必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.213.236.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.213.236.216.		IN	A

;; AUTHORITY SECTION:
.			407	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:00:16 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 216.236.213.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.236.213.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.184.16 attackbots
[Thu Sep 17 00:00:01.485079 2020] [php7:error] [pid 3570] [client 206.189.184.16:60519] script /Volumes/ColoData/WebSites/cnccoop.com/wp-login.php not found or unable to stat
2020-09-17 18:13:04
68.183.193.148 attack
Failed password for root from 68.183.193.148 port 35438 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
Failed password for root from 68.183.193.148 port 46472 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
Failed password for root from 68.183.193.148 port 57516 ssh2
2020-09-17 18:18:40
54.37.11.58 attackbotsspam
Sep 17 10:04:31 django-0 sshd[19358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-54-37-11.eu  user=root
Sep 17 10:04:33 django-0 sshd[19358]: Failed password for root from 54.37.11.58 port 44266 ssh2
...
2020-09-17 18:34:36
47.132.83.2 attackspambots
Port scan on 1 port(s): 22
2020-09-17 18:31:33
115.97.67.126 attackspambots
Port probing on unauthorized port 23
2020-09-17 18:20:25
201.234.227.142 attackspam
20/9/16@12:58:11: FAIL: Alarm-Network address from=201.234.227.142
...
2020-09-17 18:23:28
200.105.184.216 attackspam
200.105.184.216 (BO/Bolivia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 17 04:24:27 server2 sshd[28312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.188.250  user=root
Sep 17 04:24:30 server2 sshd[28312]: Failed password for root from 112.21.188.250 port 49011 ssh2
Sep 17 04:25:38 server2 sshd[28932]: Failed password for root from 95.85.39.74 port 47666 ssh2
Sep 17 04:24:57 server2 sshd[28492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.180.19.210  user=root
Sep 17 04:24:59 server2 sshd[28492]: Failed password for root from 189.180.19.210 port 34884 ssh2
Sep 17 04:23:47 server2 sshd[27904]: Failed password for root from 200.105.184.216 port 54799 ssh2

IP Addresses Blocked:

112.21.188.250 (CN/China/-)
95.85.39.74 (NL/Netherlands/-)
189.180.19.210 (MX/Mexico/-)
2020-09-17 18:20:52
91.92.145.13 attackbotsspam
Port probing on unauthorized port 8080
2020-09-17 18:13:27
64.227.58.164 attackspam
Sep 17 10:43:15 b-vps wordpress(rreb.cz)[27552]: Authentication attempt for unknown user martin from 64.227.58.164
...
2020-09-17 18:37:21
176.122.157.32 attackbotsspam
20 attempts against mh-ssh on flow
2020-09-17 18:29:55
187.111.145.154 attack
Icarus honeypot on github
2020-09-17 18:23:15
203.213.66.170 attack
$f2bV_matches
2020-09-17 18:20:08
64.225.122.157 attackspam
2020-09-17T07:09:49.077063randservbullet-proofcloud-66.localdomain sshd[10574]: Invalid user fubar from 64.225.122.157 port 42106
2020-09-17T07:09:49.082031randservbullet-proofcloud-66.localdomain sshd[10574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.122.157
2020-09-17T07:09:49.077063randservbullet-proofcloud-66.localdomain sshd[10574]: Invalid user fubar from 64.225.122.157 port 42106
2020-09-17T07:09:50.722638randservbullet-proofcloud-66.localdomain sshd[10574]: Failed password for invalid user fubar from 64.225.122.157 port 42106 ssh2
...
2020-09-17 18:21:18
71.6.146.186 attackspam
Port scan: Attack repeated for 24 hours
2020-09-17 18:24:39
45.113.70.37 attackbotsspam
TCP port : 8888
2020-09-17 18:39:47

最近上报的IP列表

118.173.132.115 134.213.236.142 134.213.237.136 134.213.235.34
118.173.132.142 134.213.235.180 134.213.238.14 134.213.239.125
134.213.247.165 134.213.239.68 134.213.238.56 134.213.239.140
134.213.239.34 118.173.132.143 134.213.248.196 134.213.249.100
134.213.252.137 134.213.248.233 134.213.249.171 134.213.27.150