必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kansas City

省份(region): Missouri

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.34.0.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31542
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.34.0.56.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091202 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 13 10:23:58 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 56.0.34.136.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 56.0.34.136.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.38.144.17 attack
Oct  7 19:54:15 mail postfix/smtpd\[32474\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 19:55:31 mail postfix/smtpd\[30720\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 19:56:49 mail postfix/smtpd\[32450\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  7 20:27:21 mail postfix/smtpd\[1804\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-08 02:28:26
109.194.54.126 attackspam
2019-10-07T14:58:23.647077abusebot-6.cloudsearch.cf sshd\[29738\]: Invalid user T3ST@123 from 109.194.54.126 port 35368
2019-10-08 02:00:08
81.30.212.14 attackbotsspam
Oct  7 19:54:01 vps647732 sshd[9527]: Failed password for root from 81.30.212.14 port 56904 ssh2
...
2019-10-08 02:13:05
51.158.117.17 attack
Oct  7 21:11:20 server sshd\[18034\]: User root from 51.158.117.17 not allowed because listed in DenyUsers
Oct  7 21:11:20 server sshd\[18034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.117.17  user=root
Oct  7 21:11:22 server sshd\[18034\]: Failed password for invalid user root from 51.158.117.17 port 45870 ssh2
Oct  7 21:15:13 server sshd\[21848\]: User root from 51.158.117.17 not allowed because listed in DenyUsers
Oct  7 21:15:13 server sshd\[21848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.117.17  user=root
2019-10-08 02:17:04
41.73.252.236 attackspam
$f2bV_matches
2019-10-08 02:29:32
5.69.214.72 attackbots
Forbidden directory scan :: 2019/10/07 22:38:44 [error] 1085#1085: *74808 access forbidden by rule, client: 5.69.214.72, server: [censored_1], request: "HEAD /.env HTTP/1.1", host: "[censored_1]"
2019-10-08 02:17:35
46.251.82.132 attack
Automatic report - Port Scan Attack
2019-10-08 02:12:22
154.120.230.250 attackbots
Unauthorized connection attempt from IP address 154.120.230.250 on Port 445(SMB)
2019-10-08 02:18:27
35.195.131.52 attack
10/07/2019-07:37:59.573583 35.195.131.52 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-08 02:36:18
201.244.0.160 attackbots
php injection
2019-10-08 02:29:57
140.114.85.215 attackbotsspam
Oct  7 18:29:25 ncomp sshd[5130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.114.85.215  user=root
Oct  7 18:29:26 ncomp sshd[5130]: Failed password for root from 140.114.85.215 port 49206 ssh2
Oct  7 18:40:51 ncomp sshd[5335]: Invalid user 123 from 140.114.85.215
2019-10-08 02:37:14
37.59.6.106 attackbotsspam
Oct  7 19:29:29 nextcloud sshd\[30876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.6.106  user=root
Oct  7 19:29:31 nextcloud sshd\[30876\]: Failed password for root from 37.59.6.106 port 44366 ssh2
Oct  7 19:33:38 nextcloud sshd\[6297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.6.106  user=root
...
2019-10-08 02:00:56
201.47.34.147 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/201.47.34.147/ 
 BR - 1H : (431)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN18881 
 
 IP : 201.47.34.147 
 
 CIDR : 201.47.0.0/18 
 
 PREFIX COUNT : 938 
 
 UNIQUE IP COUNT : 4233472 
 
 
 WYKRYTE ATAKI Z ASN18881 :  
  1H - 4 
  3H - 11 
  6H - 17 
 12H - 28 
 24H - 92 
 
 DateTime : 2019-10-07 13:38:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 02:06:21
201.93.164.54 attackspambots
Automatic report - Port Scan Attack
2019-10-08 02:01:56
36.77.187.107 attackspambots
Unauthorised access (Oct  7) SRC=36.77.187.107 LEN=52 TTL=247 ID=31279 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-08 02:20:12

最近上报的IP列表

200.101.253.118 204.67.195.98 80.24.12.4 5.72.228.193
127.177.115.44 10.37.166.9 221.125.239.6 241.28.88.135
37.114.160.22 103.222.223.193 18.234.233.252 217.222.67.139
31.9.232.96 117.145.252.3 191.179.68.250 183.157.171.119
182.117.186.69 178.62.9.117 102.226.87.77 53.114.10.127