必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santa Clara

省份(region): California

国家(country): United States

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): DigitalOcean, LLC

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
" "
2020-10-08 03:20:51
attackbots
bruteforce, ssh, scan port
2020-10-07 19:35:11
attackbots
 TCP (SYN) 134.209.63.140:47573 -> port 27666, len 44
2020-09-11 01:45:29
attackbots
32123/tcp 13573/tcp 4566/tcp...
[2020-07-10/09-10]466pkt,172pt.(tcp)
2020-09-10 17:06:11
attackbotsspam
 TCP (SYN) 134.209.63.140:48449 -> port 13573, len 44
2020-09-10 07:39:52
attack
firewall-block, port(s): 13008/tcp
2020-08-27 20:56:00
attackbotsspam
Unauthorized connection attempt detected from IP address 134.209.63.140 to port 9404 [T]
2020-08-13 03:58:41
attackbotsspam
TCP ports : 8312 / 29972
2020-08-10 19:43:56
attack
SIP/5060 Probe, BF, Hack -
2020-08-04 16:48:44
attack
Jul 29 05:57:00 debian-2gb-nbg1-2 kernel: \[18253517.433330\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=134.209.63.140 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=5032 PROTO=TCP SPT=53393 DPT=17320 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-29 12:03:07
attackspambots
port scan and connect, tcp 4569 (iax2)
2020-07-28 14:42:28
attackbotsspam
Port scanning [3 denied]
2020-07-28 02:35:03
attackspam
Jul 25 05:54:41 debian-2gb-nbg1-2 kernel: \[17907798.620294\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=134.209.63.140 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=6127 PROTO=TCP SPT=43052 DPT=30408 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-25 13:22:43
attackbotsspam
07/22/2020-10:52:24.965878 134.209.63.140 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-22 23:30:59
attackspam
firewall-block, port(s): 22738/tcp
2020-07-10 05:55:05
attack
 TCP (SYN) 134.209.63.140:53862 -> port 15728, len 44
2020-07-06 23:16:57
attackbotsspam
Unauthorized connection attempt detected from IP address 134.209.63.140 to port 8874 [T]
2020-06-24 17:33:34
attack
Multiport scan : 4 ports scanned 232 4186 14768 31475
2020-06-22 08:06:36
attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 16829 15215
2020-06-17 21:47:37
attackbotsspam
Jun 10 08:06:56 debian-2gb-nbg1-2 kernel: \[14027948.083591\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=134.209.63.140 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=59219 PROTO=TCP SPT=51544 DPT=31587 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-10 16:20:53
attackbotsspam
Port Scan detected!
...
2020-05-31 23:24:27
attack
firewall-block, port(s): 14606/tcp
2020-05-21 23:56:39
attack
firewall-block, port(s): 8647/tcp
2020-05-16 15:02:24
attackbots
SSH Brute Force
2020-05-16 03:04:11
attackbotsspam
26470/tcp 18616/tcp 26672/tcp...
[2020-03-21/05-06]246pkt,85pt.(tcp)
2020-05-07 01:59:29
attack
*Port Scan* detected from 134.209.63.140 (US/United States/California/Santa Clara/-). 4 hits in the last 120 seconds
2020-05-06 14:08:15
attackspambots
Port scan(s) denied
2020-04-26 13:40:56
attack
scans 2 times in preceeding hours on the ports (in chronological order) 12207 15984
2020-04-25 21:07:53
attackspambots
Port scan(s) denied
2020-04-25 15:09:02
attackbotsspam
Port Scan: Events[2] countPorts[2]: 13647 25770 ..
2020-04-16 05:09:00
相同子网IP讨论:
IP 类型 评论内容 时间
134.209.63.54 attackbotsspam
400 BAD REQUEST
2019-08-10 11:06:09
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.63.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50236
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.209.63.140.			IN	A

;; AUTHORITY SECTION:
.			2922	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040402 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 05 12:49:00 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 140.63.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 140.63.209.134.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.39 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-05 17:27:57
190.197.64.49 attackbots
IMAP brute force
...
2019-07-05 17:16:10
116.74.102.159 attack
2019-07-05 09:57:31 unexpected disconnection while reading SMTP command from (102.74.116.159.hathway.com) [116.74.102.159]:29128 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-05 09:58:53 unexpected disconnection while reading SMTP command from (102.74.116.159.hathway.com) [116.74.102.159]:29495 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-05 09:59:46 unexpected disconnection while reading SMTP command from (102.74.116.159.hathway.com) [116.74.102.159]:29757 I=[10.100.18.22]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.74.102.159
2019-07-05 17:00:28
106.12.194.234 attack
Jul  5 11:00:06 MK-Soft-Root1 sshd\[24448\]: Invalid user tatiana from 106.12.194.234 port 48120
Jul  5 11:00:06 MK-Soft-Root1 sshd\[24448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.234
Jul  5 11:00:09 MK-Soft-Root1 sshd\[24448\]: Failed password for invalid user tatiana from 106.12.194.234 port 48120 ssh2
...
2019-07-05 17:26:56
218.92.0.201 attackspambots
2019-07-05T08:50:44.384952abusebot-3.cloudsearch.cf sshd\[8147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
2019-07-05 17:00:03
185.220.101.34 attack
Automatic report - Web App Attack
2019-07-05 17:55:12
124.123.43.153 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 18:46:10,802 INFO [shellcode_manager] (124.123.43.153) no match, writing hexdump (d30ba10f01281b0d1f9fb12fdf66f90d :13103) - SMB (Unknown)
2019-07-05 17:19:39
113.182.79.133 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 07:32:27,224 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.182.79.133)
2019-07-05 17:15:50
62.243.81.252 attackbots
GET /0manager/_admin HTTP/1.1 404 32701 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-07-05 16:59:04
92.118.160.45 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-05 17:29:47
93.115.26.117 attackspambots
\[2019-07-05 04:47:00\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-05T04:47:00.929-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="860046812111522",SessionID="0x7f02f81b2088",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/93.115.26.117/5074",ACLName="no_extension_match"
\[2019-07-05 04:48:44\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-05T04:48:44.598-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="8600046812111522",SessionID="0x7f02f8335788",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/93.115.26.117/5070",ACLName="no_extension_match"
\[2019-07-05 04:50:54\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-05T04:50:54.009-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="08600046812111522",SessionID="0x7f02f81b2088",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/93.115.26.117/5070",ACLName="no_
2019-07-05 17:21:26
188.217.235.95 attack
19/7/5@04:56:56: FAIL: IoT-Telnet address from=188.217.235.95
...
2019-07-05 18:01:47
198.108.67.79 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 17:54:36
178.62.214.113 attack
Trying to deliver email spam, but blocked by RBL
2019-07-05 17:10:25
111.231.78.82 attackspambots
2019-07-05T09:06:20.218575abusebot-4.cloudsearch.cf sshd\[12004\]: Invalid user centos from 111.231.78.82 port 47720
2019-07-05 17:23:17

最近上报的IP列表

144.22.112.42 129.211.0.126 124.107.217.68 122.155.223.59
122.129.78.82 114.220.28.43 95.80.93.52 92.12.184.15
80.232.243.243 79.143.180.170 58.56.19.253 52.231.154.244
46.191.169.145 14.63.170.28 3.120.139.38 192.81.217.111
103.29.69.96 35.200.162.35 165.227.69.188 213.32.90.123