必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.211.132.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.211.132.139.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 03:48:41 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 139.132.211.134.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 139.132.211.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.133.15 attackbots
firewall-block, port(s): 18777/tcp
2020-05-06 23:44:03
39.36.93.141 attack
39.36.93.141 - - [06/May/2020:14:00:35 +0200] "GET /wp-login.php HTTP/1.1" 301 247 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0"
2020-05-06 23:05:31
31.14.107.52 attackspambots
port 23
2020-05-06 23:11:49
219.91.66.141 attack
trying to access non-authorized port
2020-05-06 23:25:01
152.32.222.196 attackbotsspam
2020-05-06T13:52:27.199038server.espacesoutien.com sshd[7408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.222.196
2020-05-06T13:52:27.187442server.espacesoutien.com sshd[7408]: Invalid user ubuntu from 152.32.222.196 port 37344
2020-05-06T13:52:29.477752server.espacesoutien.com sshd[7408]: Failed password for invalid user ubuntu from 152.32.222.196 port 37344 ssh2
2020-05-06T13:56:28.460640server.espacesoutien.com sshd[15959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.222.196  user=root
2020-05-06T13:56:30.157398server.espacesoutien.com sshd[15959]: Failed password for root from 152.32.222.196 port 39590 ssh2
...
2020-05-06 23:48:38
192.141.200.12 attack
May  6 15:29:22 meumeu sshd[17371]: Failed password for root from 192.141.200.12 port 36660 ssh2
May  6 15:34:01 meumeu sshd[18201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.200.12 
May  6 15:34:02 meumeu sshd[18201]: Failed password for invalid user print from 192.141.200.12 port 46802 ssh2
...
2020-05-06 23:07:14
178.237.0.229 attackspam
May  6 17:01:53 vps sshd[396432]: Invalid user ray from 178.237.0.229 port 50674
May  6 17:01:53 vps sshd[396432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.237.0.229
May  6 17:01:55 vps sshd[396432]: Failed password for invalid user ray from 178.237.0.229 port 50674 ssh2
May  6 17:06:00 vps sshd[418930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.237.0.229  user=root
May  6 17:06:02 vps sshd[418930]: Failed password for root from 178.237.0.229 port 33156 ssh2
...
2020-05-06 23:09:40
181.129.161.28 attack
May  6 14:54:35 XXX sshd[10259]: Invalid user lt from 181.129.161.28 port 60584
2020-05-06 23:41:33
89.216.99.163 attackbotsspam
May  6 12:00:13 IngegnereFirenze sshd[25808]: User root from 89.216.99.163 not allowed because not listed in AllowUsers
...
2020-05-06 23:40:13
217.217.90.149 attack
2020-05-06T08:48:45.4090881495-001 sshd[24774]: Failed password for invalid user xulei from 217.217.90.149 port 49830 ssh2
2020-05-06T08:52:36.1710421495-001 sshd[24933]: Invalid user speech from 217.217.90.149 port 54250
2020-05-06T08:52:36.1817591495-001 sshd[24933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.217.90.149.dyn.user.ono.com
2020-05-06T08:52:36.1710421495-001 sshd[24933]: Invalid user speech from 217.217.90.149 port 54250
2020-05-06T08:52:37.8104501495-001 sshd[24933]: Failed password for invalid user speech from 217.217.90.149 port 54250 ssh2
2020-05-06T08:56:37.9168831495-001 sshd[25114]: Invalid user oracle from 217.217.90.149 port 58672
...
2020-05-06 23:39:21
106.250.131.11 attackspam
May  6 16:49:13 PorscheCustomer sshd[1297]: Failed password for root from 106.250.131.11 port 54034 ssh2
May  6 16:53:19 PorscheCustomer sshd[1391]: Failed password for postgres from 106.250.131.11 port 60356 ssh2
...
2020-05-06 23:33:36
81.210.119.98 attackbots
20/5/6@10:23:39: FAIL: Alarm-Network address from=81.210.119.98
...
2020-05-06 23:13:36
193.194.83.59 attackbotsspam
Unauthorized connection attempt from IP address 193.194.83.59 on Port 445(SMB)
2020-05-06 23:23:37
123.206.111.27 attack
May  6 16:54:08 pve1 sshd[923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.111.27 
May  6 16:54:10 pve1 sshd[923]: Failed password for invalid user ghost from 123.206.111.27 port 51486 ssh2
...
2020-05-06 23:32:42
190.200.77.4 attackspam
Unauthorized connection attempt from IP address 190.200.77.4 on Port 445(SMB)
2020-05-06 23:07:51

最近上报的IP列表

120.55.207.241 184.65.102.102 200.182.24.9 248.104.230.22
193.164.172.153 44.64.2.84 112.183.57.244 245.52.216.81
2.124.93.135 83.192.95.36 187.206.126.49 217.222.196.169
19.51.172.51 250.99.97.26 254.105.179.10 131.211.220.147
38.234.17.199 221.113.237.172 97.123.19.88 198.208.196.169