必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspam
Jul 13 00:35:28 *** sshd[19577]: Invalid user facturacion from 134.209.108.5
2019-07-13 10:24:54
attackbots
Jul  7 07:22:29 *** sshd[19200]: Invalid user john from 134.209.108.5
2019-07-07 16:13:32
attack
Jul  7 01:48:12 Ubuntu-1404-trusty-64-minimal sshd\[4345\]: Invalid user cristina from 134.209.108.5
Jul  7 01:48:12 Ubuntu-1404-trusty-64-minimal sshd\[4345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.5
Jul  7 01:48:14 Ubuntu-1404-trusty-64-minimal sshd\[4345\]: Failed password for invalid user cristina from 134.209.108.5 port 36590 ssh2
Jul  7 01:53:10 Ubuntu-1404-trusty-64-minimal sshd\[8633\]: Invalid user tg from 134.209.108.5
Jul  7 01:53:10 Ubuntu-1404-trusty-64-minimal sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.5
2019-07-07 09:38:33
相同子网IP讨论:
IP 类型 评论内容 时间
134.209.108.33 attackbotsspam
Aug 29 05:29:52 cho postfix/smtpd[1841803]: warning: blogkubet.com[134.209.108.33]: SASL PLAIN authentication failed: 
Aug 29 05:29:59 cho postfix/smtpd[1841805]: warning: blogkubet.com[134.209.108.33]: SASL PLAIN authentication failed: 
Aug 29 05:30:17 cho postfix/smtpd[1841803]: warning: blogkubet.com[134.209.108.33]: SASL PLAIN authentication failed: 
Aug 29 05:30:20 cho postfix/smtpd[1841805]: warning: blogkubet.com[134.209.108.33]: SASL PLAIN authentication failed: 
Aug 29 05:33:57 cho postfix/smtpd[1841803]: warning: blogkubet.com[134.209.108.33]: SASL PLAIN authentication failed: 
...
2020-08-29 20:09:07
134.209.108.97 attackbotsspam
Invalid user admin from 134.209.108.97 port 55740
2020-01-10 23:08:55
134.209.108.243 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 540f625fdd01dddf | WAF_Rule_ID: 1aff1cdfeb5c4074965d7cd85bfc1d4e | WAF_Kind: firewall | CF_Action: challenge | Country: SG | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.2;. en-US) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.108 Safari/537.36 Quark/3.6.2.122 | CF_DC: SIN. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:00:46
134.209.108.30 attack
Nov  3 10:19:29 foo sshd[23529]: Invalid user Oyster from 134.209.108.30
Nov  3 10:19:29 foo sshd[23529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30 
Nov  3 10:19:32 foo sshd[23529]: Failed password for invalid user Oyster from 134.209.108.30 port 50038 ssh2
Nov  3 10:19:32 foo sshd[23529]: Received disconnect from 134.209.108.30: 11: Bye Bye [preauth]
Nov  3 10:33:06 foo sshd[23752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30  user=r.r
Nov  3 10:33:08 foo sshd[23752]: Failed password for r.r from 134.209.108.30 port 51916 ssh2
Nov  3 10:33:09 foo sshd[23752]: Received disconnect from 134.209.108.30: 11: Bye Bye [preauth]
Nov  3 10:37:28 foo sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30  user=r.r
Nov  3 10:37:30 foo sshd[23916]: Failed password for r.r from 134.209.108.30 port 34638 ........
