必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.20.14.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57050
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.20.14.134.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:08:35 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.14.20.135.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.14.20.135.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.46.209.36 attack
Unauthorised access (Oct 27) SRC=178.46.209.36 LEN=40 TTL=51 ID=39092 TCP DPT=23 WINDOW=44316 SYN
2019-10-27 16:56:26
218.4.169.82 attackspambots
fail2ban
2019-10-27 16:22:54
54.39.246.33 attackbotsspam
2019-10-27T06:10:39.421556shield sshd\[2103\]: Invalid user lwen from 54.39.246.33 port 35924
2019-10-27T06:10:39.431458shield sshd\[2103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip33.ip-54-39-246.net
2019-10-27T06:10:41.582464shield sshd\[2103\]: Failed password for invalid user lwen from 54.39.246.33 port 35924 ssh2
2019-10-27T06:14:39.993345shield sshd\[3567\]: Invalid user vncuser from 54.39.246.33 port 49034
2019-10-27T06:14:40.000356shield sshd\[3567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip33.ip-54-39-246.net
2019-10-27 16:26:47
54.37.136.87 attackspam
Oct 26 18:17:01 hanapaa sshd\[12151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-54-37-136.eu  user=root
Oct 26 18:17:03 hanapaa sshd\[12151\]: Failed password for root from 54.37.136.87 port 47882 ssh2
Oct 26 18:20:50 hanapaa sshd\[12467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-54-37-136.eu  user=root
Oct 26 18:20:52 hanapaa sshd\[12467\]: Failed password for root from 54.37.136.87 port 56720 ssh2
Oct 26 18:24:37 hanapaa sshd\[12784\]: Invalid user jyroda from 54.37.136.87
2019-10-27 16:33:42
119.29.119.151 attackbots
Oct 26 18:33:12 php1 sshd\[8483\]: Invalid user ozzy from 119.29.119.151
Oct 26 18:33:12 php1 sshd\[8483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.119.151
Oct 26 18:33:14 php1 sshd\[8483\]: Failed password for invalid user ozzy from 119.29.119.151 port 34000 ssh2
Oct 26 18:38:42 php1 sshd\[9070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.119.151  user=root
Oct 26 18:38:44 php1 sshd\[9070\]: Failed password for root from 119.29.119.151 port 41424 ssh2
2019-10-27 16:51:03
190.128.230.98 attackbots
Oct 27 14:54:27 webhost01 sshd[9815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.98
Oct 27 14:54:29 webhost01 sshd[9815]: Failed password for invalid user admin from 190.128.230.98 port 53859 ssh2
...
2019-10-27 16:38:19
200.149.1.106 attackbotsspam
(From webuydomains@bigwidewebpro.com) Dear owner for bafilefamilychiro.com,

We came across your site and wanted to see are you considering selling your domain and website?

If you have considered it could you let us know by going to bigwidewebpro.com for additional info on what we would like to buy.

We would just have a few questions to help us make a proper offer for your site, look forward to hearing!

Thanks
James Harrison
bigwidewebpro.com
2019-10-27 16:33:05
106.13.162.75 attackbots
Oct 26 22:27:02 tdfoods sshd\[15087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.162.75  user=root
Oct 26 22:27:03 tdfoods sshd\[15087\]: Failed password for root from 106.13.162.75 port 49516 ssh2
Oct 26 22:31:24 tdfoods sshd\[15428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.162.75  user=root
Oct 26 22:31:27 tdfoods sshd\[15428\]: Failed password for root from 106.13.162.75 port 55420 ssh2
Oct 26 22:35:52 tdfoods sshd\[15863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.162.75  user=root
2019-10-27 16:42:47
213.219.235.252 attackspam
Malicious brute force vulnerability hacking attacks
2019-10-27 16:43:46
172.245.14.2 attackbotsspam
\[2019-10-27 02:25:04\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-27T02:25:04.007-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046406820523",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/172.245.14.2/5139",ACLName="no_extension_match"
\[2019-10-27 02:29:48\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-27T02:29:48.191-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146406820523",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/172.245.14.2/5126",ACLName="no_extension_match"
\[2019-10-27 02:34:31\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-27T02:34:31.617-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146406820523",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/172.245.14.2/5079",ACLName="no_extension_ma
2019-10-27 16:45:57
157.230.133.15 attackbotsspam
Oct 27 10:35:55 server sshd\[944\]: Invalid user minecraft from 157.230.133.15
Oct 27 10:35:55 server sshd\[944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15 
Oct 27 10:35:57 server sshd\[944\]: Failed password for invalid user minecraft from 157.230.133.15 port 37050 ssh2
Oct 27 10:40:00 server sshd\[2146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15  user=root
Oct 27 10:40:02 server sshd\[2146\]: Failed password for root from 157.230.133.15 port 50748 ssh2
...
2019-10-27 16:53:14
221.3.52.73 attackspam
23/tcp
[2019-10-27]1pkt
2019-10-27 16:47:17
185.199.87.243 attack
(From webuydomains@bigwidewebpro.com) Dear owner for bafilefamilychiro.com,

We came across your site and wanted to see are you considering selling your domain and website?

If you have considered it could you let us know by going to bigwidewebpro.com for additional info on what we would like to buy.

We would just have a few questions to help us make a proper offer for your site, look forward to hearing!

Thanks
James Harrison
bigwidewebpro.com
2019-10-27 16:27:40
68.183.19.84 attackbots
ssh failed login
2019-10-27 16:40:28
45.136.109.215 attackbotsspam
Oct 27 09:06:17 h2177944 kernel: \[5039370.970101\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=40130 PROTO=TCP SPT=43015 DPT=1505 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 09:12:17 h2177944 kernel: \[5039730.863213\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=10470 PROTO=TCP SPT=43015 DPT=7432 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 09:21:55 h2177944 kernel: \[5040309.156082\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=54805 PROTO=TCP SPT=43015 DPT=1647 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 09:25:22 h2177944 kernel: \[5040515.542765\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=28892 PROTO=TCP SPT=43015 DPT=7691 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 09:27:17 h2177944 kernel: \[5040630.622900\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.215 DST=85.214.
2019-10-27 16:30:52

最近上报的IP列表

32.152.152.193 142.131.232.121 250.3.159.150 67.101.147.180
32.18.202.106 34.129.139.159 34.144.9.12 3.102.147.242
222.132.7.109 242.84.187.108 127.5.107.10 164.119.187.181
243.150.12.129 30.200.9.147 2.131.223.127 194.120.147.139
97.21.152.161 76.31.245.136 130.145.17.216 137.29.128.200