必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.234.6.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.234.6.164.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122101 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 22 09:57:50 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 164.6.234.134.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 134.234.6.164.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.92.118.52 attack
2019-11-18 00:24:56 H=(londonbus.it) [115.92.118.52]:48332 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/115.92.118.52)
2019-11-18 00:24:56 H=(londonbus.it) [115.92.118.52]:48332 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/115.92.118.52)
2019-11-18 00:24:57 H=(londonbus.it) [115.92.118.52]:48332 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/115.92.118.52)
...
2019-11-18 21:38:53
102.165.220.188 attackbotsspam
Autoban   102.165.220.188 AUTH/CONNECT
2019-11-18 21:37:10
83.55.236.235 attack
Automatic report - Port Scan Attack
2019-11-18 21:16:32
2.129.206.158 attack
Autoban   2.129.206.158 VIRUS
2019-11-18 21:35:24
5.26.193.62 attackbotsspam
Automatic report - Port Scan Attack
2019-11-18 21:00:13
102.143.203.44 attack
Autoban   102.143.203.44 AUTH/CONNECT
2019-11-18 21:40:06
176.48.105.28 attackbotsspam
Autoban   176.48.105.28 ABORTED AUTH
2019-11-18 21:07:56
87.66.81.253 attack
TCP Port Scanning
2019-11-18 21:37:37
173.249.33.187 attackspambots
173.249.33.187 was recorded 5 times by 2 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 5, 7, 47
2019-11-18 20:59:40
3.189.55.217 attackbotsspam
Autoban   3.189.55.217 VIRUS
2019-11-18 21:22:42
210.212.145.125 attackbotsspam
Nov 18 08:26:25 ns381471 sshd[8665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.145.125
Nov 18 08:26:27 ns381471 sshd[8665]: Failed password for invalid user zabbix from 210.212.145.125 port 16696 ssh2
2019-11-18 21:41:34
103.107.161.54 attack
Autoban   103.107.161.54 AUTH/CONNECT
2019-11-18 21:01:31
102.142.13.88 attack
Autoban   102.142.13.88 AUTH/CONNECT
2019-11-18 21:42:30
66.249.64.56 attack
404 NOT FOUND
2019-11-18 21:30:12
2.82.232.127 attackspam
Autoban   2.82.232.127 VIRUS
2019-11-18 21:32:17

最近上报的IP列表

135.1.145.248 134.100.133.219 131.42.234.211 130.162.31.114
206.189.42.228 43.28.88.43 101.52.147.2 90.87.209.166
103.180.121.40 80.94.95.205 147.11.16.9 98.77.79.64
67.167.35.111 33.49.84.137 67.144.88.61 48.44.57.111
148.252.132.196 178.167.44.107 96.44.142.234 107.170.250.18