-------------------------------
2019-11-07 16:52:10
134.209.108.30 attackbotsspam
Nov  2 02:49:39 tdfoods sshd\[18369\]: Invalid user grissom from 134.209.108.30
Nov  2 02:49:39 tdfoods sshd\[18369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30
Nov  2 02:49:40 tdfoods sshd\[18369\]: Failed password for invalid user grissom from 134.209.108.30 port 39180 ssh2
Nov  2 02:54:29 tdfoods sshd\[18737\]: Invalid user wg123 from 134.209.108.30
Nov  2 02:54:29 tdfoods sshd\[18737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30
2019-11-02 21:40:09
134.209.108.30 attack
Nov  1 02:27:06 auw2 sshd\[8336\]: Invalid user youmuyou from 134.209.108.30
Nov  1 02:27:06 auw2 sshd\[8336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30
Nov  1 02:27:07 auw2 sshd\[8336\]: Failed password for invalid user youmuyou from 134.209.108.30 port 35024 ssh2
Nov  1 02:31:54 auw2 sshd\[8707\]: Invalid user gamespot from 134.209.108.30
Nov  1 02:31:54 auw2 sshd\[8707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30
2019-11-01 20:48:05
134.209.108.106 attackspam
Oct 12 23:57:55 plusreed sshd[23138]: Invalid user steamuser from 134.209.108.106
...
2019-10-13 12:08:52
134.209.108.106 attackspambots
Oct 12 15:50:42 plusreed sshd[12302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106  user=root
Oct 12 15:50:44 plusreed sshd[12302]: Failed password for root from 134.209.108.106 port 44044 ssh2
...
2019-10-13 03:55:40
134.209.108.106 attackspambots
Oct 12 07:10:02 plusreed sshd[27045]: Invalid user rtkit from 134.209.108.106
...
2019-10-12 19:10:58
134.209.108.106 attack
Oct 11 22:43:12 plusreed sshd[27760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106  user=mail
Oct 11 22:43:14 plusreed sshd[27760]: Failed password for mail from 134.209.108.106 port 58194 ssh2
...
2019-10-12 10:54:02
134.209.108.106 attackbotsspam
Oct  6 12:19:46 plusreed sshd[14357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106  user=root
Oct  6 12:19:48 plusreed sshd[14357]: Failed password for root from 134.209.108.106 port 35170 ssh2
...
2019-10-07 00:23:20
134.209.108.106 attackspam
Oct  6 00:26:42 wbs sshd\[13364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106  user=root
Oct  6 00:26:44 wbs sshd\[13364\]: Failed password for root from 134.209.108.106 port 53672 ssh2
Oct  6 00:27:31 wbs sshd\[13439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106  user=root
Oct  6 00:27:33 wbs sshd\[13439\]: Failed password for root from 134.209.108.106 port 57868 ssh2
Oct  6 00:28:19 wbs sshd\[13517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106  user=root
2019-10-06 18:34:04
134.209.108.106 attack
Oct  5 10:01:33 web9 sshd\[11967\]: Invalid user brandsma from 134.209.108.106
Oct  5 10:01:33 web9 sshd\[11967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106
Oct  5 10:01:34 web9 sshd\[11967\]: Failed password for invalid user brandsma from 134.209.108.106 port 38992 ssh2
Oct  5 10:01:55 web9 sshd\[12040\]: Invalid user gary from 134.209.108.106
Oct  5 10:01:55 web9 sshd\[12040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.106
2019-10-06 04:07:22
134.209.108.106 attackbots
Sep 30 17:59:59 vps691689 sshd[12182]: Failed password for root from 134.209.108.106 port 42760 ssh2
Sep 30 18:01:01 vps691689 sshd[12192]: Failed password for root from 134.209.108.106 port 50996 ssh2
...
2019-10-01 00:10:15
134.209.108.13 attack
Sep 11 10:23:25 hiderm sshd\[5816\]: Invalid user 1234567 from 134.209.108.13
Sep 11 10:23:25 hiderm sshd\[5816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b360mm.com
Sep 11 10:23:27 hiderm sshd\[5816\]: Failed password for invalid user 1234567 from 134.209.108.13 port 53106 ssh2
Sep 11 10:29:28 hiderm sshd\[6352\]: Invalid user sammy123 from 134.209.108.13
Sep 11 10:29:28 hiderm sshd\[6352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b360mm.com
2019-09-12 04:35:13
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.108.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50476
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.209.108.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 09:25:33 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 5.108.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 5.108.209.134.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
154.70.208.66 attackbotsspam
Automatic report BANNED IP
2020-09-05 22:32:26
208.83.85.55 attack
20/9/4@12:51:22: FAIL: IoT-Telnet address from=208.83.85.55
...
