必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Slough

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
134.209.223.106 attackbots
Port Scan
...
2020-09-18 22:20:33
134.209.223.106 attack
Port Scan
...
2020-09-18 14:35:44
134.209.223.106 attack
Auto Detect Rule!
proto TCP (SYN), 134.209.223.106:59985->gjan.info:21, len 40
2020-09-18 04:52:34
134.209.22.239 attack
" "
2020-08-31 17:07:10
134.209.22.239 attackspam
Port Scan detected!
...
2020-08-30 13:07:36
134.209.228.253 attack
Aug 20 08:08:50 cho sshd[1119932]: Failed password for root from 134.209.228.253 port 38796 ssh2
Aug 20 08:12:38 cho sshd[1120324]: Invalid user andrea from 134.209.228.253 port 46516
Aug 20 08:12:38 cho sshd[1120324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253 
Aug 20 08:12:38 cho sshd[1120324]: Invalid user andrea from 134.209.228.253 port 46516
Aug 20 08:12:40 cho sshd[1120324]: Failed password for invalid user andrea from 134.209.228.253 port 46516 ssh2
...
2020-08-20 15:26:20
134.209.228.253 attack
Aug 19 00:47:09 vpn01 sshd[10467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253
Aug 19 00:47:11 vpn01 sshd[10467]: Failed password for invalid user sb from 134.209.228.253 port 43792 ssh2
...
2020-08-19 07:57:25
134.209.228.253 attackspambots
Aug 14 02:10:15 web1 sshd\[28661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug 14 02:10:18 web1 sshd\[28661\]: Failed password for root from 134.209.228.253 port 42812 ssh2
Aug 14 02:14:05 web1 sshd\[28971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug 14 02:14:07 web1 sshd\[28971\]: Failed password for root from 134.209.228.253 port 52650 ssh2
Aug 14 02:18:00 web1 sshd\[29275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
2020-08-15 04:39:46
134.209.228.253 attack
Aug  3 20:48:36 localhost sshd[9499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug  3 20:48:38 localhost sshd[9499]: Failed password for root from 134.209.228.253 port 55766 ssh2
Aug  3 20:52:16 localhost sshd[9909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug  3 20:52:18 localhost sshd[9909]: Failed password for root from 134.209.228.253 port 39082 ssh2
Aug  3 20:55:59 localhost sshd[10333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253  user=root
Aug  3 20:56:01 localhost sshd[10333]: Failed password for root from 134.209.228.253 port 50628 ssh2
...
2020-08-04 07:56:19
134.209.228.253 attackbots
Jul 31 14:11:16 fhem-rasp sshd[14346]: Failed password for root from 134.209.228.253 port 33920 ssh2
Jul 31 14:11:16 fhem-rasp sshd[14346]: Disconnected from authenticating user root 134.209.228.253 port 33920 [preauth]
...
2020-07-31 20:34:52
134.209.220.69 attack
Exploited Host.
2020-07-26 03:18:21
134.209.228.253 attackspam
Invalid user yyh from 134.209.228.253 port 59744
2020-07-24 15:17:31
134.209.228.253 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-20 05:20:21
134.209.228.253 attackbotsspam
Jul 16 17:43:20 vps-51d81928 sshd[5171]: Invalid user aayush from 134.209.228.253 port 37602
Jul 16 17:43:20 vps-51d81928 sshd[5171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253 
Jul 16 17:43:20 vps-51d81928 sshd[5171]: Invalid user aayush from 134.209.228.253 port 37602
Jul 16 17:43:23 vps-51d81928 sshd[5171]: Failed password for invalid user aayush from 134.209.228.253 port 37602 ssh2
Jul 16 17:47:01 vps-51d81928 sshd[5232]: Invalid user atm from 134.209.228.253 port 52324
...
2020-07-17 04:39:28
134.209.228.253 attack
Several Attack
2020-07-17 00:49:41
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.209.0.0 - 134.209.255.255
CIDR:           134.209.0.0/16
NetName:        DIGITALOCEAN-134-209-0-0
NetHandle:      NET-134-209-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2018-10-18
