必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.213.221.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.213.221.30.			IN	A

;; AUTHORITY SECTION:
.			437	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:00:09 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
30.221.213.134.in-addr.arpa domain name pointer pjf.rms.webanywhere.co.uk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.221.213.134.in-addr.arpa	name = pjf.rms.webanywhere.co.uk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.194.160 attackbots
Jun 29 18:55:06 MK-Soft-VM3 sshd\[15266\]: Invalid user fax from 159.89.194.160 port 53676
Jun 29 18:55:06 MK-Soft-VM3 sshd\[15266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160
Jun 29 18:55:08 MK-Soft-VM3 sshd\[15266\]: Failed password for invalid user fax from 159.89.194.160 port 53676 ssh2
...
2019-06-30 08:29:57
41.204.60.14 attackspambots
Invalid user zhengye from 41.204.60.14 port 41786
2019-06-30 08:43:24
189.89.209.198 attackspam
Jun 29 14:53:47 web1 postfix/smtpd[29349]: warning: 189-089-209-198.static.stratus.com.br[189.89.209.198]: SASL PLAIN authentication failed: authentication failure
...
2019-06-30 08:57:02
49.231.13.190 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:31:54,521 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.13.190)
2019-06-30 08:39:50
94.139.231.138 attackspambots
Probing data entry form.
2019-06-30 09:05:16
187.109.167.91 attackspambots
libpam_shield report: forced login attempt
2019-06-30 09:02:23
138.197.66.204 attack
Telnet/23 MH Probe, BF, Hack -
2019-06-30 08:47:45
58.27.207.166 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:35:12,496 INFO [amun_request_handler] PortScan Detected on Port: 445 (58.27.207.166)
2019-06-30 08:33:04
37.156.237.168 attackspam
SSH invalid-user multiple login try
2019-06-30 08:33:47
182.254.243.109 attack
Jun 30 02:33:05 vps647732 sshd[3055]: Failed password for mail from 182.254.243.109 port 42930 ssh2
Jun 30 02:34:25 vps647732 sshd[3073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.243.109
...
2019-06-30 08:52:13
49.67.69.185 attackspambots
2019-06-29T18:19:46.303650 X postfix/smtpd[11455]: warning: unknown[49.67.69.185]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:44:09.208462 X postfix/smtpd[29426]: warning: unknown[49.67.69.185]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T20:55:03.413066 X postfix/smtpd[30852]: warning: unknown[49.67.69.185]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 08:32:33
185.176.27.166 attackspambots
30.06.2019 00:27:04 Connection to port 49621 blocked by firewall
2019-06-30 09:10:27
1.169.78.100 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:26:39,018 INFO [amun_request_handler] PortScan Detected on Port: 445 (1.169.78.100)
2019-06-30 09:03:42
103.118.48.19 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 18:32:27,592 INFO [amun_request_handler] PortScan Detected on Port: 445 (103.118.48.19)
2019-06-30 08:38:02
47.244.169.183 attackspam
ssh default account attempted login
2019-06-30 09:11:52

最近上报的IP列表

134.213.221.181 118.173.132.112 134.213.224.177 134.213.226.213
134.213.227.148 134.213.234.134 134.213.234.109 134.213.233.163
134.213.233.136 134.213.234.124 134.213.234.60 134.213.234.158
134.213.221.69 134.213.234.96 118.173.132.115 134.213.236.216
134.213.236.142 134.213.237.136 134.213.235.34 118.173.132.142