必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.42.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.209.42.244.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:58:49 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 244.42.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.42.209.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.245.33.180 attack
SSH bruteforce
2020-04-02 17:05:35
124.238.113.126 attackbots
Apr  2 10:01:33 server2 sshd\[12310\]: User root from 124.238.113.126 not allowed because not listed in AllowUsers
Apr  2 10:01:35 server2 sshd\[12311\]: User root from 124.238.113.126 not allowed because not listed in AllowUsers
Apr  2 10:01:39 server2 sshd\[12323\]: User root from 124.238.113.126 not allowed because not listed in AllowUsers
Apr  2 10:01:39 server2 sshd\[12321\]: User root from 124.238.113.126 not allowed because not listed in AllowUsers
Apr  2 10:01:42 server2 sshd\[12325\]: User root from 124.238.113.126 not allowed because not listed in AllowUsers
Apr  2 10:01:45 server2 sshd\[12329\]: User root from 124.238.113.126 not allowed because not listed in AllowUsers
2020-04-02 17:07:19
218.92.0.192 attackbots
SSH login attempts.
2020-04-02 16:50:45
139.215.217.181 attackbots
Apr  2 08:40:27 mail sshd[1241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181  user=root
Apr  2 08:40:28 mail sshd[1241]: Failed password for root from 139.215.217.181 port 34243 ssh2
Apr  2 08:59:26 mail sshd[30660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181  user=root
Apr  2 08:59:29 mail sshd[30660]: Failed password for root from 139.215.217.181 port 38090 ssh2
Apr  2 09:03:34 mail sshd[4693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181  user=root
Apr  2 09:03:36 mail sshd[4693]: Failed password for root from 139.215.217.181 port 33130 ssh2
...
2020-04-02 16:53:25
162.243.133.77 attackbots
*Port Scan* detected from 162.243.133.77 (US/United States/California/San Francisco/zg-0312c-404.stretchoid.com). 4 hits in the last 165 seconds
2020-04-02 17:02:27
5.39.76.12 attackspambots
[ssh] SSH attack
2020-04-02 16:27:08
112.85.42.173 attack
Apr  2 13:40:37 gw1 sshd[14610]: Failed password for root from 112.85.42.173 port 56352 ssh2
Apr  2 13:40:41 gw1 sshd[14610]: Failed password for root from 112.85.42.173 port 56352 ssh2
...
2020-04-02 16:51:40
80.211.137.127 attackbotsspam
fail2ban
2020-04-02 17:02:01
140.143.250.57 attackspambots
Apr  2 07:38:32 powerpi2 sshd[9581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.250.57
Apr  2 07:38:32 powerpi2 sshd[9581]: Invalid user admin from 140.143.250.57 port 38312
Apr  2 07:38:34 powerpi2 sshd[9581]: Failed password for invalid user admin from 140.143.250.57 port 38312 ssh2
...
2020-04-02 17:05:02
111.231.82.175 attack
Apr  2 09:34:22 ArkNodeAT sshd\[16892\]: Invalid user wangpei from 111.231.82.175
Apr  2 09:34:22 ArkNodeAT sshd\[16892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.82.175
Apr  2 09:34:23 ArkNodeAT sshd\[16892\]: Failed password for invalid user wangpei from 111.231.82.175 port 39454 ssh2
2020-04-02 16:36:15
49.88.112.69 attackbotsspam
Apr  2 11:04:21 pkdns2 sshd\[63607\]: Failed password for root from 49.88.112.69 port 40735 ssh2Apr  2 11:04:59 pkdns2 sshd\[63621\]: Failed password for root from 49.88.112.69 port 16179 ssh2Apr  2 11:05:01 pkdns2 sshd\[63621\]: Failed password for root from 49.88.112.69 port 16179 ssh2Apr  2 11:05:03 pkdns2 sshd\[63621\]: Failed password for root from 49.88.112.69 port 16179 ssh2Apr  2 11:06:18 pkdns2 sshd\[63757\]: Failed password for root from 49.88.112.69 port 61816 ssh2Apr  2 11:09:06 pkdns2 sshd\[63871\]: Failed password for root from 49.88.112.69 port 60658 ssh2
...
2020-04-02 16:20:49
192.210.233.194 attackbots
[2020-04-02 01:27:03] NOTICE[1148][C-0001a6b3] chan_sip.c: Call from '' (192.210.233.194:59378) to extension '+46520458218' rejected because extension not found in context 'public'.
[2020-04-02 01:27:03] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-02T01:27:03.491-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+46520458218",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/192.210.233.194/59378",ACLName="no_extension_match"
[2020-04-02 01:28:00] NOTICE[1148][C-0001a6b6] chan_sip.c: Call from '' (192.210.233.194:55396) to extension '801146520458218' rejected because extension not found in context 'public'.
[2020-04-02 01:28:00] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-02T01:28:00.442-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146520458218",SessionID="0x7fd82c43c848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-04-02 16:22:46
61.231.28.12 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 04:55:12.
2020-04-02 16:53:44
179.100.44.72 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 04:55:10.
2020-04-02 16:57:16
186.50.153.154 attackbots
Unauthorized connection attempt detected from IP address 186.50.153.154 to port 23
2020-04-02 16:59:44

最近上报的IP列表

134.209.42.183 134.209.42.7 134.209.42.71 118.173.119.92
134.209.42.73 134.209.42.81 134.209.43.105 134.209.43.103
134.209.43.186 134.209.43.207 134.209.43.121 134.209.43.115
134.209.43.136 134.209.43.12 134.209.43.250 134.209.43.213
118.173.119.98 134.209.43.254 134.209.43.31 134.209.43.53