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/134.209.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.22.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.209.22.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 12:19:20 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 96.22.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.22.209.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.147.215.8 attackspambots
[2020-02-16 11:40:18] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.215.8:55215' - Wrong password
[2020-02-16 11:40:18] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-16T11:40:18.585-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="35158",SessionID="0x7fd82cd36058",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.215.8/55215",Challenge="379a580b",ReceivedChallenge="379a580b",ReceivedHash="7cbf111e13bff9e086a50a319f5cb3b0"
[2020-02-16 11:40:46] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.215.8:49546' - Wrong password
[2020-02-16 11:40:46] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-16T11:40:46.710-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="91263",SessionID="0x7fd82cc0d5f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.2
...
2020-02-17 00:53:11
201.151.180.93 attackspam
1581860958 - 02/16/2020 14:49:18 Host: 201.151.180.93/201.151.180.93 Port: 445 TCP Blocked
2020-02-17 00:09:40
14.102.122.42 attack
Autoban   14.102.122.42 AUTH/CONNECT
2020-02-17 00:19:51
121.128.200.146 attackspambots
SSH Login Bruteforce
2020-02-17 00:40:36
185.110.244.108 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 00:11:56
218.92.0.175 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Failed password for root from 218.92.0.175 port 30821 ssh2
Failed password for root from 218.92.0.175 port 30821 ssh2
Failed password for root from 218.92.0.175 port 30821 ssh2
Failed password for root from 218.92.0.175 port 30821 ssh2
2020-02-17 00:24:13
14.143.250.218 attackbotsspam
02/16/2020-14:48:22.426863 14.143.250.218 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-02-17 00:53:51
207.46.13.72 attackspam
Automatic report - Banned IP Access
2020-02-17 00:09:08
118.175.131.253 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-02-17 00:31:13
185.11.22.154 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 00:35:42
185.143.223.164 attackspam
Feb 16 17:32:09 relay postfix/smtpd\[9884\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.164\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.163\]\>
Feb 16 17:32:09 relay postfix/smtpd\[9884\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.164\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.163\]\>
Feb 16 17:32:09 relay postfix/smtpd\[9884\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.164\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.163\]\>
Feb 16 17:32:09 relay postfix/smtpd\[9884\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.164\]: 554 5.7.1 \: Relay access denied\; from=\ to=\<
...
2020-02-17 00:54:40
60.248.118.166 attack
firewall-block, port(s): 23/tcp
2020-02-17 00:23:13
129.28.106.99 attackbots
Feb 16 16:48:46 server sshd\[5699\]: Invalid user oracle from 129.28.106.99
Feb 16 16:48:46 server sshd\[5699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.106.99 
Feb 16 16:48:47 server sshd\[5699\]: Failed password for invalid user oracle from 129.28.106.99 port 37850 ssh2
Feb 16 16:49:18 server sshd\[5748\]: Invalid user oracle from 129.28.106.99
Feb 16 16:49:18 server sshd\[5748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.106.99 
...
2020-02-17 00:08:36
185.53.88.15 attackspam
SIPVicious Scanner Detection
2020-02-17 00:18:55
220.170.0.102 attack
[portscan] Port scan
2020-02-17 00:12:59

最近上报的IP列表

21.203.8.184 116.56.161.14 54.72.126.190 35.203.210.206
167.190.119.253 157.230.110.125 10.212.36.80 144.116.13.5
128.210.195.67 201.214.146.153 2606:4700:10::6816:2901 2606:4700:10::6814:9012
2606:4700:10::ac43:1974 2606:4700:10::6816:1076 2606:4700:10::ac43:1612 2606:4700:10::6816:1634
2606:4700:10::6816:2711 2606:4700:10::6814:5706 10.227.145.31 199.59.221.217