必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.76.20.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.76.20.169.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:54:04 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
169.20.76.134.in-addr.arpa domain name pointer zvdd.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer gs.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer live.gjz18.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer index.live.gjz18.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer oai.live.gjz18.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer api.gs.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer vmext169.gwdg.de.
169.20.76.134.in-addr.arpa domain name pointer solr.gs.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa domain name pointer vd18.zvdd.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.20.76.134.in-addr.arpa	name = solr.gs.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = vd18.zvdd.de.
169.20.76.134.in-addr.arpa	name = zvdd.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = gs.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = live.gjz18.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = index.live.gjz18.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = oai.live.gjz18.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = api.gs.sub.uni-goettingen.de.
169.20.76.134.in-addr.arpa	name = vmext169.gwdg.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.72.101.19 attackbotsspam
Sep  4 10:31:28 aat-srv002 sshd[17335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.101.19
Sep  4 10:31:30 aat-srv002 sshd[17335]: Failed password for invalid user oracle from 182.72.101.19 port 62696 ssh2
Sep  4 10:36:53 aat-srv002 sshd[17491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.101.19
Sep  4 10:36:55 aat-srv002 sshd[17491]: Failed password for invalid user secretar from 182.72.101.19 port 63168 ssh2
...
2019-09-05 05:41:04
82.165.64.156 attackbotsspam
Sep  4 10:27:34 aiointranet sshd\[15194\]: Invalid user director from 82.165.64.156
Sep  4 10:27:34 aiointranet sshd\[15194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.64.156
Sep  4 10:27:35 aiointranet sshd\[15194\]: Failed password for invalid user director from 82.165.64.156 port 49600 ssh2
Sep  4 10:33:44 aiointranet sshd\[15644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.64.156  user=root
Sep  4 10:33:46 aiointranet sshd\[15644\]: Failed password for root from 82.165.64.156 port 37302 ssh2
2019-09-05 05:34:10
190.17.232.36 attack
ssh failed login
2019-09-05 05:33:21
146.242.56.24 attackspambots
Automated reporting of port scanning
2019-09-05 05:17:40
146.242.56.18 attackspam
Automated reporting of port scanning
2019-09-05 05:32:56
115.79.195.111 attackspambots
Unauthorized connection attempt from IP address 115.79.195.111 on Port 445(SMB)
2019-09-05 05:50:08
159.192.96.180 attack
Unauthorized connection attempt from IP address 159.192.96.180 on Port 445(SMB)
2019-09-05 05:44:27
211.104.242.171 attackbotsspam
DATE:2019-09-04 15:03:57, IP:211.104.242.171, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-09-05 05:49:10
202.42.100.26 attack
Unauthorized connection attempt from IP address 202.42.100.26 on Port 445(SMB)
2019-09-05 05:19:42
66.108.165.215 attackspambots
Aug 31 21:42:20 itv-usvr-01 sshd[18268]: Invalid user gast from 66.108.165.215
Aug 31 21:42:20 itv-usvr-01 sshd[18268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.108.165.215
Aug 31 21:42:20 itv-usvr-01 sshd[18268]: Invalid user gast from 66.108.165.215
Aug 31 21:42:22 itv-usvr-01 sshd[18268]: Failed password for invalid user gast from 66.108.165.215 port 46002 ssh2
Aug 31 21:48:58 itv-usvr-01 sshd[18508]: Invalid user testftp from 66.108.165.215
2019-09-05 05:42:55
4.16.253.10 attack
Sep  4 17:44:17 rpi sshd[6556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.16.253.10 
Sep  4 17:44:19 rpi sshd[6556]: Failed password for invalid user samba from 4.16.253.10 port 58258 ssh2
2019-09-05 05:18:03
183.63.49.21 attackspam
Sep  4 19:30:32 dedicated sshd[8073]: Invalid user user1 from 183.63.49.21 port 18331
2019-09-05 05:49:39
146.242.56.17 attackbotsspam
Automated reporting of port scanning
2019-09-05 05:20:10
168.181.51.119 attackspambots
Sep  4 11:00:48 lcdev sshd\[9235\]: Invalid user panadepula from 168.181.51.119
Sep  4 11:00:48 lcdev sshd\[9235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.51.119
Sep  4 11:00:50 lcdev sshd\[9235\]: Failed password for invalid user panadepula from 168.181.51.119 port 23317 ssh2
Sep  4 11:07:12 lcdev sshd\[9685\]: Invalid user mich from 168.181.51.119
Sep  4 11:07:12 lcdev sshd\[9685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.51.119
2019-09-05 05:15:23
146.242.56.22 attack
Automated reporting of port scanning
2019-09-05 05:45:14

最近上报的IP列表

134.77.73.11 134.81.247.124 118.174.164.103 134.82.101.136
134.80.228.237 134.82.117.185 134.8.78.181 134.78.121.168
134.76.9.14 134.82.236.211 134.83.228.20 118.174.164.108
134.84.138.9 134.83.254.6 134.84.159.176 134.83.254.248
134.85.102.108 134.83.36.2 134.87.96.183 134.86.209.181