必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Belgium

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.54.114.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4373
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.54.114.9.			IN	A

;; AUTHORITY SECTION:
.			224	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 17:19:16 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 9.114.54.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.114.54.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.15.37.97 attack
Automatic report - Banned IP Access
2019-10-12 06:15:42
222.186.173.201 attackbots
2019-10-11T22:10:14.681972shield sshd\[10378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
2019-10-11T22:10:16.750747shield sshd\[10378\]: Failed password for root from 222.186.173.201 port 15868 ssh2
2019-10-11T22:10:20.585302shield sshd\[10378\]: Failed password for root from 222.186.173.201 port 15868 ssh2
2019-10-11T22:10:24.967060shield sshd\[10378\]: Failed password for root from 222.186.173.201 port 15868 ssh2
2019-10-11T22:10:29.709893shield sshd\[10378\]: Failed password for root from 222.186.173.201 port 15868 ssh2
2019-10-12 06:10:35
91.218.98.37 attackbotsspam
Unauthorized connection attempt from IP address 91.218.98.37 on Port 445(SMB)
2019-10-12 06:14:39
221.237.154.56 attackspam
" "
2019-10-11 23:23:06
222.186.190.2 attackbotsspam
Oct 11 20:58:24 herz-der-gamer sshd[3373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 11 20:58:26 herz-der-gamer sshd[3373]: Failed password for root from 222.186.190.2 port 65158 ssh2
...
2019-10-12 02:59:37
94.177.250.221 attackbots
Oct 11 13:27:55 web8 sshd\[15953\]: Invalid user Image123 from 94.177.250.221
Oct 11 13:27:55 web8 sshd\[15953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.250.221
Oct 11 13:27:58 web8 sshd\[15953\]: Failed password for invalid user Image123 from 94.177.250.221 port 45182 ssh2
Oct 11 13:31:56 web8 sshd\[17871\]: Invalid user Nova123 from 94.177.250.221
Oct 11 13:31:56 web8 sshd\[17871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.250.221
2019-10-11 23:31:14
222.186.173.238 attack
Oct 11 21:00:33 root sshd[26545]: Failed password for root from 222.186.173.238 port 7460 ssh2
Oct 11 21:00:40 root sshd[26545]: Failed password for root from 222.186.173.238 port 7460 ssh2
Oct 11 21:00:44 root sshd[26545]: Failed password for root from 222.186.173.238 port 7460 ssh2
Oct 11 21:00:48 root sshd[26545]: Failed password for root from 222.186.173.238 port 7460 ssh2
...
2019-10-12 03:01:47
103.240.250.45 attack
Oct  8 00:46:17 our-server-hostname postfix/smtpd[19605]: connect from unknown[103.240.250.45]
Oct  8 00:46:19 our-server-hostname sqlgrey: grey: new: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct x@x
Oct  8 00:46:22 our-server-hostname sqlgrey: grey: new: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct  8 00:46:22 our-server-hostname sqlgrey: grey: new: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct  8 00:46:23 our-server-hostname sqlgrey: grey: new: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct  8 00:46:23 our-server-hostname sqlgrey: grey: new: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct  8 00:46:24 our-server-hostname sqlgrey: grey: throttling: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct  8 00:46:24 our-server-hostname sqlgrey: grey: throttling: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct  8 00:46:25 our-server-hostname sqlgrey: grey: throttling: 103.240.250.45(103.240.250.45), x@x -> x@x
Oct x@x
Oct ........
-------------------------------
2019-10-12 06:12:11
185.176.27.178 attackbots
Oct 11 20:58:22 mc1 kernel: \[2106689.695964\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=6083 PROTO=TCP SPT=50169 DPT=59289 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 11 20:58:43 mc1 kernel: \[2106710.086042\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=57490 PROTO=TCP SPT=50169 DPT=26405 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 11 21:03:00 mc1 kernel: \[2106967.262835\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=21241 PROTO=TCP SPT=50169 DPT=33642 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-12 06:12:31
203.146.170.167 attackspam
2019-10-11T17:27:59.884756tmaserv sshd\[13459\]: Invalid user P@r0la0101 from 203.146.170.167 port 60326
2019-10-11T17:27:59.889875tmaserv sshd\[13459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
2019-10-11T17:28:02.092577tmaserv sshd\[13459\]: Failed password for invalid user P@r0la0101 from 203.146.170.167 port 60326 ssh2
2019-10-11T18:31:11.902002tmaserv sshd\[16231\]: Invalid user P@ssw0rt1q from 203.146.170.167 port 45236
2019-10-11T18:31:11.905723tmaserv sshd\[16231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
2019-10-11T18:31:13.349763tmaserv sshd\[16231\]: Failed password for invalid user P@ssw0rt1q from 203.146.170.167 port 45236 ssh2
...
2019-10-11 23:39:47
46.98.4.175 attack
Unauthorized connection attempt from IP address 46.98.4.175 on Port 445(SMB)
2019-10-12 06:13:21
103.120.227.49 attackbotsspam
Oct 11 17:14:21 markkoudstaal sshd[12123]: Failed password for root from 103.120.227.49 port 44596 ssh2
Oct 11 17:19:10 markkoudstaal sshd[12561]: Failed password for root from 103.120.227.49 port 36892 ssh2
2019-10-11 23:30:21
165.227.46.221 attackspam
Oct 11 15:36:26 vps sshd[1239]: Failed password for root from 165.227.46.221 port 45306 ssh2
Oct 11 15:50:13 vps sshd[1968]: Failed password for root from 165.227.46.221 port 40668 ssh2
...
2019-10-11 23:45:34
104.197.58.239 attackbots
2019-10-11T15:10:13.560991abusebot-4.cloudsearch.cf sshd\[9896\]: Invalid user P@rola!2 from 104.197.58.239 port 59748
2019-10-11 23:30:08
206.189.239.103 attackspam
Oct 11 08:59:25 tdfoods sshd\[19555\]: Invalid user 1qaz2WSX3EDC from 206.189.239.103
Oct 11 08:59:25 tdfoods sshd\[19555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.239.103
Oct 11 08:59:27 tdfoods sshd\[19555\]: Failed password for invalid user 1qaz2WSX3EDC from 206.189.239.103 port 54640 ssh2
Oct 11 09:02:57 tdfoods sshd\[19930\]: Invalid user 1qaz2WSX3EDC from 206.189.239.103
Oct 11 09:02:57 tdfoods sshd\[19930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.239.103
2019-10-12 06:13:44

最近上报的IP列表

109.69.136.233 64.196.79.67 194.205.77.26 144.157.94.81
128.106.116.251 155.138.213.169 76.141.129.208 103.159.182.48
174.137.121.135 205.27.4.82 170.21.165.32 132.25.143.12
151.91.73.163 153.23.235.92 167.136.32.223 21.51.176.195
126.170.40.89 211.218.28.151 196.95.48.78 168.105.250.91