必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Konstanz

省份(region): Baden-Württemberg

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.34.59.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.34.59.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 12:59:45 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 149.59.34.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.59.34.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.32.163.182 attackspambots
Oct 30 22:43:48 bouncer sshd\[29276\]: Invalid user admin from 193.32.163.182 port 57059
Oct 30 22:43:48 bouncer sshd\[29276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 
Oct 30 22:43:51 bouncer sshd\[29276\]: Failed password for invalid user admin from 193.32.163.182 port 57059 ssh2
...
2019-10-31 05:44:36
106.75.118.145 attackbots
Oct 30 21:23:56 MainVPS sshd[20952]: Invalid user test from 106.75.118.145 port 43588
Oct 30 21:23:56 MainVPS sshd[20952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.118.145
Oct 30 21:23:56 MainVPS sshd[20952]: Invalid user test from 106.75.118.145 port 43588
Oct 30 21:23:57 MainVPS sshd[20952]: Failed password for invalid user test from 106.75.118.145 port 43588 ssh2
Oct 30 21:27:55 MainVPS sshd[21232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.118.145  user=root
Oct 30 21:27:57 MainVPS sshd[21232]: Failed password for root from 106.75.118.145 port 53348 ssh2
...
2019-10-31 05:52:24
113.173.143.216 attackbotsspam
blacklist
2019-10-31 05:52:39
110.164.205.133 attack
SSH bruteforce (Triggered fail2ban)
2019-10-31 06:02:18
95.123.94.182 attackbots
Oct 30 17:28:38 shadeyouvpn sshd[10997]: Invalid user applmgr from 95.123.94.182
Oct 30 17:28:39 shadeyouvpn sshd[10997]: Failed password for invalid user applmgr from 95.123.94.182 port 40148 ssh2
Oct 30 17:28:40 shadeyouvpn sshd[10997]: Received disconnect from 95.123.94.182: 11: Bye Bye [preauth]
Oct 30 17:39:08 shadeyouvpn sshd[19145]: Failed password for r.r from 95.123.94.182 port 58690 ssh2
Oct 30 17:39:08 shadeyouvpn sshd[19145]: Received disconnect from 95.123.94.182: 11: Bye Bye [preauth]
Oct 30 17:43:16 shadeyouvpn sshd[23629]: Failed password for r.r from 95.123.94.182 port 42502 ssh2
Oct 30 17:43:16 shadeyouvpn sshd[23629]: Received disconnect from 95.123.94.182: 11: Bye Bye [preauth]
Oct 30 17:47:20 shadeyouvpn sshd[27871]: Invalid user login from 95.123.94.182
Oct 30 17:47:22 shadeyouvpn sshd[27871]: Failed password for invalid user login from 95.123.94.182 port 54546 ssh2
Oct 30 17:47:22 shadeyouvpn sshd[27871]: Received disconnect from 95.123.94.182: 11........
-------------------------------
2019-10-31 05:52:58
185.216.32.170 attackbots
firewall-block, port(s): 9100/tcp, 9200/tcp, 9418/tcp, 9999/tcp
2019-10-31 05:45:52
107.179.18.113 attackbots
Oct 30 21:07:00 mxgate1 postfix/postscreen[10009]: CONNECT from [107.179.18.113]:55901 to [176.31.12.44]:25
Oct 30 21:07:00 mxgate1 postfix/dnsblog[10011]: addr 107.179.18.113 listed by domain zen.spamhaus.org as 127.0.0.3
Oct 30 21:07:00 mxgate1 postfix/dnsblog[10010]: addr 107.179.18.113 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 30 21:07:06 mxgate1 postfix/postscreen[10009]: DNSBL rank 3 for [107.179.18.113]:55901
Oct x@x
Oct 30 21:07:06 mxgate1 postfix/postscreen[10009]: DISCONNECT [107.179.18.113]:55901


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.179.18.113
2019-10-31 06:09:35
45.136.109.15 attackspam
10/30/2019-16:28:12.969824 45.136.109.15 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-31 05:41:25
106.12.26.160 attack
2019-10-30T22:50:02.251648tmaserv sshd\[28875\]: Failed password for root from 106.12.26.160 port 50630 ssh2
2019-10-30T23:50:45.066779tmaserv sshd\[31864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.26.160  user=root
2019-10-30T23:50:46.738666tmaserv sshd\[31864\]: Failed password for root from 106.12.26.160 port 36712 ssh2
2019-10-30T23:55:14.985860tmaserv sshd\[32058\]: Invalid user liang from 106.12.26.160 port 46486
2019-10-30T23:55:14.990908tmaserv sshd\[32058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.26.160
2019-10-30T23:55:16.592721tmaserv sshd\[32058\]: Failed password for invalid user liang from 106.12.26.160 port 46486 ssh2
...
2019-10-31 06:10:02
139.129.14.230 attack
$f2bV_matches
2019-10-31 06:14:37
200.89.178.66 attack
Oct 30 21:22:44 h2177944 sshd\[21299\]: Invalid user jiong from 200.89.178.66 port 39034
Oct 30 21:22:44 h2177944 sshd\[21299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.178.66
Oct 30 21:22:45 h2177944 sshd\[21299\]: Failed password for invalid user jiong from 200.89.178.66 port 39034 ssh2
Oct 30 21:27:26 h2177944 sshd\[21422\]: Invalid user qq from 200.89.178.66 port 49308
...
2019-10-31 06:10:53
82.207.23.43 attack
Oct 30 22:32:23 MK-Soft-VM3 sshd[2356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.23.43 
Oct 30 22:32:24 MK-Soft-VM3 sshd[2356]: Failed password for invalid user jyroda from 82.207.23.43 port 56213 ssh2
...
2019-10-31 05:39:51
95.213.129.163 attackbotsspam
30.10.2019 21:27:28 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-10-31 06:15:20
37.187.25.138 attackbots
Oct 30 22:36:30 ns381471 sshd[30381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.25.138
Oct 30 22:36:33 ns381471 sshd[30381]: Failed password for invalid user tub from 37.187.25.138 port 45524 ssh2
2019-10-31 05:56:54
148.70.134.52 attack
Oct 30 21:42:01 legacy sshd[17087]: Failed password for root from 148.70.134.52 port 38932 ssh2
Oct 30 21:46:51 legacy sshd[17213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.134.52
Oct 30 21:46:54 legacy sshd[17213]: Failed password for invalid user it from 148.70.134.52 port 50654 ssh2
...
2019-10-31 06:00:50

最近上报的IP列表

122.80.252.12 174.42.53.243 180.167.200.18 84.75.99.44
226.248.18.134 68.242.135.227 164.0.234.175 239.189.28.133
130.184.223.227 84.79.161.213 185.5.234.31 7.147.59.138
122.3.133.141 73.83.114.174 168.204.78.235 199.169.125.146
136.171.64.225 70.34.43.71 38.51.104.55 54.198.203.47