Sep 12 12:31:37 ip-172-31-42-142 sshd\[7989\]: Failed password for invalid user msagent from 157.230.109.166 port 36136 ssh2\
2020-09-13 00:21:11
222.186.173.183 attack
Sep 12 12:06:07 plusreed sshd[6627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Sep 12 12:06:09 plusreed sshd[6627]: Failed password for root from 222.186.173.183 port 44746 ssh2
...
2020-09-13 00:16:07
152.136.196.155 attack
Sep 12 04:00:29 ws24vmsma01 sshd[7379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.196.155
Sep 12 04:00:30 ws24vmsma01 sshd[7379]: Failed password for invalid user admin from 152.136.196.155 port 54824 ssh2
...
2020-09-12 23:52:24
111.72.193.11 attackspambots
Sep 11 20:08:58 srv01 postfix/smtpd\[13472\]: warning: unknown\[111.72.193.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 11 20:12:27 srv01 postfix/smtpd\[18613\]: warning: unknown\[111.72.193.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 11 20:15:56 srv01 postfix/smtpd\[16922\]: warning: unknown\[111.72.193.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 11 20:16:08 srv01 postfix/smtpd\[16922\]: warning: unknown\[111.72.193.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 11 20:16:24 srv01 postfix/smtpd\[16922\]: warning: unknown\[111.72.193.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-12 23:40:02
5.188.84.119 attackbotsspam
0,19-01/03 [bc01/m11] PostRequest-Spammer scoring: zurich
2020-09-13 00:14:04
106.13.226.152 attackspambots
 TCP (SYN) 106.13.226.152:48657 -> port 7326, len 44
2020-09-12 23:49:16
142.93.101.148 attack
detected by Fail2Ban
2020-09-12 23:39:39
92.222.90.130 attackbots
Sep 12 15:33:26 instance-2 sshd[14454]: Failed password for sshd from 92.222.90.130 port 56118 ssh2
Sep 12 15:37:58 instance-2 sshd[14507]: Failed password for root from 92.222.90.130 port 40956 ssh2
2020-09-12 23:59:08
218.92.0.246 attackspam
Triggered by Fail2Ban at Ares web server
2020-09-13 00:07:12
115.42.127.133 attack
Sep 12 16:14:49 eventyay sshd[1942]: Failed password for root from 115.42.127.133 port 49931 ssh2
Sep 12 16:20:42 eventyay sshd[2054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.42.127.133
Sep 12 16:20:44 eventyay sshd[2054]: Failed password for invalid user oraprod from 115.42.127.133 port 56247 ssh2
...
2020-09-13 00:15:11

最近上报的IP列表

61.56.14.16 132.199.102.93 140.113.189.188 54.186.107.166
140.125.43.60 140.116.33.213 140.116.133.49 163.22.16.31
120.119.77.70 140.116.110.166 140.116.155.239 140.117.59.133
129.132.60.89 172.203.0.159 140.116.93.118 164.8.250.99
205.251.196.95 140.116.156.8 103.72.192.149 140.116.179.92