必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.249.199.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.249.199.27.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:07:36 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
27.199.249.134.in-addr.arpa domain name pointer 134-249-199-27.broadband.kyivstar.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.199.249.134.in-addr.arpa	name = 134-249-199-27.broadband.kyivstar.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.182.209.80 attackbotsspam
Unauthorized connection attempt from IP address 113.182.209.80 on Port 445(SMB)
2019-08-30 20:18:39
43.242.241.151 attack
Unauthorized connection attempt from IP address 43.242.241.151 on Port 445(SMB)
2019-08-30 20:02:33
203.162.13.68 attack
Aug 30 13:18:56 meumeu sshd[28637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.13.68 
Aug 30 13:18:58 meumeu sshd[28637]: Failed password for invalid user jinho from 203.162.13.68 port 37818 ssh2
Aug 30 13:23:46 meumeu sshd[29210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.13.68 
...
2019-08-30 20:19:35
137.74.25.247 attackspambots
Aug 30 08:44:44 mail sshd[2505]: Invalid user msr from 137.74.25.247
Aug 30 08:44:44 mail sshd[2505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247
Aug 30 08:44:44 mail sshd[2505]: Invalid user msr from 137.74.25.247
Aug 30 08:44:46 mail sshd[2505]: Failed password for invalid user msr from 137.74.25.247 port 52250 ssh2
Aug 30 08:57:31 mail sshd[4066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
Aug 30 08:57:33 mail sshd[4066]: Failed password for root from 137.74.25.247 port 57217 ssh2
...
2019-08-30 19:46:59
124.42.239.214 attack
Aug 30 12:42:37 nextcloud sshd\[27469\]: Invalid user debian from 124.42.239.214
Aug 30 12:42:37 nextcloud sshd\[27469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.239.214
Aug 30 12:42:39 nextcloud sshd\[27469\]: Failed password for invalid user debian from 124.42.239.214 port 48634 ssh2
...
2019-08-30 19:43:37
221.125.165.59 attackbots
Aug 30 14:28:53 yabzik sshd[10937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
Aug 30 14:28:55 yabzik sshd[10937]: Failed password for invalid user test01 from 221.125.165.59 port 39400 ssh2
Aug 30 14:33:10 yabzik sshd[12606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
2019-08-30 19:35:12
129.213.153.229 attack
Invalid user pork from 129.213.153.229 port 12180
2019-08-30 20:16:39
1.0.144.31 attackspambots
Unauthorized connection attempt from IP address 1.0.144.31 on Port 445(SMB)
2019-08-30 20:11:50
196.188.241.111 attack
Unauthorized connection attempt from IP address 196.188.241.111 on Port 445(SMB)
2019-08-30 20:02:52
103.249.121.91 attack
Automatic report - Port Scan Attack
2019-08-30 19:32:27
139.59.118.88 attackbots
Aug 30 06:49:01 web8 sshd\[31885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.118.88  user=root
Aug 30 06:49:03 web8 sshd\[31885\]: Failed password for root from 139.59.118.88 port 36454 ssh2
Aug 30 06:54:03 web8 sshd\[2387\]: Invalid user search from 139.59.118.88
Aug 30 06:54:03 web8 sshd\[2387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.118.88
Aug 30 06:54:06 web8 sshd\[2387\]: Failed password for invalid user search from 139.59.118.88 port 54136 ssh2
2019-08-30 19:38:40
124.106.16.142 attack
Unauthorized connection attempt from IP address 124.106.16.142 on Port 445(SMB)
2019-08-30 19:51:43
27.72.60.206 attackspambots
Unauthorized connection attempt from IP address 27.72.60.206 on Port 445(SMB)
2019-08-30 19:33:21
159.192.199.196 attack
Unauthorized connection attempt from IP address 159.192.199.196 on Port 445(SMB)
2019-08-30 20:00:31
187.163.116.92 attackbots
Aug 30 12:07:51 web8 sshd\[27206\]: Invalid user tcp from 187.163.116.92
Aug 30 12:07:51 web8 sshd\[27206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.163.116.92
Aug 30 12:07:53 web8 sshd\[27206\]: Failed password for invalid user tcp from 187.163.116.92 port 44210 ssh2
Aug 30 12:11:54 web8 sshd\[29115\]: Invalid user dp from 187.163.116.92
Aug 30 12:11:54 web8 sshd\[29115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.163.116.92
2019-08-30 20:19:52

最近上报的IP列表

134.249.199.244 134.249.199.246 118.173.161.29 134.249.199.249
134.249.199.28 134.249.199.33 134.249.199.4 134.249.199.43
134.249.199.49 134.249.199.34 134.249.199.47 134.249.199.54
118.173.161.92 134.249.199.52 134.249.199.61 134.249.199.62
134.249.199.65 118.173.161.95 118.173.161.96 118.173.162.101