2020-09-05 22:16:19
201.43.35.60 attackspambots
Sep  5 12:35:56 dev0-dcde-rnet sshd[17166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.43.35.60
Sep  5 12:35:57 dev0-dcde-rnet sshd[17166]: Failed password for invalid user imr from 201.43.35.60 port 52138 ssh2
Sep  5 12:39:15 dev0-dcde-rnet sshd[17258]: Failed password for root from 201.43.35.60 port 58368 ssh2
2020-09-05 22:16:03
60.2.224.234 attackspam
Sep  5 09:32:14 server sshd[50772]: Failed password for invalid user bh from 60.2.224.234 port 44328 ssh2
Sep  5 09:36:38 server sshd[52845]: Failed password for invalid user download from 60.2.224.234 port 42866 ssh2
Sep  5 09:41:01 server sshd[54959]: Failed password for root from 60.2.224.234 port 41408 ssh2
2020-09-05 22:47:06
51.68.198.113 attackbotsspam
Sep  5 13:48:21 santamaria sshd\[3181\]: Invalid user zihang from 51.68.198.113
Sep  5 13:48:21 santamaria sshd\[3181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113
Sep  5 13:48:23 santamaria sshd\[3181\]: Failed password for invalid user zihang from 51.68.198.113 port 60372 ssh2
...
2020-09-05 22:43:39
170.245.92.22 attackspambots
Honeypot attack, port: 445, PTR: host-22.voob.net.br.92.245.170.in-addr.arpa.
2020-09-05 22:57:10
118.71.90.204 attackspam
Honeypot attack, port: 445, PTR: ip-address-pool-xxx.fpt.vn.
2020-09-05 22:28:15
197.51.193.194 attackspam
Honeypot attack, port: 81, PTR: host-197.51.193.194.tedata.net.
2020-09-05 22:54:15
62.112.11.222 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-05T05:49:25Z and 2020-09-05T06:29:24Z
2020-09-05 22:37:56
149.129.52.21 attackbots
149.129.52.21 - - [05/Sep/2020:15:43:35 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.129.52.21 - - [05/Sep/2020:15:43:38 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.129.52.21 - - [05/Sep/2020:15:43:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-05 22:34:56
122.51.166.84 attackbots
prod8
...
2020-09-05 22:27:36
188.218.10.32 attackspam
Honeypot attack, port: 5555, PTR: net-188-218-10-32.cust.vodafonedsl.it.
2020-09-05 22:15:08
85.26.233.32 attackspambots
Sep  4 18:50:51 mellenthin postfix/smtpd[32078]: NOQUEUE: reject: RCPT from unknown[85.26.233.32]: 554 5.7.1 Service unavailable; Client host [85.26.233.32] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/85.26.233.32; from= to= proto=ESMTP helo=<[85.26.233.32]>
2020-09-05 22:46:38
80.215.92.46 attack
Sep  4 18:51:03 mellenthin postfix/smtpd[32575]: NOQUEUE: reject: RCPT from unknown[80.215.92.46]: 554 5.7.1 Service unavailable; Client host [80.215.92.46] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/80.215.92.46; from= to= proto=ESMTP helo=<[80.215.92.46]>
2020-09-05 22:35:53
103.83.164.134 attack
XMLRPC script access attempt: "GET /xmlrpc.php"
2020-09-05 22:13:05

最近上报的IP列表

89.46.106.158 181.52.240.91 114.80.210.83 104.255.169.139
77.247.110.81 14.68.98.99 61.7.141.174 106.13.106.46
193.188.22.110 185.108.19.115 221.125.158.124 31.15.95.163
46.4.52.175 185.12.109.102 218.56.138.166 122.55.251.114
45.33.80.76 168.181.51.146 36.3.120.74 91.218.101.157