必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.253.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.35.253.144.			IN	A

;; AUTHORITY SECTION:
.			67	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:39:05 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 144.253.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.253.35.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.48.22 attackbotsspam
Port 22 Scan, PTR: None
2019-12-03 17:40:13
191.33.223.55 attackspambots
Dec  3 02:32:47 reporting2 sshd[9396]: reveeclipse mapping checking getaddrinfo for 191.33.223.55.dynamic.adsl.gvt.net.br [191.33.223.55] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  3 02:32:47 reporting2 sshd[9396]: User r.r from 191.33.223.55 not allowed because not listed in AllowUsers
Dec  3 02:32:47 reporting2 sshd[9396]: Failed password for invalid user r.r from 191.33.223.55 port 58598 ssh2
Dec  3 02:44:31 reporting2 sshd[16217]: reveeclipse mapping checking getaddrinfo for 191.33.223.55.dynamic.adsl.gvt.net.br [191.33.223.55] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  3 02:44:31 reporting2 sshd[16217]: User r.r from 191.33.223.55 not allowed because not listed in AllowUsers
Dec  3 02:44:31 reporting2 sshd[16217]: Failed password for invalid user r.r from 191.33.223.55 port 48704 ssh2
Dec  3 02:53:36 reporting2 sshd[21347]: reveeclipse mapping checking getaddrinfo for 191.33.223.55.dynamic.adsl.gvt.net.br [191.33.223.55] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  3 02:53........
-------------------------------
2019-12-03 18:04:29
185.216.132.15 attackspambots
$f2bV_matches
2019-12-03 18:03:24
164.132.98.75 attack
Dec  2 23:09:07 hanapaa sshd\[22827\]: Invalid user vanderstraeten from 164.132.98.75
Dec  2 23:09:07 hanapaa sshd\[22827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.ip-164-132-98.eu
Dec  2 23:09:09 hanapaa sshd\[22827\]: Failed password for invalid user vanderstraeten from 164.132.98.75 port 57353 ssh2
Dec  2 23:14:31 hanapaa sshd\[23263\]: Invalid user teamspeak from 164.132.98.75
Dec  2 23:14:31 hanapaa sshd\[23263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.ip-164-132-98.eu
2019-12-03 17:56:55
80.211.133.238 attackspam
Dec  3 07:21:11 Ubuntu-1404-trusty-64-minimal sshd\[28778\]: Invalid user qi from 80.211.133.238
Dec  3 07:21:11 Ubuntu-1404-trusty-64-minimal sshd\[28778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.133.238
Dec  3 07:21:13 Ubuntu-1404-trusty-64-minimal sshd\[28778\]: Failed password for invalid user qi from 80.211.133.238 port 50616 ssh2
Dec  3 07:27:00 Ubuntu-1404-trusty-64-minimal sshd\[31272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.133.238  user=root
Dec  3 07:27:01 Ubuntu-1404-trusty-64-minimal sshd\[31272\]: Failed password for root from 80.211.133.238 port 41720 ssh2
2019-12-03 17:49:08
153.37.98.243 attack
Unauthorized SSH login attempts
2019-12-03 17:47:32
218.92.0.135 attackspambots
Dec  3 11:00:11 ns381471 sshd[18365]: Failed password for root from 218.92.0.135 port 61638 ssh2
Dec  3 11:00:24 ns381471 sshd[18365]: error: maximum authentication attempts exceeded for root from 218.92.0.135 port 61638 ssh2 [preauth]
2019-12-03 18:00:59
123.21.104.64 attackspam
Lines containing failures of 123.21.104.64
Dec  3 06:21:01 keyhelp sshd[22028]: Invalid user admin from 123.21.104.64 port 41213
Dec  3 06:21:01 keyhelp sshd[22028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.104.64
Dec  3 06:21:02 keyhelp sshd[22028]: Failed password for invalid user admin from 123.21.104.64 port 41213 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.21.104.64
2019-12-03 17:38:45
121.134.159.21 attackbots
2019-12-03T10:41:18.538987  sshd[9885]: Invalid user beth from 121.134.159.21 port 55402
2019-12-03T10:41:18.553050  sshd[9885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2019-12-03T10:41:18.538987  sshd[9885]: Invalid user beth from 121.134.159.21 port 55402
2019-12-03T10:41:20.432522  sshd[9885]: Failed password for invalid user beth from 121.134.159.21 port 55402 ssh2
2019-12-03T10:47:52.551426  sshd[10050]: Invalid user diana from 121.134.159.21 port 38392
...
2019-12-03 18:04:42
51.89.164.224 attack
Dec  3 09:29:48 lnxweb61 sshd[2069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.224
2019-12-03 17:57:42
51.159.7.65 attackspambots
Port 22 Scan, PTR: None
2019-12-03 17:37:01
103.110.89.148 attackbotsspam
2019-12-03T09:08:36.656818abusebot-4.cloudsearch.cf sshd\[23167\]: Invalid user dimyat from 103.110.89.148 port 43502
2019-12-03 17:36:08
222.186.175.212 attackbotsspam
Dec  3 10:56:41 dcd-gentoo sshd[20701]: User root from 222.186.175.212 not allowed because none of user's groups are listed in AllowGroups
Dec  3 10:56:43 dcd-gentoo sshd[20701]: error: PAM: Authentication failure for illegal user root from 222.186.175.212
Dec  3 10:56:41 dcd-gentoo sshd[20701]: User root from 222.186.175.212 not allowed because none of user's groups are listed in AllowGroups
Dec  3 10:56:43 dcd-gentoo sshd[20701]: error: PAM: Authentication failure for illegal user root from 222.186.175.212
Dec  3 10:56:41 dcd-gentoo sshd[20701]: User root from 222.186.175.212 not allowed because none of user's groups are listed in AllowGroups
Dec  3 10:56:43 dcd-gentoo sshd[20701]: error: PAM: Authentication failure for illegal user root from 222.186.175.212
Dec  3 10:56:43 dcd-gentoo sshd[20701]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.212 port 61878 ssh2
...
2019-12-03 18:14:33
34.94.143.250 attack
Port 22 Scan, PTR: None
2019-12-03 17:41:36
118.24.28.39 attackspam
Dec  3 10:01:02 sso sshd[19933]: Failed password for backup from 118.24.28.39 port 47856 ssh2
...
2019-12-03 17:43:09

最近上报的IP列表

134.35.253.148 134.35.253.136 134.35.253.139 134.35.253.133
134.35.253.150 134.35.253.13 134.35.253.140 134.35.253.131
134.35.253.14 134.35.253.157 134.35.253.154 118.173.64.2
134.35.253.158 134.35.253.162 134.35.253.160 134.35.253.17
134.35.253.190 134.35.253.188 134.35.253.192 134.35.253.187