必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Arab Emirates (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.70.144.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.70.144.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:32:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 118.144.70.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.144.70.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.44.0.247 attackspam
port scan and connect, tcp 23 (telnet)
2019-08-31 08:28:29
54.37.230.15 attack
'Fail2Ban'
2019-08-31 08:29:55
164.132.119.83 attackspambots
164.132.119.83 - - \[31/Aug/2019:02:11:35 +0200\] "GET / HTTP/1.1" 301 655 "-" "Mozilla/5.0 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
164.132.119.83 - - \[31/Aug/2019:02:11:35 +0200\] "GET / HTTP/1.1" 301 947 "-" "Mozilla/5.0 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
164.132.119.83 - - \[31/Aug/2019:02:11:36 +0200\] "GET / HTTP/1.1" 200 15533 "-" "Mozilla/5.0 \(compatible\; Googlebot/2.1\; +http://www.google.com/bot.html\)"
...
2019-08-31 08:20:09
106.12.113.223 attackspam
Aug 31 01:43:07 minden010 sshd[31296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.223
Aug 31 01:43:08 minden010 sshd[31296]: Failed password for invalid user mukesh from 106.12.113.223 port 47982 ssh2
Aug 31 01:45:07 minden010 sshd[32001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.223
...
2019-08-31 07:52:38
190.85.108.186 attack
Invalid user webmail from 190.85.108.186 port 44226
2019-08-31 08:29:03
212.83.154.133 attackspambots
[ 🇧🇷 ] From erros@emailtarget.com.br Fri Aug 30 13:18:51 2019
 Received: from smtp.emailtarget.com.br ([212.83.154.133]:54547)
2019-08-31 08:09:37
167.99.66.166 attack
Aug 31 02:09:35 www sshd[27874]: refused connect from 167.99.66.166 (167.99.66.166) - 3 ssh attempts
2019-08-31 08:27:56
190.24.142.90 attackbotsspam
Aug 30 12:04:35 localhost kernel: [918891.619911] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.24.142.90 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x40 TTL=113 ID=22761 DF PROTO=TCP SPT=9552 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 30 12:04:35 localhost kernel: [918891.619952] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.24.142.90 DST=[mungedIP2] LEN=52 TOS=0x08 PREC=0x40 TTL=113 ID=22761 DF PROTO=TCP SPT=9552 DPT=445 SEQ=2102940328 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405B40103030201010402) 
Aug 30 12:19:35 localhost kernel: [919791.191325] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.24.142.90 DST=[mungedIP2] LEN=43 TOS=0x08 PREC=0x40 TTL=20 ID=0 PROTO=TCP SPT=9552 DPT=445 WINDOW=0 RES=0x00 RST URGP=0 
Aug 30 12:19:35 localhost kernel: [919791.191358] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.24.142.90 DST=[mungedIP2] L
2019-08-31 07:42:36
45.80.64.246 attackspambots
SSH-BruteForce
2019-08-31 08:19:38
36.66.149.211 attackbotsspam
Aug 30 13:52:35 hpm sshd\[32634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.149.211  user=root
Aug 30 13:52:37 hpm sshd\[32634\]: Failed password for root from 36.66.149.211 port 33198 ssh2
Aug 30 14:00:30 hpm sshd\[766\]: Invalid user test from 36.66.149.211
Aug 30 14:00:30 hpm sshd\[766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.149.211
Aug 30 14:00:31 hpm sshd\[766\]: Failed password for invalid user test from 36.66.149.211 port 48504 ssh2
2019-08-31 08:13:52
104.175.32.206 attackspam
Aug 30 23:28:07 ip-172-31-1-72 sshd\[15358\]: Invalid user max from 104.175.32.206
Aug 30 23:28:07 ip-172-31-1-72 sshd\[15358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.175.32.206
Aug 30 23:28:08 ip-172-31-1-72 sshd\[15358\]: Failed password for invalid user max from 104.175.32.206 port 34252 ssh2
Aug 30 23:32:15 ip-172-31-1-72 sshd\[15490\]: Invalid user test from 104.175.32.206
Aug 30 23:32:15 ip-172-31-1-72 sshd\[15490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.175.32.206
2019-08-31 08:00:13
210.120.112.18 attackbotsspam
Aug 31 00:07:52 ip-172-31-1-72 sshd\[16444\]: Invalid user jimmy from 210.120.112.18
Aug 31 00:07:52 ip-172-31-1-72 sshd\[16444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.120.112.18
Aug 31 00:07:54 ip-172-31-1-72 sshd\[16444\]: Failed password for invalid user jimmy from 210.120.112.18 port 48340 ssh2
Aug 31 00:12:16 ip-172-31-1-72 sshd\[16655\]: Invalid user brenda from 210.120.112.18
Aug 31 00:12:16 ip-172-31-1-72 sshd\[16655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.120.112.18
2019-08-31 08:16:39
159.65.54.221 attackbots
Aug 31 02:07:50 pornomens sshd\[26179\]: Invalid user seller from 159.65.54.221 port 35180
Aug 31 02:07:50 pornomens sshd\[26179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.54.221
Aug 31 02:07:52 pornomens sshd\[26179\]: Failed password for invalid user seller from 159.65.54.221 port 35180 ssh2
...
2019-08-31 08:17:34
23.129.64.186 attack
v+ssh-bruteforce
2019-08-31 08:05:56
123.133.178.192 attackspambots
Unauthorised access (Aug 30) SRC=123.133.178.192 LEN=40 TTL=49 ID=43051 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 30) SRC=123.133.178.192 LEN=40 TTL=49 ID=24326 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 28) SRC=123.133.178.192 LEN=40 TTL=49 ID=31107 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 26) SRC=123.133.178.192 LEN=40 TTL=49 ID=55607 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 26) SRC=123.133.178.192 LEN=40 TTL=49 ID=38287 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 26) SRC=123.133.178.192 LEN=40 TTL=49 ID=22043 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 25) SRC=123.133.178.192 LEN=40 TTL=49 ID=63144 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 25) SRC=123.133.178.192 LEN=40 TTL=49 ID=52380 TCP DPT=8080 WINDOW=44285 SYN 
Unauthorised access (Aug 25) SRC=123.133.178.192 LEN=40 TTL=49 ID=8800 TCP DPT=8080 WINDOW=44285 SYN
2019-08-31 08:03:44

最近上报的IP列表

59.20.174.246 154.97.68.140 23.62.207.73 103.187.82.165
230.105.29.86 48.108.242.191 234.238.117.173 137.233.78.239
166.30.103.228 199.136.149.179 211.110.77.216 247.225.224.37
241.9.218.177 99.213.35.220 36.6.45.126 42.70.129.114
144.93.98.80 92.51.214.54 184.183.88.155 114.197.245.242