必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kyiv

省份(region): Kyyiv

国家(country): Ukraine

运营商(isp): Kyivstar

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.249.42.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.249.42.144.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:06:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
144.42.249.134.in-addr.arpa domain name pointer 134-249-42-144.broadband.kyivstar.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.42.249.134.in-addr.arpa	name = 134-249-42-144.broadband.kyivstar.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.40.134.20 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-07-20 04:08:29
134.255.225.26 attackbots
Jul 19 15:39:02 vps200512 sshd\[5960\]: Invalid user mateo from 134.255.225.26
Jul 19 15:39:02 vps200512 sshd\[5960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.225.26
Jul 19 15:39:04 vps200512 sshd\[5960\]: Failed password for invalid user mateo from 134.255.225.26 port 51596 ssh2
Jul 19 15:44:14 vps200512 sshd\[6136\]: Invalid user drupal from 134.255.225.26
Jul 19 15:44:14 vps200512 sshd\[6136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.225.26
2019-07-20 03:58:27
107.149.192.90 attack
445/tcp
[2019-07-19]1pkt
2019-07-20 04:23:59
124.129.199.176 attackspam
37215/tcp
[2019-07-19]1pkt
2019-07-20 04:17:53
80.13.15.187 attackspambots
23/tcp
[2019-07-19]1pkt
2019-07-20 04:10:25
119.123.224.248 attackspambots
445/tcp
[2019-07-19]1pkt
2019-07-20 04:06:45
5.63.119.49 attackspam
445/tcp
[2019-07-19]1pkt
2019-07-20 04:03:37
171.61.75.233 attackbots
60001/tcp
[2019-07-19]1pkt
2019-07-20 04:04:55
210.18.157.55 attackspam
Automatic report - Port Scan Attack
2019-07-20 04:28:48
84.227.36.28 attack
2019-07-19T22:12:08.505445ns1.unifynetsol.net webmin\[3604\]: Invalid login as root from 84.227.36.28
2019-07-19T22:12:14.008250ns1.unifynetsol.net webmin\[3605\]: Invalid login as root from 84.227.36.28
2019-07-19T22:12:19.529084ns1.unifynetsol.net webmin\[3610\]: Invalid login as root from 84.227.36.28
2019-07-19T22:12:25.032263ns1.unifynetsol.net webmin\[3615\]: Invalid login as root from 84.227.36.28
2019-07-19T22:12:30.557866ns1.unifynetsol.net webmin\[3616\]: Invalid login as root from 84.227.36.28
2019-07-20 04:27:14
68.50.82.62 attackspambots
DATE:2019-07-19_18:42:23, IP:68.50.82.62, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-20 04:33:51
175.138.184.254 attack
Tried sshing with brute force.
2019-07-20 03:57:07
171.247.84.176 attackspambots
445/tcp
[2019-07-19]1pkt
2019-07-20 04:29:06
1.53.214.84 attack
TCP port 25 (SMTP) attempt blocked by hMailServer IP-check. Country not allowed to use this service.
2019-07-20 04:39:57
123.30.25.50 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-07-20 04:43:04

最近上报的IP列表

95.66.92.127 252.124.129.255 214.225.41.59 104.231.55.149
51.254.160.89 82.235.184.22 208.28.170.229 240.156.150.182
224.167.90.51 36.40.118.198 147.121.244.113 228.41.104.219
78.90.11.45 40.1.143.190 116.244.214.74 146.94.197.180
176.247.176.68 170.128.80.39 144.53.234.180 19.194.17.101