必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.217.89.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.217.89.209.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:56:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 209.89.217.134.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 209.89.217.134.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.216.92.50 attack
Unauthorized connection attempt from IP address 190.216.92.50 on Port 445(SMB)
2019-11-24 07:50:04
222.186.31.204 attackspambots
Nov 24 00:45:21 minden010 sshd[1326]: Failed password for root from 222.186.31.204 port 18259 ssh2
Nov 24 00:46:26 minden010 sshd[1830]: Failed password for root from 222.186.31.204 port 45424 ssh2
...
2019-11-24 08:02:48
60.250.149.19 attackspam
Nov 23 23:36:56 game-panel sshd[2642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.149.19
Nov 23 23:36:58 game-panel sshd[2642]: Failed password for invalid user EkExplorerUser from 60.250.149.19 port 63011 ssh2
Nov 23 23:41:29 game-panel sshd[2871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.149.19
2019-11-24 07:56:26
112.10.194.16 attackspambots
badbot
2019-11-24 08:00:41
45.170.174.144 attack
Automatic report - Port Scan Attack
2019-11-24 08:01:39
84.76.174.85 attackspambots
Nov 23 23:38:27 mxgate1 postfix/postscreen[27649]: CONNECT from [84.76.174.85]:19374 to [176.31.12.44]:25
Nov 23 23:38:27 mxgate1 postfix/dnsblog[27651]: addr 84.76.174.85 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 23 23:38:27 mxgate1 postfix/dnsblog[27653]: addr 84.76.174.85 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 23 23:38:27 mxgate1 postfix/dnsblog[27653]: addr 84.76.174.85 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 23 23:38:27 mxgate1 postfix/dnsblog[27650]: addr 84.76.174.85 listed by domain bl.spamcop.net as 127.0.0.2
Nov 23 23:38:27 mxgate1 postfix/dnsblog[27654]: addr 84.76.174.85 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 23 23:38:28 mxgate1 postfix/dnsblog[27652]: addr 84.76.174.85 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 23 23:38:33 mxgate1 postfix/postscreen[27649]: DNSBL rank 6 for [84.76.174.85]:19374
Nov x@x
Nov 23 23:38:35 mxgate1 postfix/postscreen[27649]: HANGUP after 1.8 from [84.76.174.85]:19374 in ........
-------------------------------
2019-11-24 08:10:47
117.67.75.157 attackspam
badbot
2019-11-24 08:14:31
201.105.223.161 attackspambots
Unauthorized connection attempt from IP address 201.105.223.161 on Port 445(SMB)
2019-11-24 07:41:46
41.139.191.50 attackspambots
Nov 23 23:33:53 tux postfix/smtpd[17569]: connect from 41-139-191-50.safaricombusiness.co.ke[41.139.191.50]
Nov x@x
Nov 23 23:33:54 tux postfix/smtpd[17569]: lost connection after DATA from 41-139-191-50.safaricombusiness.co.ke[41.139.191.50]
Nov 23 23:33:54 tux postfix/smtpd[17569]: disconnect from 41-139-191-50.safaricombusiness.co.ke[41.139.191.50]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.139.191.50
2019-11-24 08:00:16
41.180.68.214 attack
Nov 23 19:05:34 linuxvps sshd\[54357\]: Invalid user 123 from 41.180.68.214
Nov 23 19:05:34 linuxvps sshd\[54357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.180.68.214
Nov 23 19:05:36 linuxvps sshd\[54357\]: Failed password for invalid user 123 from 41.180.68.214 port 58508 ssh2
Nov 23 19:13:38 linuxvps sshd\[59550\]: Invalid user Illusionen@123 from 41.180.68.214
Nov 23 19:13:38 linuxvps sshd\[59550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.180.68.214
2019-11-24 08:18:43
124.74.248.218 attackbots
Nov 23 23:44:43 vmd17057 sshd\[20193\]: Invalid user recepcion from 124.74.248.218 port 46676
Nov 23 23:44:43 vmd17057 sshd\[20193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
Nov 23 23:44:45 vmd17057 sshd\[20193\]: Failed password for invalid user recepcion from 124.74.248.218 port 46676 ssh2
...
2019-11-24 08:03:09
51.77.137.211 attackbotsspam
Nov 24 01:03:26 SilenceServices sshd[19847]: Failed password for root from 51.77.137.211 port 56246 ssh2
Nov 24 01:07:19 SilenceServices sshd[20905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.137.211
Nov 24 01:07:21 SilenceServices sshd[20905]: Failed password for invalid user xalan from 51.77.137.211 port 57682 ssh2
2019-11-24 08:16:48
144.217.14.167 attackbots
Nov 24 00:36:12 markkoudstaal sshd[20240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.14.167
Nov 24 00:36:15 markkoudstaal sshd[20240]: Failed password for invalid user admin from 144.217.14.167 port 37355 ssh2
Nov 24 00:42:47 markkoudstaal sshd[20880]: Failed password for root from 144.217.14.167 port 56937 ssh2
2019-11-24 08:13:55
222.186.175.202 attackspambots
Nov 24 00:48:30 dev0-dcde-rnet sshd[14562]: Failed password for root from 222.186.175.202 port 39958 ssh2
Nov 24 00:48:45 dev0-dcde-rnet sshd[14562]: error: maximum authentication attempts exceeded for root from 222.186.175.202 port 39958 ssh2 [preauth]
Nov 24 00:48:50 dev0-dcde-rnet sshd[14564]: Failed password for root from 222.186.175.202 port 11270 ssh2
2019-11-24 07:48:58
182.255.1.13 attackbotsspam
Unauthorized connection attempt from IP address 182.255.1.13 on Port 445(SMB)
2019-11-24 07:47:46

最近上报的IP列表

137.56.124.92 177.182.122.129 134.77.157.14 16.237.139.86
146.94.40.163 156.114.246.212 63.166.136.183 103.22.223.77
92.202.7.77 47.209.194.179 116.124.55.55 12.178.167.194
239.132.208.200 35.3.84.236 155.51.33.101 200.183.12.192
22.87.153.150 170.53.214.51 153.62.81.225 149.47.239.75