必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.228.211.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.228.211.138.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:08:49 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
138.211.228.134.in-addr.arpa domain name pointer cm-134-228-211-138.buckeyecom.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.211.228.134.in-addr.arpa	name = cm-134-228-211-138.buckeyecom.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.137.245.64 attack
$f2bV_matches
2019-07-30 16:58:38
108.4.12.229 attackspambots
20 attempts against mh-ssh on fire.magehost.pro
2019-07-30 17:04:34
96.57.82.166 attackbotsspam
Jul 30 10:12:23 bouncer sshd\[8880\]: Invalid user cron from 96.57.82.166 port 34832
Jul 30 10:12:23 bouncer sshd\[8880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.57.82.166 
Jul 30 10:12:25 bouncer sshd\[8880\]: Failed password for invalid user cron from 96.57.82.166 port 34832 ssh2
...
2019-07-30 16:16:35
168.63.67.52 attackspam
(sshd) Failed SSH login from 168.63.67.52 (-): 5 in the last 3600 secs
2019-07-30 16:47:43
45.82.153.7 attackspam
Multiport scan : 516 ports scanned 2001 2002 2003 2006 2007 2008 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2100 2101 2104 2106 2107 2108 2109 2110 2201 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2218 2219 2220 2301 2303 2304 2305 2306 2307 2308 2309 2310 3000 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3014 3015 3017 3018 3019 3020 3021 3022 3026 3027 3301 3303 3304 3305 3306 3307 3311 .....
2019-07-30 16:18:49
93.37.238.244 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-14/07-29]12pkt,1pt.(tcp)
2019-07-30 16:27:27
221.215.130.162 attack
Jul 30 08:13:40 v22018076622670303 sshd\[7256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.215.130.162  user=root
Jul 30 08:13:42 v22018076622670303 sshd\[7256\]: Failed password for root from 221.215.130.162 port 35173 ssh2
Jul 30 08:16:21 v22018076622670303 sshd\[7266\]: Invalid user dedy from 221.215.130.162 port 47359
...
2019-07-30 16:44:50
113.166.92.5 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07301024)
2019-07-30 16:38:01
121.42.152.155 attackspambots
Web-based SQL injection attempt
2019-07-30 16:24:43
37.139.21.75 attackbotsspam
Invalid user usuario from 37.139.21.75 port 35356
2019-07-30 16:23:08
80.211.12.23 attackbots
detected by Fail2Ban
2019-07-30 16:49:00
87.98.189.251 attackbots
Mail system brute-force attack
2019-07-30 16:34:37
185.42.223.90 attackspambots
Port 3389 Scan
2019-07-30 16:39:55
217.199.136.114 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-29]13pkt,1pt.(tcp)
2019-07-30 16:28:33
59.160.110.7 attackbots
Unauthorized connection attempt from IP address 59.160.110.7 on Port 445(SMB)
2019-07-30 16:13:52

最近上报的IP列表

237.48.97.168 2.142.142.167 193.199.19.161 61.126.226.130
141.16.139.48 215.172.43.73 126.197.115.247 52.117.31.129
44.104.240.57 115.78.229.167 219.139.80.169 56.183.250.157
26.219.106.170 22.238.22.168 59.95.46.85 61.17.138.124
252.250.166.25 146.23.166.106 47.159.83.191 226.9.39.134