必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.210.38.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.210.38.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 15:39:27 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 20.38.210.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.38.210.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.93.16.35 attack
" "
2019-08-07 15:20:16
184.105.247.219 attackbots
Honeypot hit.
2019-08-07 15:25:19
213.229.102.147 attackbotsspam
firewall-block, port(s): 445/tcp
2019-08-07 14:58:34
168.90.52.23 attack
Aug  7 12:28:05 vibhu-HP-Z238-Microtower-Workstation sshd\[4270\]: Invalid user programming from 168.90.52.23
Aug  7 12:28:05 vibhu-HP-Z238-Microtower-Workstation sshd\[4270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.52.23
Aug  7 12:28:07 vibhu-HP-Z238-Microtower-Workstation sshd\[4270\]: Failed password for invalid user programming from 168.90.52.23 port 54572 ssh2
Aug  7 12:33:55 vibhu-HP-Z238-Microtower-Workstation sshd\[4505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.52.23  user=root
Aug  7 12:33:57 vibhu-HP-Z238-Microtower-Workstation sshd\[4505\]: Failed password for root from 168.90.52.23 port 49842 ssh2
...
2019-08-07 15:18:41
185.69.153.247 attackbots
Aug  7 08:26:55 meumeu sshd[31964]: Failed password for invalid user paps from 185.69.153.247 port 49788 ssh2
Aug  7 08:31:38 meumeu sshd[32485]: Failed password for invalid user bai from 185.69.153.247 port 46762 ssh2
...
2019-08-07 14:37:51
185.107.45.160 attack
NL - - [06 Aug 2019:23:45:39 +0300] GET  wordpress  HTTP 1.1 302 - - Mozilla 5.0 Windows NT 6.3; Win64; x64; rv:63.0 Gecko 20100101 Firefox 63.0
2019-08-07 15:11:42
1.190.162.215 attack
Aug  6 21:32:47   DDOS Attack: SRC=1.190.162.215 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=48  DF PROTO=TCP SPT=28608 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-07 15:02:40
139.99.37.130 attack
Aug  7 02:48:37 SilenceServices sshd[3100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130
Aug  7 02:48:39 SilenceServices sshd[3100]: Failed password for invalid user sunday from 139.99.37.130 port 25486 ssh2
Aug  7 02:54:56 SilenceServices sshd[10120]: Failed password for root from 139.99.37.130 port 13162 ssh2
2019-08-07 14:54:37
157.230.255.16 attackbots
Aug  7 09:26:38 yabzik sshd[1733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.255.16
Aug  7 09:26:41 yabzik sshd[1733]: Failed password for invalid user www from 157.230.255.16 port 47736 ssh2
Aug  7 09:31:54 yabzik sshd[3667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.255.16
2019-08-07 14:35:46
176.109.34.58 attackspam
" "
2019-08-07 14:35:14
88.15.245.185 attack
Aug  7 07:51:27 * sshd[25772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.15.245.185
Aug  7 07:51:29 * sshd[25772]: Failed password for invalid user harold from 88.15.245.185 port 44492 ssh2
2019-08-07 14:46:26
159.224.3.95 attackbots
Unauthorized connection attempt from IP address 159.224.3.95 on Port 445(SMB)
2019-08-07 14:57:09
49.207.180.126 attackbotsspam
Aug  7 09:04:03 MK-Soft-Root2 sshd\[5870\]: Invalid user tempo from 49.207.180.126 port 34818
Aug  7 09:04:03 MK-Soft-Root2 sshd\[5870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.180.126
Aug  7 09:04:04 MK-Soft-Root2 sshd\[5870\]: Failed password for invalid user tempo from 49.207.180.126 port 34818 ssh2
...
2019-08-07 15:14:29
54.37.254.57 attackbotsspam
Aug  7 03:19:06 plusreed sshd[25660]: Invalid user user from 54.37.254.57
Aug  7 03:19:06 plusreed sshd[25660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.254.57
Aug  7 03:19:06 plusreed sshd[25660]: Invalid user user from 54.37.254.57
Aug  7 03:19:08 plusreed sshd[25660]: Failed password for invalid user user from 54.37.254.57 port 59906 ssh2
...
2019-08-07 15:21:45
101.230.8.100 attack
Autoban   101.230.8.100 AUTH/CONNECT
2019-08-07 15:26:50

最近上报的IP列表

145.221.227.194 166.14.124.20 152.81.94.73 83.148.48.193
194.51.75.246 45.142.14.187 25.44.37.210 8.245.117.13
223.8.59.45 74.224.76.157 172.191.142.172 149.72.17.132
245.13.226.41 90.183.171.136 230.122.102.193 83.86.29.208
226.94.239.50 244.20.4.16 63.104.203.238 221.150.171.251